IoT Intrusion Detection System Using Deep Learning and Enhanced Transient Search Optimization

被引:95
作者
Fatani, Abdulaziz [1 ,2 ]
Abd Elaziz, Mohamed [3 ]
Dahou, Abdelghani [4 ]
Al-Qaness, Mohammed A. A. [5 ]
Lu, Songfeng [6 ,7 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[2] Umm Al Qura Univ, Comp Sci Dept, Mecca 24381, Saudi Arabia
[3] Zagazig Univ, Fac Sci, Dept Math, Zagazig 44519, Egypt
[4] Univ Ahmed Draia, Fac Sci & Technol, LDDI Lab, Adrar 01000, Algeria
[5] Wuhan Univ, State Key Lab Informat Engn Surveying Mapping & R, Wuhan 430079, Peoples R China
[6] Huazhong Univ Sci & Technol, Hubei Engn Res Ctr Big Data Secur, Sch Cyber Sci & Engn, Wuhan 430074, Peoples R China
[7] Shenzhen Huazhong Univ Sci & Technol, Res Inst, Shenzhen 518057, Peoples R China
关键词
Feature extraction; Intrusion detection; Transient analysis; Deep learning; Convolutional neural networks; Cloud computing; Internet of Things; Internet of Things (IoT); security; cyberattack; intrusion detection system; feature selection; optimization algorithms; GLOBAL OPTIMIZATION; ALGORITHM; NETWORKS; INTERNET; DATASET; THINGS;
D O I
10.1109/ACCESS.2021.3109081
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The great advancements in communication, cloud computing, and the internet of things (IoT) have opened critical challenges in security. With these developments, cyberattacks are also rapidly growing since the current security mechanisms do not provide efficient solutions. Recently, various artificial intelligence (AI) based solutions have been proposed for different security applications, including intrusion detection. In this paper, we propose an efficient AI-based mechanism for intrusion detection systems (IDS) in IoT systems. We leverage the advancements of deep learnings and metaheuristics (MH) algorithms that approved their efficiency in solving complex engineering problems. We propose a feature extraction method using the convolutional neural networks (CNNs) to extract relevant features. Also, we develop a new feature selection method using a new variant of the transient search optimization (TSO) algorithm, called TSODE, using the operators of differential evolution (DE) algorithm. The proposed TSODE uses the DE to improve the process of balancing between exploitation and exploration phases. Furthermore, we use three public datasets, KDDCup-99, NSL-KDD, BoT-IoT, and CICIDS-2017 to assess the performance of the developed method, which achieved higher accuracy compared to several existing approaches.
引用
收藏
页码:123448 / 123464
页数:17
相关论文
共 65 条
[1]   A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks [J].
Alkadi, Osama ;
Moustafa, Nour ;
Turnbull, Benjamin ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (12) :9463-9472
[2]   Deep recurrent neural network for IoT intrusion detection system [J].
Almiani, Muder ;
AbuGhazleh, Alia ;
Al-Rahayfeh, Amer ;
Atiewi, Saleh ;
Razaque, Abdul .
SIMULATION MODELLING PRACTICE AND THEORY, 2020, 101
[3]   TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems [J].
Alsaedi, Abdullah ;
Moustafa, Nour ;
Tari, Zahir ;
Mahmood, Abdun ;
Anwar, Adnan .
IEEE ACCESS, 2020, 8 :165130-165150
[4]   Flexible Network-based Intrusion Detection and Prevention System on Software-defined Networks [J].
An Le ;
Phuong Dinh ;
Hoa Le ;
Ngoc Cuong Tran .
2015 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND APPLICATIONS (ACOMP), 2015, :106-111
[5]  
Angel J, 2020, P 14 INT WORKSHOP SE, P957
[6]  
[Anonymous], 2015, ACS SYM SER
[7]  
Bhadoriya J. S, INT J EMERG ELECTR P, V2021
[8]  
Bochkovskiy A., ARXIV200410934
[9]   Internet of Things: A survey on machine learning-based intrusion detection approaches [J].
da Costa, Kelton A. P. ;
Papa, Joao P. ;
Lisboa, Celso O. ;
Munoz, Roberto ;
de Albuquerque, Victor Hugo C. .
COMPUTER NETWORKS, 2019, 151 :147-157
[10]  
da Silva AS, 2016, IEEE IFIP NETW OPER, P27, DOI 10.1109/NOMS.2016.7502793