A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models

被引:24
作者
Rabie, Osama Bassam J. [1 ,2 ]
Selvarajan, Shitharth [3 ,4 ]
Hasanin, Tawfiq [1 ]
Alshareef, Abdulrhman M. [1 ]
Yogesh, C. K. [5 ]
Uddin, Mueen [6 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah, Saudi Arabia
[2] King Abdulaziz Univ, Cybersecur Ctr, Jeddah, Saudi Arabia
[3] Leeds Beckett Univ, Sch Built Environm Engn & Comp, Leeds LS1 3HE, England
[4] Kebri Dehar Univ, Dept Comp Sci, Kebri Dehar, Ethiopia
[5] Sch Comp Sci & Engn, ViT Chennai Campus, Chennai, India
[6] Univ Doha Sci & Technol, Coll Comp & IT, Doha 24449, Qatar
关键词
CHALLENGES;
D O I
10.1038/s41598-024-51154-z
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The Internet of Things (IoT) is extensively used in modern-day life, such as in smart homes, intelligent transportation, etc. However, the present security measures cannot fully protect the IoT due to its vulnerability to malicious assaults. Intrusion detection can protect IoT devices from the most harmful attacks as a security tool. Nevertheless, the time and detection efficiencies of conventional intrusion detection methods need to be more accurate. The main contribution of this paper is to develop a simple as well as intelligent security framework for protecting IoT from cyber-attacks. For this purpose, a combination of Decisive Red Fox (DRF) Optimization and Descriptive Back Propagated Radial Basis Function (DBRF) classification are developed in the proposed work. The novelty of this work is, a recently developed DRF optimization methodology incorporated with the machine learning algorithm is utilized for maximizing the security level of IoT systems. First, the data preprocessing and normalization operations are performed to generate the balanced IoT dataset for improving the detection accuracy of classification. Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. It also supports increasing the training speed and reducing the error rate of the classifier. Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. Here, the proposed DRF-DBRF security model's performance is validated and tested using five different and popular IoT benchmarking datasets. Finally, the results are compared with the previous anomaly detection approaches by using various evaluation parameters.
引用
收藏
页数:20
相关论文
共 42 条
[1]   Intrusion detection approach for cloud and IoT environments using deep learning and Capuchin Search Algorithm [J].
Abd Elaziz, Mohamed ;
Al-qaness, Mohammed A. A. ;
Dahou, Abdelghani ;
Ibrahim, Rehab Ali ;
Abd El-Latif, Ahmed A. .
ADVANCES IN ENGINEERING SOFTWARE, 2023, 176
[2]   Real time dataset generation framework for intrusion detection systems in IoT [J].
Al-Hadhrami, Yahya ;
Hussain, Farookh Khadeer .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 :414-423
[3]   Deep recurrent neural network for IoT intrusion detection system [J].
Almiani, Muder ;
AbuGhazleh, Alia ;
Al-Rahayfeh, Amer ;
Atiewi, Saleh ;
Razaque, Abdul .
SIMULATION MODELLING PRACTICE AND THEORY, 2020, 101
[4]   Anomaly-Based Intrusion Detection Systems in IoT Using Deep Learning: A Systematic Literature Review [J].
Alsoufi, Muaadh A. ;
Razak, Shukor ;
Siraj, Maheyzah Md ;
Nafea, Ibtehal ;
Ghaleb, Fuad A. ;
Saeed, Faisal ;
Nasser, Maged .
APPLIED SCIENCES-BASEL, 2021, 11 (18)
[5]   A Supervised Intrusion Detection System for Smart Home IoT Devices [J].
Anthi, Eirini ;
Williams, Lowri ;
Slowinska, Malgorzata ;
Theodorakopoulos, George ;
Burnap, Pete .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :9042-9053
[6]   Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT [J].
Aslam, Muhammad ;
Ye, Dengpan ;
Tariq, Aqil ;
Asad, Muhammad ;
Hanif, Muhammad ;
Ndzi, David ;
Chelloug, Samia Allaoua ;
Abd Elaziz, Mohamed ;
Al-Qaness, Mohammed A. A. ;
Jilani, Syeda Fizzah .
SENSORS, 2022, 22 (07)
[7]   Examining the Suitability of NetFlow Features in Detecting IoT Network Intrusions [J].
Awad, Mohammed ;
Fraihat, Salam ;
Salameh, Khouloud ;
Al Redhaei, Aneesa .
SENSORS, 2022, 22 (16)
[8]   A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems [J].
Benkhelifa, Elhadj ;
Welsh, Thomas ;
Hamouda, Walaa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04) :3496-3509
[9]   Intrusion Detection System for IoT Based on Deep Learning and Modified Reptile Search Algorithm [J].
Dahou, Abdelghani ;
Abd Elaziz, Mohamed ;
Chelloug, Samia Allaoua ;
Awadallah, Mohammed A. ;
Al-Betar, Mohammed Azmi ;
Al-qaness, Mohammed A. A. ;
Forestiero, Agostino .
COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
[10]   New methods based on back propagation (BP) and radial basis function (RBF) artificial neural networks (ANNs) for predicting the occurrence of haloketones in tap water [J].
Deng, Ying ;
Zhou, Xiaoling ;
Shen, Jiao ;
Xiao, Ge ;
Hong, Huachang ;
Lin, Hongjun ;
Wu, Fuyong ;
Liao, Bao-Qiang .
SCIENCE OF THE TOTAL ENVIRONMENT, 2021, 772