Create an Innovative Intrusion Detection System for the Internet of Things by Improving Feature Weighting Through Heuristics

Authors

  • Amol B. Gadewar Research Scholar, SKNCOE Vadgaon (Bk.), Pune
  • Ritesh V. Patil Principal, PDEA'S College of Engineering Manjari (Bk.), Pune
  • Surendra A. Mahajan Associate Professor, PVGCOET & GKPIOM,Pune

Keywords:

Ensemble Networks, IoT Intrusion Detection Systems, the Internet of Things

Abstract

Recently, the "Internet of Things (IoT)" industry has developed as a tool for developing intelligent models of operation. Real-world applications that rely on the IoT system view privacy and security as major issues. Security issues in IoT-enabled devices pose obstacles to progress in the smart economy. As a result, "Intrusion Detection Systems (IDSs)" tailored to the IoT industries are desperately needed to curb the escalating number of attacks based on the Internet of Things. Because of their limited processing power, memory size, and battery life, traditional IDSs cannot be used in broad IoT-aided networks. Several IDSs have been proposed in academic publications as potential solutions to these issues. However, many IDSs run into problems with false positives and false negatives when looking for anomalies. In order to detect intrusion in the IoT industry and fix the problems with traditional systems, a deep learning ensemble model is suggested. In the first stage, we obtain the raw data from established sources. Consequently, the model is verified using complementary metrics. The proposed approach, on the other hand, not only overcomes the greater detection rate, but also aids in avoiding intrusion from third parties.

Downloads

Download data is not yet available.

References

Bhawana Sharma, Lokesh Sharma, Chhagan Lal, Satyabrata Roy"Anomaly based network intrusion detection for IoT attacks using deep learning technique"Computers and Electrical Engineering, Vol. 107, pp.108626,April 2023.

Tanzila Saba, Amjad Rehman, Tariq Sadad, Hoshang Kolivand, Saeed Ali Bahaj" Anomaly-based intrusion detection system for IoT networks through deep learning model"Computers and Electrical Engineering, Vol. 99, pp.107810,April 2022.

Marwa Keshk, Nickolaos Koroniotis, Nam Pham, Nour Moustafa, Benjamin Turnbull, Albert Y. Zomaya "An explainable deep learning-enabled intrusion detection framework in IoT networks"Information Sciences Vol. 639, pp. 119000,August 2023.

Mohamed Abd Elaziz, Mohammed A.A. Al-qaness , Abdelghani Dahou , Rehab Ali Ibrahim , Ahmed A. Abd El-Latif "Intrusion detection approach for cloud and IoT environments using deep learning and Capuchin Search Algorithm"Advances in Engineering Software, Vol.176, pp. 103402, February 2023.

Monika Vishwakarma, Nishtha Kesswani"DIDS: A Deep Neural Network based real-time Intrusion detection system for IoT"Decision Analytics Journal, Vol. 5, pp.100142,December 2022.

Marta Catillo, Antonio Pecchia, Umberto Villano "CPS-GUARD: Intrusion detection for cyber- physical systems and IoT devices using outlier-aware deep autoencoders"Computers & Security, Vol. 129, pp.103210,June 2023.

Rania A. Elsayed, Reem A. Hamada, Mahmoud I. Abdalla, Shaimaa Ahmed Elsaid"Securing IoT and SDN systems using deep-learning based automatic intrusion detection"Ain Shams Engineering Journal, Vol. 14, Issue 10, pp. 102211,October 2023.

Bhukya Madhu, M. Venu Gopala Char, Ramdas Vankdothu, Arun Kumar Silivery, Veerender Aerranagula"Intrusion detection models for IOT networks via deep learning approaches"Measurement: Sensors Vol. 25, pp.100641,February 2023,

M. Eskandari, Z. H. Janjua, M. Vecchio and F. Antonelli, "Passban IDS: An Intelligent Anomaly-Based Intrusion Detection System for IoT Edge Devices," IEEE Internet of Things Journal, vol. 7, no. 8, pp. 6882-6897, Aug. 2020.

J. Gao et al., "Omni SCADA Intrusion Detection Using Deep Learning Algorithms," in IEEE Internet of Things Journal, vol. 8, no. 2, pp. 951-961, 15 Jan.15, 2021.

