Reinforcement Learning With Deep Features: A Dynamic Approach for Intrusion Detection in IoT Networks

被引:0
作者
Khayat, Mohamad [1 ]
Barka, Ezedin [1 ]
Serhani, Mohamed Adel [2 ]
Sallabi, Farag [1 ]
Shuaib, Khaled [1 ]
Khater, Heba M. [1 ,3 ]
机构
[1] United Arab Emirates Univ, Coll Informat Technol, Al Ain, U Arab Emirates
[2] Univ Sharjah, Coll Comp & Informat, Sharjah, U Arab Emirates
[3] Zagazig Univ, Fac Comp & Informat, Zagazig 44519, Egypt
关键词
Internet of Things; Feature extraction; Security; Intrusion detection; Optimization; Green products; Fish; Accuracy; Long short term memory; Deep learning; feature selection; intrusion detection; IoT; optimization; INTERNET; ATTACKS; THINGS;
D O I
10.1109/ACCESS.2025.3569312
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection in Internet of Things (IoT) networks is essential to identify and mitigate security breaches and unauthorized access to connected devices. As IoT devices continue to advance, securing interconnected systems against malicious attacks is essential to ensure data privacy, system integrity, and user safety. However, traditional intrusion detection systems (IDSs) often struggle to adapt to novel and evolving threats. Developing a system that can autonomously learn and enhance intrusion detection capabilities to effectively identify and mitigate emerging threats is challenging. To address this issue, we propose a reinforcement learning (RL)-based approach for enhancing cybersecurity in IoT networks. First, various preprocessing techniques such as handling missing values, outliers, and min-max scaling normalization were applied. Then, domain-specific features related to network traffic patterns, including packet size distribution, packet count, and packet rate, were extracted. Statistical measures, including mean, variance, and entropy, were calculated from these features to determine temporal and spatial variations in the network data. Moreover, deep learning models, including long short-term memory networks and convolutional neural networks (CNNs), were used to automatically extract high-level features from raw data such as network logs or sensor readings. The extracted feature sets were concatenated within a feature fusion layer that enabled efficient dimensionality reduction via principal component analysis. A hybrid optimization approach was also introduced for feature selection using green anaconda optimization and the chaotic learning osprey optimization algorithm. Furthermore, an RL-based IDS (RL-IDS) that incorporates RNNs and autoencoders with a deep Q-network was proposed to enhance threat detection. Experimental outcomes emphasize the superiority of the method, obtaining 99.45% accuracy with 70% training data and 99.80% with 80%. Precision and F-measure are 99.99% and 99.89%, respectively, outperforming current models like CNN, DNN, LSTM, and GAN-DRL, while efficiently reducing false positives and false negatives.
引用
收藏
页码:92319 / 92337
页数:19
相关论文
共 32 条
[11]   Green Anaconda Optimization: A New Bio-Inspired Metaheuristic Algorithm for Solving Optimization Problems [J].
Dehghani, Mohammad ;
Trojovsky, Pavel ;
Malik, Om Parkash .
BIOMIMETICS, 2023, 8 (01)
[12]  
Dong H., 2020, Deep Reinforcement Learning: Fundamentals, Research and Applications, P47, DOI [DOI 10.1007/978-981-15-4095-0_2, DOI 10.1007/978-981-15-4095-02]
[13]   RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks [J].
Ferrag, Mohamed Amine ;
Maglaras, Leandros ;
Ahmim, Ahmed ;
Derdour, Makhlouf ;
Janicke, Helge .
FUTURE INTERNET, 2020, 12 (03)
[14]   "Why Should I Trust Your IDS?": An Explainable Deep Learning Framework for Intrusion Detection Systems in Internet of Things Networks [J].
Houda, Zakaria Abou El ;
Brik, Bouziane ;
Khoukhi, Lyes .
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2022, 3 :1164-1176
[15]   Performance of Osprey Optimization Algorithm for Solving Economic Load Dispatch Problem [J].
Ismaeel, Alaa A. K. ;
Houssein, Essam H. ;
Khafaga, Doaa Sami ;
Aldakheel, Eman Abdullah ;
AbdElrazek, Ahmed S. ;
Said, Mokhtar .
MATHEMATICS, 2023, 11 (19)
[16]   Deep Learning for Intrusion Detection and Security of Internet of Things (IoT): Current Analysis, Challenges, and Possible Solutions [J].
Khan, Amjad Rehman ;
Kashif, Muhammad ;
Jhaveri, Rutvij H. ;
Raut, Roshani ;
Saba, Tanzila ;
Bahaj, Saeed Ali .
SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
[17]  
Khan Muhammad Almas, 2022, Advances on Smart and Soft Computing: Proceedings of ICACIn 2021. Advances in Intelligent Systems and Computing (1399), P313, DOI 10.1007/978-981-16-5559-3_26
[18]   Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset [J].
Koroniotis, Nickolaos ;
Moustafa, Nour ;
Sitnikova, Elena ;
Turnbull, Benjamin .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 :779-796
[19]   E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoT [J].
Lo, Wai Weng ;
Layeghy, Siamak ;
Sarhan, Mohanad ;
Gallagher, Marcus ;
Portmann, Marius .
PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
[20]   Optimizing Intrusion Detection for IoT: A Systematic Review of Machine Learning and Deep Learning Approaches With Feature Selection and Data Balancing [J].
Mallidi, S. Kumar Reddy ;
Ramisetty, Rajeswara Rao .
WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2025, 15 (02)