Automated Machine Learning Enabled Cybersecurity Threat Detection in Internet of Things Environment

被引:17
作者
Alrowais, Fadwa [1 ]
Althahabi, Sami [2 ]
Alotaibi, Saud S. [3 ]
Mohamed, Abdullah [4 ]
Hamza, Manar Ahmed [5 ]
Marzouk, Radwa [6 ]
机构
[1] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Comp Sci, Riyadh 11671, Saudi Arabia
[2] King Khalid Univ, Coll Sci & Art Mahayil, Dept Comp Sci, Abha, Saudi Arabia
[3] Umm Al Qura Univ, Coll Comp & Informat Syst, Dept Informat Syst, Mecca, Saudi Arabia
[4] Future Univ Egypt, Res Ctr, New Cairo 11745, Egypt
[5] Prince Sattam Bin Abdulaziz Univ, Dept Comp & Self Dev, Preparatory Year Deanship, AlKharj, Saudi Arabia
[6] Cairo Univ, Fac Sci, Dept Math, Giza 12613, Egypt
来源
COMPUTER SYSTEMS SCIENCE AND ENGINEERING | 2023年 / 45卷 / 01期
关键词
Cybersecurity threats; classi fi cation; internet of things; machine learning; parameter optimization; ALGORITHM; NETWORK;
D O I
10.32604/csse.2023.030188
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Internet of Things (IoT) devices produces massive quantity of data from distinct sources that get transmitted over public networks. Cybersecur-ity becomes a challenging issue in the IoT environment where the existence of cyber threats needs to be resolved. The development of automated tools for cyber threat detection and classification using machine learning (ML) and artificial intel-ligence (AI) tools become essential to accomplish security in the IoT environment. It is needed to minimize security issues related to IoT gadgets effectively. There-fore, this article introduces a new Mayfly optimization (MFO) with regularized extreme learning machine (RELM) model, named MFO-RELM for Cybersecurity Threat Detection and classification in IoT environment. The presented MFO-RELM technique accomplishes the effectual identification of cybersecurity threats that exist in the IoT environment. For accomplishing this, the MFO-RELM model pre-processes the actual IoT data into a meaningful format. In addition, the RELM model receives the pre-processed data and carries out the classification process. In order to boost the performance of the RELM model, the MFO algorithm has been employed to it. The performance validation of the MFO-RELM model is tested using standard datasets and the results highlighted the better outcomes of the MFO-RELM model under distinct aspects.
引用
收藏
页码:687 / 700
页数:14
相关论文
共 20 条
[1]   Machine learning approaches to IoT security: A systematic literature review [J].
Ahmad, Rasheed ;
Alsmadi, Izzat .
INTERNET OF THINGS, 2021, 14
[2]   Botnet Attack Detection Using Local Global Best Bat Algorithm for Industrial Internet of Things [J].
Alharbi, Abdullah ;
Alosaimi, Wael ;
Alyami, Hashem ;
Rauf, Hafiz Tayyab ;
Damasevicius, Robertas .
ELECTRONICS, 2021, 10 (11)
[3]   IoT network security using autoencoder deep neural network and channel access algorithm [J].
Ali, Saif Mohammed ;
Elameer, Amer S. ;
Jaber, Mustafa Musa .
JOURNAL OF INTELLIGENT SYSTEMS, 2021, 31 (01) :95-103
[4]   Hybrid deep-learning model to detect botnet attacks over internet of things environments [J].
Alzahrani, Mohammed Y. ;
Bamhdi, Alwi M. .
SOFT COMPUTING, 2022, 26 (16) :7721-7735
[5]   How Machine Learning Changes the Nature of Cyberattacks on IoT Networks: A Survey [J].
Bout, Emilie ;
Loscri, Valeria ;
Gallais, Antoine .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (01) :248-279
[6]   Cyber security in smart cities: A review of deep learning-based applications and case studies [J].
Chen, Dongliang ;
Wawrzynski, Pawel ;
Lv, Zhihan .
SUSTAINABLE CITIES AND SOCIETY, 2021, 66
[7]   Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review [J].
Dixit, Priyanka ;
Silakari, Sanjay .
COMPUTER SCIENCE REVIEW, 2021, 39
[8]   Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis [J].
Ferrag, Mohamed Amine ;
Friha, Othmane ;
Maglaras, Leandros ;
Janicke, Helge ;
Shu, Lei .
IEEE ACCESS, 2021, 9 :138509-138542
[9]   Using the modified mayfly algorithm for optimizing the component size and operation strategy of a high temperature PEMFC-powered CCHP [J].
Guo, Xiaokai ;
Yan, Xianguo ;
Jermsittiparsert, Kittisak .
ENERGY REPORTS, 2021, 7 :1234-1245
[10]   DGR-ELM-Distribute d Generalized Regularize ELM for classification [J].
Inaba, Fernando Kentaro ;
Teatini Salles, Evandro Ottoni ;
Perron, Sylvain ;
Caporossi, Gilles .
NEUROCOMPUTING, 2018, 275 :1522-1530