Hybridization of Bottlenose Dolphin Optimization and Artificial Fish Swarm Algorithm with Efficient Classifier for Detecting the Network Intrusion in Internet of Things (IoT)

Authors

  • Rekha Gangula Research Scholar, Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, Andhra Pradesh, India-522503
  • Murali Mohan Vutukuru Associate Professor, Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, Andhra Pradesh, India-522503.
  • Ranjeeth Kumar M. Assistant Professor, Department of CSE, Kakatiya Institute of Technology and Science, Warangal, Telangana, India-506015

Keywords:

network intrusion, optimization, convolution neural network, classification, feature selection

Abstract

Due to the current target-oriented assaults aimed at stealing confidential information from a business, Intrusion Detection Systems (IDSs) research is essential in the field of network security. Intrusion classification and detection are difficult yet highly specialised tasks. The accuracy of intrusion detection in network traffic varies for various methods in the current models. The inter domain dispersion disagreement assessment of the current method, unfortunately, has a higher computing complexity as the sample size rises, that might worsen the strategy's capacity in generalise. We suggest a deep transfer learning method based on 1D-CNN for categorising the incursions in order to resolve the issue. Also, a hybrid bottlenose dolphin optimization/artificial fish swarm technique is described for feature selection that can quickly and effectively detect a variety of intrusion behaviours by learning the information associated with typical intrusion characteristics. Using a character that allows the rough set to retain the original dataset's discernibility after reductions, the unique dataset's reductions were computed then utilised to create a neural network for training, improving detection capability. For the purpose of analysis three benchmark dataset such as KDD Cup' 99, NSL-KDD and UNSW-NB15 are used and shows that the suggested Hyb_DOAFS_1D-CNN achieves 96.4% and 99% of accuracy, 92% and 99% of precision, 99% and 97% of recall, 99.4% and 99% of f1-score.

Downloads

Download data is not yet available.

References

I. Lee, “'e internet of things for enterprises: an ecosystem, architecture, and iot service business model,” Internet of Hings, vol. 7, Article ID 100078, 2019.

I. Lee, “Internet of things (iot) cybersecurity: literature review and iot cyber risk management,” Future Internet, vol. 12, no. 9, p. 157, 2020.

G. S. Kushwah and V. Ranga, “Voting extreme learning machine based distributed denial of service attack detection in cloud computing,” Journal of Information Security and Applications, vol. 53, Article ID 102532, 2020.

P. Louvieris, N. Clewley, and X. Liu, “Effects-based feature identification for network intrusion detection,” Neurocomputing, vol. 121, pp. 265–273, 2013.

J. Man and G. Sun, “A residual learning-based network intrusion detection system,” Security and Communication Networks, vol. 2021, Article ID 5593435, 9 pages, 2021.

B. Arandian, and A. Chapnevis, “Covid-19 diagnosis using capsule network and fuzzy-means and mayfly optimization algorithm,” BioMed Research International, vol. 2021, Article ID 2295920, 11 pages, 2021.

L. Mohammadpour, T C. Ling, C. L. Sun, and A. Aryanfar, “A Mean Convolutional Layer for Intrusion Detection System,” Security and Communication Networks, vol. 2020, Article ID 8891185, 16 pages, 2020.

B. Zhou and B. Arandian, “An improved cnn architecture to diagnose skin cancer in dermoscopic images based on wildebeest herd optimization algorithm,” Computational Intelligence and Neuroscience, vol. 2021, Article ID 7567870, 9 pages, 2021.

P. Mishra, V. Varadharajan, and U. Tupakula, “Intrusion detection techniques in cloud environment: a survey,” Journal of Network and Computer Applications, vol. 77, pp. 18–47, 2017.

C. Modi, D. Patel, B. Borisanya, A. Patel, and M. Rajarajan, “A novel framework for intrusion detection in cloud,” in Proceedings of the fifth international conference on security of information and networks, Association for Computing Machinery, Jaipur, India, pp. 67–74, October 2012

P. Ghosh, A. Karmakar, J. Sharma, and S. Phadikar, “Cs-pso based intrusion detection system in cloud environment,” in Emerging Technologies in Data Mining and Information Security, pp. 261–269, Springer, New York, NY, USA, 2019.

R. SaiSindhu'eja and G. K. Shyam, “An efficient metaheuristic algorithm based feature selection and recurrent neural network for dos attack detection in cloud computing environment,” Applied Soft Computing, vol. 100, Article ID 106997, 2021.

M. T. Nguyen and K. Kim, “Genetic convolutional neural network for intrusion detection systems,” Future Generation Computer Systems, vol. 113, pp. 418–427, 2020.

N. Somu, K. Kirthivasan, and R. Liscano, “An efficient intrusion detection system based on hypergraph-genetic algorithm for parameter optimization and feature selection in support vector machine,” Knowledge-Based Systems, vol. 134, pp. 1–12, 2017.

