IoT Intrusion Detection System Using Deep Learning and Enhanced Transient Search Optimization

被引:95
作者
Fatani, Abdulaziz [1 ,2 ]
Abd Elaziz, Mohamed [3 ]
Dahou, Abdelghani [4 ]
Al-Qaness, Mohammed A. A. [5 ]
Lu, Songfeng [6 ,7 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[2] Umm Al Qura Univ, Comp Sci Dept, Mecca 24381, Saudi Arabia
[3] Zagazig Univ, Fac Sci, Dept Math, Zagazig 44519, Egypt
[4] Univ Ahmed Draia, Fac Sci & Technol, LDDI Lab, Adrar 01000, Algeria
[5] Wuhan Univ, State Key Lab Informat Engn Surveying Mapping & R, Wuhan 430079, Peoples R China
[6] Huazhong Univ Sci & Technol, Hubei Engn Res Ctr Big Data Secur, Sch Cyber Sci & Engn, Wuhan 430074, Peoples R China
[7] Shenzhen Huazhong Univ Sci & Technol, Res Inst, Shenzhen 518057, Peoples R China
关键词
Feature extraction; Intrusion detection; Transient analysis; Deep learning; Convolutional neural networks; Cloud computing; Internet of Things; Internet of Things (IoT); security; cyberattack; intrusion detection system; feature selection; optimization algorithms; GLOBAL OPTIMIZATION; ALGORITHM; NETWORKS; INTERNET; DATASET; THINGS;
D O I
10.1109/ACCESS.2021.3109081
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The great advancements in communication, cloud computing, and the internet of things (IoT) have opened critical challenges in security. With these developments, cyberattacks are also rapidly growing since the current security mechanisms do not provide efficient solutions. Recently, various artificial intelligence (AI) based solutions have been proposed for different security applications, including intrusion detection. In this paper, we propose an efficient AI-based mechanism for intrusion detection systems (IDS) in IoT systems. We leverage the advancements of deep learnings and metaheuristics (MH) algorithms that approved their efficiency in solving complex engineering problems. We propose a feature extraction method using the convolutional neural networks (CNNs) to extract relevant features. Also, we develop a new feature selection method using a new variant of the transient search optimization (TSO) algorithm, called TSODE, using the operators of differential evolution (DE) algorithm. The proposed TSODE uses the DE to improve the process of balancing between exploitation and exploration phases. Furthermore, we use three public datasets, KDDCup-99, NSL-KDD, BoT-IoT, and CICIDS-2017 to assess the performance of the developed method, which achieved higher accuracy compared to several existing approaches.
引用
收藏
页码:123448 / 123464
页数:17
相关论文
共 65 条
[31]  
Malhotra S, 2017, PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), P42, DOI 10.1109/CONFLUENCE.2017.7943121
[32]   RETRACTED: Best features based intrusion detection system by RBM model for detecting DDoS in cloud environment (Retracted Article) [J].
Mayuranathan, M. ;
Murugan, M. ;
Dhanakoti, V. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (03) :3609-3619
[33]   Adaptive Pooling Operators for Weakly Labeled Sound Event Detection [J].
McFee, Brian ;
Salamon, Justin ;
Bello, Juan Pablo .
IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2018, 26 (11) :2180-2193
[34]  
Merity S., ARXIV191111423
[35]   The Whale Optimization Algorithm [J].
Mirjalili, Seyedali ;
Lewis, Andrew .
ADVANCES IN ENGINEERING SOFTWARE, 2016, 95 :51-67
[36]   Moth-flame optimization algorithm: A novel nature-inspired heuristic paradigm [J].
Mirjalili, Seyedali .
KNOWLEDGE-BASED SYSTEMS, 2015, 89 :228-249
[37]   Multi-Verse Optimizer: a nature-inspired algorithm for global optimization [J].
Mirjalili, Seyedali ;
Mirjalili, Seyed Mohammad ;
Hatamlou, Abdolreza .
NEURAL COMPUTING & APPLICATIONS, 2016, 27 (02) :495-513
[38]   Grey Wolf Optimizer [J].
Mirjalili, Seyedali ;
Mirjalili, Seyed Mohammad ;
Lewis, Andrew .
ADVANCES IN ENGINEERING SOFTWARE, 2014, 69 :46-61
[39]   Intrusion detection techniques in cloud environment: A survey [J].
Mishra, Preeti ;
Pilli, Emmanuel S. ;
Varadharajan, Vijay ;
Tupakula, Udaya .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 77 :18-47
[40]  
Modi C, 2012, PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, P67