A discrete time-varying greywolf IoT botnet detection system

被引:9
作者
Alazab, Moutaz [1 ]
机构
[1] Al Balqa Appl Univ, Fac Artificial Intelligence, As Salt 19385, Jordan
关键词
IoT; GWO optimizer; Feature selection; Wrapper; Intrusion detection; Botnets; Transfer functions; INTRUSION DETECTION; SELECTION; INTERNET; ALGORITHM; SECURITY; THINGS;
D O I
10.1016/j.comcom.2022.06.016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of things (IoT) is an emerging network that is trending due to advances in computing and networking development. A botnet is an attack that threatens the IoT system because of the increased number of compromised connected IoT devices. The conventional counter measurements are unable to detect this attack. This problem becomes a hot topic for researchers and practitioners who introduced many secured solutions to stop the risks of a botnet attack. The intrusion detection systems are promising solutions to tackle botnet attacks and discover malicious patterns. Recently, many studies investigated the impact of reducing the number of dataset's attributes (features) on the performance of detecting IoT attacks. Selecting the relevant features in a dataset is a data mining technique that has been efficiently integrated with designing secured systems for detecting botnets. This research paper proposes a new system for discovering botnet attacks in the context of IoT by applying a wrapper feature selection (FS) technique using an improved algorithm inspired by the natural swarming architecture of gray wolves called Gray Wolves Optimization (GWO). The transfer function (TF) maps the standard GWO which is originally developed to work in continuous search space to perform its optimization job in discrete search space. Different types of TFs that belong to S type and V type groups are used to generate eight discrete versions of GWO to optimize the binary feature space. This study contributes by adopting time-variant TFs to identify the best time to switch the global search into local search to achieve trade-offs in the search job of the BGWO and approach to the best-optimized solution. Time-variant TFs facilitate the global search at the beginning of the search process to fetch new solutions in new regions of feature space. In the later phases of the search process, the need is to expose more searches in the local region to get the most optimized solution among the neighborhood solutions. A real IoT traffic that is represented by the N-BaIoT dataset is utilized to evaluate the BGWO and other compared methods. The comparison results of the experiments show that the time-variant TFs enhance the capability of the GWO optimizer in alleviating the premature conversion and finding the best feature subset within a reasonable running time. Therefore, the BGWO-TV-S1 is recommended to be integrated into the IoT network as an intrusion detection algorithm with accuracy 98.97%, fitness value 1.31%, 51.2210 selected features and running time 503.7132 s.
引用
收藏
页码:405 / 416
页数:12
相关论文
共 54 条
[1]   A Review of the Modification Strategies of the Nature Inspired Algorithms for Feature Selection Problem [J].
Abu Khurma, Ruba ;
Aljarah, Ibrahim ;
Sharieh, Ahmad ;
Abd Elaziz, Mohamed ;
Damasevicius, Robertas ;
Krilavicius, Tomas .
MATHEMATICS, 2022, 10 (03)
[2]   IoT Botnet Detection Using Salp Swarm and Ant Lion Hybrid Optimization Model [J].
Abu Khurma, Ruba ;
Almomani, Iman ;
Aljarah, Ibrahim .
SYMMETRY-BASEL, 2021, 13 (08)
[3]  
Abu Khurma R, 2020, ALGO INTELL SY, P131, DOI 10.1007/978-981-32-9990-0_8
[4]   An intelligent feature selection approach based on moth flame optimization for medical diagnosis [J].
Abu Khurmaa, Ruba ;
Aljarah, Ibrahim ;
Sharieh, Ahmad .
NEURAL COMPUTING & APPLICATIONS, 2021, 33 (12) :7165-7204
[5]   No Free Lunch Theorem: A Review [J].
Adam, Stavros P. ;
Alexandropoulos, Stamatios-Aggelos N. ;
Pardalos, Panos M. ;
Vrahatis, Michael N. .
APPROXIMATION AND OPTIMIZATION: ALGORITHMS, COMPLEXITY AND APPLICATIONS, 2019, 145 :57-82
[6]   Machine learning approaches to IoT security: A systematic literature review [J].
Ahmad, Rasheed ;
Alsmadi, Izzat .
INTERNET OF THINGS, 2021, 14
[7]   DADEM: Distributed Attack Detection Model Based on Big Data Analytics for the Enhancement of the Security of Internet of Things (IoT) [J].
Ahmed, Hassan, I ;
Nasr, Abdurrahman A. ;
Abdel-Mageid, Salah M. ;
Aslan, Heba K. .
INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2021, 12 (01) :114-139
[8]   Real time dataset generation framework for intrusion detection systems in IoT [J].
Al-Hadhrami, Yahya ;
Hussain, Farookh Khadeer .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 :414-423
[9]  
Alazab A., 2012, 2012 International Symposium on Communications and Information Technologies (ISCIT), P296, DOI 10.1109/ISCIT.2012.6380910
[10]   A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization [J].
Ali, Mohammed Hasan ;
Al Mohammed, Bahaa Abbas Dawood ;
Ismail, Alyani ;
Zolkipli, Mohamad Fadli .
IEEE ACCESS, 2018, 6 :20255-20261