S. Malhotra, V. Bali, and K. Paliwal, “Genetic programming and k-nearest neighbour classifier based intrusion detection model,” in Proceedings of the 2017 7th International Conference on Cloud Computing, Data Science & EngineeringConfluence, pages, pp. 42–46, IEEE, Noida, India, January 2017.

M. Mayuranathan, M. Murugan, and V. Dhanakoti, “Best features based intrusion detection system by rbm model for detecting ddos in cloud environment,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 3, pp. 3609–3619, 2019.

S. Sharma, A. Gupta, and S. Agrawal, “An intrusion detection system for detecting denial-of-service attack in cloud using artificial bee colony,” in Proceedings of the International Congress on Information and Communication Technology, pp. 137–145, Springer, Bangkok, 'ailand, December 2016.

T. Dash, “A study on intrusion detection using neural networks trained with evolutionary algorithms,” Soft Computing, vol. 21, no. 10, pp. 2687–2700, 2017.

Abd Elaziz, M., Al-qaness, M. A., Dahou, A., Ibrahim, R. A., & Abd El-Latif, A. A. (2023). Intrusion detection approach for cloud and IoT environments using deep learning and Capuchin Search Algorithm. Advances in Engineering Software, 103402.

Donkol, A. A., Hafez, A. G., Hussein, A. I., & Mabrook, M. M. (2023). Optimization of Intrusion Detection Using Likely Point PSO and Enhanced LSTM-RNN Hybrid Technique in communication Networks. IEEE Access.

Mohy-eddine, M., Guezzaz, A., Benkirane, S., & Azrour, M. (2023). An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection. Multimedia Tools and Applications, 1-19.

Pandey, B. K., Veeramanickam, M. R. M., Ahmad, S., Rodriguez, C., & Esenarro, D. (2023). ExpSSOA-Deep maxout: Exponential Shuffled shepherd optimization based Deep maxout network for intrusion detection using big data in cloud computing framework. Computers & Security, 124, 102975.

Kumar, R., Malik, A., & Ranga, V. (2022). An intellectual intrusion detection system using Hybrid Hunger Games Search and Remora Optimization Algorithm for IoT wireless networks. Knowledge-Based Systems, 256, 109762.

Alqahtani, A. S. (2022). FSO-LSTM IDS: Hybrid optimized and ensembled deep-learning network-based intrusion detection system for smart networks. The Journal of Supercomputing, 78(7), 9438-9455.

Vijayan, P. M., & Sundar, S. (2022). Hybrid MQTTNet: An Intrusion Detection System Using Heuristic-Based Optimal Feature Integration and Hybrid Fuzzy with 1DCNN. Cybernetics and Systems, 1-34.

RM, S. P., Maddikunta, P. K. R., Parimala, M., Koppu, S., Gadekallu, T. R., Chowdhary, C. L., & Alazab, M. (2020). An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture. Computer Communications, 160, 139-149.

Davahli, A., Shamsi, M., & Abaei, G. (2020). Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for IoT wireless networks. Journal of Ambient Intelligence and Humanized Computing, 11, 5581-5609.

Kan, X., Fan, Y., Fang, Z., Cao, L., Xiong, N. N., Yang, D., & Li, X. (2021). A novel IoT network intrusion detection approach based on adaptive particle swarm optimization convolutional neural network. Information Sciences, 568, 147-162.

Khare, N., Devan, P., Chowdhary, C. L., Bhattacharya, S., Singh, G., Singh, S., & Yoon, B. (2020). Smo-dnn: Spider monkey optimization and deep neural network hybrid classifier model for intrusion detection. Electronics, 9(4), 692.

N. Moustafa, J. Slay, UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems, in: Military Communications and Information Systems Conference (MilCIS), IEEE, 2015, pp. 1–6. doi: 10.1109/MilCIS.2015.7348942

A. Shiravi, H. Shiravi, M. Tavallaee, A. A. Ghorbani, Toward developing a systematic approach to generate benchmark datasets for 16 intrusion detection, Computers & Security 31 (3) (2012) 357–374. doi:10.1016/j.cose.2011.12.012

A. S. Tanenbaum, D. Wetherall, Computer Networks, 5th Edition, Pearson, 2011

Downloads

Published

30.11.2023

How to Cite

Gangula, R. ., Vutukuru, M. M. ., & M., R. K. . (2023). Hybridization of Bottlenose Dolphin Optimization and Artificial Fish Swarm Algorithm with Efficient Classifier for Detecting the Network Intrusion in Internet of Things (IoT). International Journal of Intelligent Systems and Applications in Engineering, 12(6s), 220–232. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3973

Issue

Section

Research Article