Hybrid deep learning model for attack detection in internet of things

被引:0
作者
H. Rekha
M. Siddappa
机构
[1] Sri Siddhartha Academy of Higher Education,Computer Science and Engineering, Sri Siddhartha Institute of Technology
来源
Service Oriented Computing and Applications | 2022年 / 16卷
关键词
Attack detection; Internet of things; Feature extraction; Detection; Optimization;
D O I
暂无
中图分类号
学科分类号
摘要
Internet of things (IoT) provides a new application, which helps the existing networks communicate with smart technologies. Things are now becoming increasingly connected to the Internet, and lots of new gadgets are being created at a faster rate. Since these interconnected smart objects are capable of interacting with one another in undefended surroundings, the entire communication ecology needs solutions related to security at various levels. Unlike the existing networks, IoT technology has its own set of features, including various network protocol requirements and a variety of resource constraints. To launch different attacks, the attacker takes many security vulnerabilities in the IoT system. The growth in cyber-attacks has rendered it important to address the consequences implied in the IoT. This paper intends to introduce a novel attack detection model. Originally, the input data are preprocessed, from which the most relevant features are extracted that include raw features, statistical features, and higher-order statistical features. The extracted features are subjected to the classification process. More importantly, the extracted raw features are directly given to the long short-term memory (LSTM), and the extracted statistical and higher-order statistical features are subjected to the deep reinforcement learning (DRL) for the classification process. Then, the average of both LSTM and DRL provides the detected output in an effective manner. To improve the performance of detection results, the weight of LSTM is optimized by the self-improved battle royale optimization (SIBRO) algorithm. At the end, the performance of the presented scheme is compared to the existing approaches in terms of different metrics like “F-measure, specificity, NPV, accuracy, FNR, sensitivity, precision, FPR, and MCC,” respectively.
引用
收藏
页码:293 / 312
页数:19
相关论文
共 110 条
[1]  
Kaliyar P(2020)LiDL: localization with early detection of sybil and wormhole attacks in IoT networks Comput Secur 94 101849-879
[2]  
Jaballah WB(2019)Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks Future Gener Comput Syst 101 865-89
[3]  
Lal C(2018)Semi-supervised learning based distributed attack detection framework for IoT Appl Soft Comput 72 79-746
[4]  
Liu L(2020)Scalable machine learning-based intrusion detection system for IoT-enabled smart cities Sustain Cities Soc 61 102324-7772
[5]  
Ma Z(2020)IC-MADS: IoT enabled cross layer man-in-middle attack detection system for smart healthcare application Wireless Pers Commun 113 727-169009
[6]  
Meng W(2019)Multi-sensor fusion based on multiple classifier systems for human activity identification Hum Cent Comput Inf Sci 9 34-20
[7]  
Rathore S(2020)Compressed-sensing-based pilot contamination attack detection for NOMA-IoT communications IEEE Internet Things J 7 7764-16
[8]  
Park JH(2020)Attack and defense strategies for intrusion detection in autonomous distributed IoT systems IEEE Access 8 168994-25
[9]  
Rahman MA(2020)Search and rescue optimization algorithm - second order sliding mode control: AUV error tracking J Comput Mech Power Syst Control 3 10-169956
[10]  
Asyhari AT(2020)Intrusion detection system for wireless mesh networks via improved whale optimization J Netw Commun Syst 3 9-97