Improving intrusion detection system in the internet of things using a combination of convolutional neural network and cuckoo algorithm
محورهای موضوعی : Computer EngineeringAli Shahriari 1 , Mohammad Davarpour 2 , Mohammad ahmadinia 3
1 - 1Computer Engineering Department, Kerman Branch, Islamic Azad University, Kerman, Iran
2 - Department of Computer Engineering, Semnan Branch, Islamic Azad University, Semnan, Iran
3 - Azad University, Kerman
کلید واژه: Internet of Things, intrusion detection, convolutional neural network, cuckoo algorithm, dimensionality reduction,
چکیده مقاله :
The Internet of Things (IoT) refers to the connection of various devices to each other via the internet. Conceptually, the IoT can be defined as a dynamic, self-configuring network infrastructure based on standards and participatory communication protocols. The main goal of the IoT is to lead towards a better and safer community. However, one of the fundamental challenges in developing the IoT is the issue of security, and intrusion detection systems are one of the main methods to create security in the IoT. On the other hand, Convolutional Neural Network (CNN), with its specific features, is one of the best methods for analyzing network data. This network is a type of deep neural network composed of multiple layers that can ultimately reduce the dimensions of features. Additionally, the cuckoo algorithm has parameters required for configuration in the initial search, which are very few and can naturally and efficiently cope with multi-state problems. In this paper, a new method for intrusion detection in the IoT using CNN and feature selection by the cuckoo algorithm is presented. Simulation results indicate the satisfactory performance of the proposed method.
[1] SAMIRA SARVARI, NOR FAZLIDA MOHD SANI, ZURINA MOHD HANAPI, AND MOHD TAUFIK ABDULLAH, (2020), " An Efficient Anomaly Intrusion Detection Method with Feature Selection and Evolutionary Neural Network ", IEEE Access ,VOLUME 8, ,Digital Object Identifier 10.1109/ACCESS.2020.2986217.
[2] M. H. Ali, B. A. D. Al Mohammed, A. Ismail, and M. F. Zolkipli, ``A new intrusion detection system based on fast learning network and particle swarm optimization,'' IEEE Access, vol. 6, pp. 20255_20261, 2018.
[3] Yun, M. and B. Yuxin. Research on the architecture and key technology of Internet of Things (IoT) applied on smart grid. in Advances in Energy Engineering (ICAEE), 2010 International Conference on. 2010. IEEE.
[4] S. Alharbi, P. Rodriguez, R. Maharaja, P. Iyer, N. Bose, Z. Ye, FOCUS: A Fog computing-based security system for the Internet of Things, CCNC 2018 - 2018 15th IEEE Annu. Consum. Commun. Netw. Conf. 2018-Janua (2018) 1–5. doi:10.1109/CCNC.2018.8319238.
[5] Muder Almiani, Alia AbuGhazleh, Amer Al-Rahayfeh, Saleh Atiewi and Abdul Razaque, (2019), " Deep Recurrent Neural Network for IoT Intrusion Detection System", Simulation Modelling Practice and Theory, doi: https://doi.org/10.1016/j.simpat.2019.102031.
[6] Ahmet Murat Ozbayoglu, Mehmet Ugur Gudelek, and Omer Berat Sezer, (2020), " Deep Learning for Financial applications: A Survey", Preprint submitted to Applied Soft Computing, arXiv:2002.05786v1 [q-fin.ST] 9 Feb 2020.
[7] K. V. V. N. L Sai Kiran, R. N. Kamakshi Devisetty, N. Pavan Kalyan, K. Mukundini, and R. Karthi, (2020), "Building intrusion Detection System for IoT Environment using Machine Learning Techniques", Third International Conference on Computing and Network Communications, Procedia Computer Science 171 (2020) 2372–2379, DOI: 10.1016/j.procs.2020.04.257.
[8] Abdelouahid Derhab, Arwa Aldweesh, Ahmed Z. Emam and Farrukh Aslam Khan, (2020), " Intrusion Detection System for Internet of Things Based on Temporal Convolution Neural Network and Efficient Feature Engineering", Hindawi, Wireless Communications and Mobile Computing, Volume 2020, Article ID 6689134, 16 pages, https://doi.org/10.1155/2020/6689134.
[9] Fal Sadikin, Ton van Deursen, and Sandeep Kumar, (2020), " A Hybrid Zigbee IoT intrusion detection system using secure and efficient data collection", Internet of Things 12 (2020) 100306, https://doi.org/10.1016/j.iot.2020.100306.
[10] K. Mandal, M. Rajkumar, P. Ezhumalai, D. Jayakumar, and R. Yuvarani, (2020), " Improved security using machine learning for IoT intrusion detection system ", Materials Today: Proceedings, https://doi.org/10.1016/j.matpr.2020.10.187.
[11] Z. Ihsan, Yazid Idris and A.H. Abdullah, "Attribute normalization techniques and performance of intrusion classifiers: A comparative analysis", January 2013.
[12] A. S. Joshi, O. Kulkarni, G. M. Kakandikar, and V. M. Nandedkar,`Cuckoo search Optimization_A review,'' Mater. Today, Proc., vol. 4, no. 8, pp. 7262_7269, 2017.
[13] L. A. M. Pereira, D. Rodrigues, T. N. S. Almeida, C. C. O. Ramos, A. N. Souza, X.-S. Yang, and J. P. Papa, (2014), "A Binary Cuckoo Search and its Application for Feature Selection", Studies in Computational Intelligence, DOI: 10.1007/978-3-319-02141-6_7.
[14] Kim, J., Kim, J., Kim, H., Shim, M., & Choi, E. (2020). CNN-based network intrusion detection against denial-of-service attacks. Electronics, 9(6), 916.
[15] A. Hasan, and H. H. A, Theyazn, (2021), " Intrusion Detection System to Advance Internet of Things Infrastructure-Based Deep Learning Algorithms", Hindawi Complexity Volume 2021, Article ID 5579851, 18 pages https://doi.org/10.1155/2021/5579851.
[16] M. Tavallaee, E. Bagheri, W. Lu, A.A. Ghorbani, NRC Publications Archive (NPArC) archives des publications du CNRC ( NPArC ) A Detailed Analysis of the KDD CUP 99 Data Set A Detailed Analysis of the KDD CUP 99 Data Set, (2009).
[17] http://hafiz-cert.com/Services/article/view.aspx?OId=116&PageIndex=0 , 2016.