ENHANCING CYBERSECURITY VIA ANOMALY RECOGNITION USING THERMAL EXCHANGE FRACTALS OPTIMIZATION WITH DEEP LEARNING ON IOT NETWORKS

被引:0
作者
Alhashmi, Asma a. [1 ]
Alamro, Hayam [2 ]
Aljebreen, Mohammed [3 ]
Alghamdi, Mohammed [4 ]
Alharbi, Abeer a. k. [5 ]
Mahmud, Ahmed [6 ]
机构
[1] Northern Border Univ, Coll Sci, Dept Comp Sci, Ar Ar, Saudi Arabia
[2] Princess Nourah bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
[3] King Saud Univ, Community Coll, Dept Comp Sci, POB 28095, Riyadh 11437, Saudi Arabia
[4] King Khalid Univ, Coll Comp Sci, Dept Informat Syst, Abha, Saudi Arabia
[5] Imam Mohammad Ibn Saud Islamic Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh 11432, Saudi Arabia
[6] Future Univ Egypt, Res Ctr, New Cairo 11835, Egypt
关键词
Internet of Things; Anomaly Recognition; Fractals Thermal Exchange Optimization; Complex Systems; Deep Learning; Cybersecurity;
D O I
10.1142/S0218348X25400353
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The Internet of Things (IoT) refers to the interconnected network of objects and devices that seamlessly communicate and share information. The need for robust cybersecurity measures becomes paramount with the increase of IoT devices, ranging from smart home devices to industrial sensors. The inherent vulnerability of the IoT ecosystem to cyber threats necessitates cutting-edge security protocols to ensure the integrity of connected systems and safeguard sensitive information. IoT security is crucial to protect against potential manipulation of connected devices, unauthorized access, and data breaches. An essential facet of IoT cybersecurity, Anomaly detection, includes the detection of unusual behaviors or patterns in device activity or network traffic in many complex systems that may indicate security breaches. Deep learning (DL), with its ability to analyze complex and vast datasets, has improved anomaly detection in IoT environments. By leveraging DL techniques, IoT systems can better adapt to evolving cyber threats, which offer a proactive defense system against complex cyber threats in various complex systems. In essence, incorporating anomaly detection and DL within the IoT cybersecurity framework is crucial to ensure the entire IoT ecosystem's trustworthiness and fortify interconnected devices' resilience. This study presents an anomaly recognition using fractals thermal exchange optimization with deep learning (ARA-TEODL) technique for cybersecurity on IoT Networks. The ARA-TEODL technique focuses on identifying anomalous behavior in the IoT network to achieve cybersecurity. In the ARA-TEODL technique, Z-score normalization is primarily used to scale the input networking data. Besides, the selection of features takes place utilizing the chimp fractals optimization algorithm (ChOA). Moreover, a modified Mogrifier long short-term memory (MM-LSTM) model is used to identify anomalies in the network. Finally, the hyperparameter tuning process takes place using the TEO algorithm. The experimental evaluation of the ARA-TEODL technique takes place using a benchmark dataset. The experimental results stated that the ARA-TEODL technique reaches optimal cybersecurity in the IoT networks.
引用
收藏
页数:14
相关论文
共 24 条
  • [1] Development of a hybrid LSTM with chimp optimization algorithm for the pressure ventilator prediction
    Ahmed, Fatma Refaat
    Alsenany, Samira Ahmed
    Abdelaliem, Sally Mohammed Farghaly
    Deif, Mohanad A.
    [J]. SCIENTIFIC REPORTS, 2023, 13 (01)
  • [2] Anomaly Detection for Internet of Things Cyberattacks
    Alanazi, Manal
    Aljuhani, Ahamed
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 261 - 279
  • [3] Alanazi R., 2023, COMPUT SYST SCI ENG, V44, P2361, DOI [10.32604/csse.2023.026712, DOI 10.32604/CSSE.2023.026712]
  • [4] Alhato M. M., 2020, Indones. J. Electr. Eng. Comput. Sci., V20, P1252
  • [5] Red Kite Optimization Algorithm With Average Ensemble Model for Intrusion Detection for Secure IoT
    Alruwaili, Fahad F.
    Asiri, Mashael M.
    Alrayes, Fatma S.
    Aljameel, Sumayh S.
    Salama, Ahmed S.
    Hilal, Anwer Mustafa
    [J]. IEEE ACCESS, 2023, 11 : 131749 - 131758
  • [6] Enhanced CNN-LSTM Deep Learning for SCADA IDS Featuring Hurst Parameter Self-Similarity
    Balla, Asaad
    Habaebi, Mohamed Hadi
    Elsheikh, Elfatih A. A.
    Islam, Md. Rafiqul
    Suliman, Fakher Eldin Mohamed
    Mubarak, Sinil
    [J]. IEEE ACCESS, 2024, 12 : 6100 - 6116
  • [7] Anomaly Detection in Industrial IoT Using Distributional Reinforcement Learning and Generative Adversarial Networks
    Benaddi, Hafsa
    Jouhari, Mohammed
    Ibrahimi, Khalil
    Ben Othman, Jalel
    Amhoud, El Mehdi
    [J]. SENSORS, 2022, 22 (21)
  • [8] Elankavi R., 2023, J. Internet Serv. Inf. Secur., V13, P104
  • [9] A hybrid methodology for anomaly detection in Cyber-Physical Systems
    Jeffrey, Nicholas
    Tan, Qing
    Villar, Jose R.
    [J]. NEUROCOMPUTING, 2024, 568
  • [10] kaggle, ABOUT US