Intelligent Secure Ecosystem Based on Metaheuristic and Functional Link Neural Network for Edge of Things

被引:25
作者
Naik, Bighnaraj [1 ]
Obaidat, Mohammad S. [2 ,3 ,4 ,5 ,6 ]
Nayak, Janmenjoy [7 ]
Pelusi, Danilo [8 ]
Vijayakumar, Pandi [9 ]
Islam, S. K. Hafizul [10 ]
机构
[1] Veer Surendra Sai Univ Technol, Dept Comp Applicat, Burla 768018, India
[2] Nazarbayev Univ, Dept Elect & Comp Engn, Nur Sultan 010000, Kazakhstan
[3] Korea Adv Inst Sci & Technol, Daejeon, South Korea
[4] Univ Jordan, Amman 11942, Jordan
[5] Univ Sci & Technol, Beijing 100091, Peoples R China
[6] Amity Univ, Noida 201313, India
[7] Sri Sivani Coll Engn, Dept Comp Sci & Engn, Srikakulam 532410, India
[8] Univ Teramo, Fac Commun Sci, I-64100 Teramo, Italy
[9] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Tindivanam 604001, India
[10] Indian Inst Informat Technol Kalyani, Dept Comp Sci & Engn, Kalyani 741235, W Bengal, India
关键词
Neural networks; Optimization; Intrusion detection; Ecosystems; Servers; Image edge detection; Edge computing; elitism; functional link artificial neural network (FLANN); Internet of Things (IoT); intrusion detection system (IDS); metaheuristic; INTRUSION-DETECTION; OPTIMIZATION;
D O I
10.1109/TII.2019.2920831
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) has evolved for building smart environments in a distributed system, where the data produced by IoT devices are transmitted through Edge computing devices to streamline the flow of traffic from IoT devices to a distributed network. In such a scenario, the attacker introduces many attacks to the edge before forwarding them to distributed servers. This necessitates intrusion detection systems for such environments to mitigate security attacks. This paper has projected a basis for characterization of intrusive behaviors in a distributed system based on the functional link neural nets response weighted-average and teaching-learning metaheuristic with elitism on weight-space. The proposed technique makes use of teaching-learning metaheuristic optimization to obtain suitable parameters for the functional link neural net. Furthermore, the processing of duplicate parameters is successfully avoided by using mutation operation. In addition to this, in this paper the proposed method is found to be more efficient in terms of computational burden.
引用
收藏
页码:1947 / 1956
页数:10
相关论文
共 30 条
[1]  
Al-Assam H, 2018, Biometric-based physical and cybersecurity systems, P455, DOI [DOI 10.1007/978-3-319-98734-7, 10.1007/978-3-319-98734-7_18]
[2]   A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization [J].
Ali, Mohammed Hasan ;
Al Mohammed, Bahaa Abbas Dawood ;
Ismail, Alyani ;
Zolkipli, Mohamad Fadli .
IEEE ACCESS, 2018, 6 :20255-20261
[3]  
[Anonymous], 2000, ACM SIGKDD EXPLORATI
[4]  
[Anonymous], 2000, ACM SIGKDD EXPLORATI, DOI DOI 10.1145/846183.846201
[5]   Hybrid Approach Based on GA and PSO for Parameter Estimation of a Full Power Quality Disturbance Parameterized Model [J].
Antonio Rodriguez-Guerrero, Marco ;
Jaen-Cuellar, Arturo Y. ;
Carranza-Lopez-Padilla, Rene D. ;
Osornio-Rios, Roque A. ;
Herrera-Ruiz, Gilberto ;
Romero-Troncoso, Rene de J. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (03) :1016-1028
[6]   Critical study of neural networks in detecting intrusions [J].
Beghdad, Rachid .
COMPUTERS & SECURITY, 2008, 27 (5-6) :168-175
[7]   A survey on optimization metaheuristics [J].
Boussaid, Ilhern ;
Lepagnot, Julien ;
Siarry, Patrick .
INFORMATION SCIENCES, 2013, 237 :82-117
[8]   A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems [J].
Carcano, A. ;
Coletta, A. ;
Guglielmi, M. ;
Masera, M. ;
Fovino, I. Nai ;
Trombetta, A. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2011, 7 (02) :179-186
[9]   Hybrid flexible neural-tree-based intrusion detection systems [J].
Chen, Yuehui ;
Akbraham, Ajith ;
Yang, Bo .
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2007, 22 (04) :337-352
[10]   Chebyshev Functional Expansion Based Artificial Neural Network Controller for Shunt Compensation [J].
Chittora, Prakash ;
Singh, Alka ;
Singh, Madhusudan .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (09) :3792-3800