R. Mills, A. K. Marnerides, M. Broadbent and N. Race, "Practical Intrusion Detection of Emerging Threats, "IEEE Transactions on Network and Service Management, vol. 19, no. 1, pp. 582-600, March 2022.

M. Mohy-Eddine, A. Guezzaz, S. Benkirane, M. Azrour and Y. Farhaoui, "An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security," in Big Data Mining and Analytics, vol. 6, no. 3, pp. 273-287, September 2023.

M. Zhou, Y. Li, L. Xie and W. Nie, "Maximum Mean Discrepancy Minimization Based Transfer Learning for Indoor WLAN Personnel Intrusion Detection," IEEE Sensors Letters, vol. 3, no. 8, pp. 1-4, Art no. 7500804,Aug. 2019.

M. A. Siddiqi and W. Pak, "Tier-Based Optimization for Synthesized Network Intrusion Detection System," IEEE Access, vol. 10, pp. 108530-108544, 2022.

L. Wang, J. Yang, M. Workman and P. Wan, "Effective algorithms to detect stepping-stone intrusion by removing outliers of packet RTTs," in Tsinghua Science and Technology, vol. 27, no. 2, pp. 432-442, April 2022.

Z. Shi, S. He, J. Sun, T. Chen, J. Chen and H. Dong, "An Efficient Multi-Task Network for Pedestrian Intrusion Detection," IEEE Transactions on Intelligent Vehicles, vol. 8, no. 1, pp. 649-660, Jan. 2023.

Kumbhare, S. , B.Kathole, A. , Shinde, S., “Federated learning aided breast cancer detection with intelligent Heuristic-based deep learning framework”, Biomedical Signal Processing and Control Volume 86, Part A, September 2023, 105080

T. Yu and X. Wang, "Topology Verification Enabled Intrusion Detection for In-Vehicle CAN-FD Networks,"IEEE Communications Letters, vol. 24, no. 1, pp. 227-230, Jan. 2020.

Atul Kathole , Dinesh Chaudhari “Secure Hybrid Approach for Sharing Data Securely in VANET”, Proceeding of International Conference on Computational Science and Applications pp 217–221, © 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

Atul Kathole , Dinesh Chaudhari “Securing the Adhoc Network Data Using Hybrid Malicious Node Detection Approach”, Proceedings of the International Conference on Intelligent Vision and Computing (ICIVC 2021) pp 447–457 © 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

S. Chundong, M. Yaqi, J. Luting, F. Ligang and K. Baohua, "Intrusion-Detection Model Integrating Anomaly with Misuse for Space Information Network," in Journal of Communications and Information Networks, vol. 1, no. 3, pp. 90-96, Oct. 2016.

Atul Kathole , Dinesh Chaudhari “Securing the Adhoc Network Data Using Hybrid Malicious Node Detection Approach”, Proceedings of the International Conference on Intelligent Vision and Computing (ICIVC 2021) pp 447–457 © 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

Y. Zha and J. Li, "CMA: A Reconfigurable Complex Matching Accelerator for Wire-Speed Network Intrusion Detection," IEEE Computer Architecture Letters, vol. 17, no. 1, pp. 33-36, 1 Jan.-June 2018.

Atul B Kathole, Dr.Dinesh N.Chaudhari, "Pros & Cons of Machine learning and Security Methods, "2019.http://gujaratresearchsociety.in/index.php/ JGRS, ISSN: 0374-8588, Volume 21 Issue 4.

M. B. Gorzalczany and F. Rudzinski, "Intrusion Detection in Internet of Things With MQTT Protocol—An Accurate and Interpretable Genetic-Fuzzy Rule- Based Solution," in IEEE Internet of Things Journal, vol. 9, no. 24, pp. 24843-24855, 15 Dec.15, 2022.

G. Abdelmoumin, D. B. Rawat and A. Rahman, "On the Performance of Machine Learning Models for Anomaly-Based Intelligent Intrusion Detection Systems for the Internet of Things," in IEEE Internet of Things Journal, vol. 9, no. 6, pp. 4280-4290, 15 March15, 2022.

Downloads

Published

02.02.2024

How to Cite

Gadewar, A. B. ., Patil, R. V. ., & Mahajan , S. A. . (2024). Create an Innovative Intrusion Detection System for the Internet of Things by Improving Feature Weighting Through Heuristics. International Journal of Intelligent Systems and Applications in Engineering, 12(14s), 661 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4743

Issue

Section

Research Article