Hybridization of Bottlenose Dolphin Optimization and Artificial Fish Swarm Algorithm with Efficient Classifier for Detecting the Network Intrusion in Internet of Things (IoT)
Keywords:
network intrusion, optimization, convolution neural network, classification, feature selectionAbstract
Due to the current target-oriented assaults aimed at stealing confidential information from a business, Intrusion Detection Systems (IDSs) research is essential in the field of network security. Intrusion classification and detection are difficult yet highly specialised tasks. The accuracy of intrusion detection in network traffic varies for various methods in the current models. The inter domain dispersion disagreement assessment of the current method, unfortunately, has a higher computing complexity as the sample size rises, that might worsen the strategy's capacity in generalise. We suggest a deep transfer learning method based on 1D-CNN for categorising the incursions in order to resolve the issue. Also, a hybrid bottlenose dolphin optimization/artificial fish swarm technique is described for feature selection that can quickly and effectively detect a variety of intrusion behaviours by learning the information associated with typical intrusion characteristics. Using a character that allows the rough set to retain the original dataset's discernibility after reductions, the unique dataset's reductions were computed then utilised to create a neural network for training, improving detection capability. For the purpose of analysis three benchmark dataset such as KDD Cup' 99, NSL-KDD and UNSW-NB15 are used and shows that the suggested Hyb_DOAFS_1D-CNN achieves 96.4% and 99% of accuracy, 92% and 99% of precision, 99% and 97% of recall, 99.4% and 99% of f1-score.
Downloads
References
I. Lee, “'e internet of things for enterprises: an ecosystem, architecture, and iot service business model,” Internet of Hings, vol. 7, Article ID 100078, 2019.
I. Lee, “Internet of things (iot) cybersecurity: literature review and iot cyber risk management,” Future Internet, vol. 12, no. 9, p. 157, 2020.
G. S. Kushwah and V. Ranga, “Voting extreme learning machine based distributed denial of service attack detection in cloud computing,” Journal of Information Security and Applications, vol. 53, Article ID 102532, 2020.
P. Louvieris, N. Clewley, and X. Liu, “Effects-based feature identification for network intrusion detection,” Neurocomputing, vol. 121, pp. 265–273, 2013.
J. Man and G. Sun, “A residual learning-based network intrusion detection system,” Security and Communication Networks, vol. 2021, Article ID 5593435, 9 pages, 2021.
B. Arandian, and A. Chapnevis, “Covid-19 diagnosis using capsule network and fuzzy-means and mayfly optimization algorithm,” BioMed Research International, vol. 2021, Article ID 2295920, 11 pages, 2021.
L. Mohammadpour, T C. Ling, C. L. Sun, and A. Aryanfar, “A Mean Convolutional Layer for Intrusion Detection System,” Security and Communication Networks, vol. 2020, Article ID 8891185, 16 pages, 2020.
B. Zhou and B. Arandian, “An improved cnn architecture to diagnose skin cancer in dermoscopic images based on wildebeest herd optimization algorithm,” Computational Intelligence and Neuroscience, vol. 2021, Article ID 7567870, 9 pages, 2021.
P. Mishra, V. Varadharajan, and U. Tupakula, “Intrusion detection techniques in cloud environment: a survey,” Journal of Network and Computer Applications, vol. 77, pp. 18–47, 2017.
C. Modi, D. Patel, B. Borisanya, A. Patel, and M. Rajarajan, “A novel framework for intrusion detection in cloud,” in Proceedings of the fifth international conference on security of information and networks, Association for Computing Machinery, Jaipur, India, pp. 67–74, October 2012
P. Ghosh, A. Karmakar, J. Sharma, and S. Phadikar, “Cs-pso based intrusion detection system in cloud environment,” in Emerging Technologies in Data Mining and Information Security, pp. 261–269, Springer, New York, NY, USA, 2019.
R. SaiSindhu'eja and G. K. Shyam, “An efficient metaheuristic algorithm based feature selection and recurrent neural network for dos attack detection in cloud computing environment,” Applied Soft Computing, vol. 100, Article ID 106997, 2021.
M. T. Nguyen and K. Kim, “Genetic convolutional neural network for intrusion detection systems,” Future Generation Computer Systems, vol. 113, pp. 418–427, 2020.
N. Somu, K. Kirthivasan, and R. Liscano, “An efficient intrusion detection system based on hypergraph-genetic algorithm for parameter optimization and feature selection in support vector machine,” Knowledge-Based Systems, vol. 134, pp. 1–12, 2017.
S. Malhotra, V. Bali, and K. Paliwal, “Genetic programming and k-nearest neighbour classifier based intrusion detection model,” in Proceedings of the 2017 7th International Conference on Cloud Computing, Data Science & EngineeringConfluence, pages, pp. 42–46, IEEE, Noida, India, January 2017.
M. Mayuranathan, M. Murugan, and V. Dhanakoti, “Best features based intrusion detection system by rbm model for detecting ddos in cloud environment,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 3, pp. 3609–3619, 2019.
S. Sharma, A. Gupta, and S. Agrawal, “An intrusion detection system for detecting denial-of-service attack in cloud using artificial bee colony,” in Proceedings of the International Congress on Information and Communication Technology, pp. 137–145, Springer, Bangkok, 'ailand, December 2016.
T. Dash, “A study on intrusion detection using neural networks trained with evolutionary algorithms,” Soft Computing, vol. 21, no. 10, pp. 2687–2700, 2017.
Abd Elaziz, M., Al-qaness, M. A., Dahou, A., Ibrahim, R. A., & Abd El-Latif, A. A. (2023). Intrusion detection approach for cloud and IoT environments using deep learning and Capuchin Search Algorithm. Advances in Engineering Software, 103402.
Donkol, A. A., Hafez, A. G., Hussein, A. I., & Mabrook, M. M. (2023). Optimization of Intrusion Detection Using Likely Point PSO and Enhanced LSTM-RNN Hybrid Technique in communication Networks. IEEE Access.
Mohy-eddine, M., Guezzaz, A., Benkirane, S., & Azrour, M. (2023). An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection. Multimedia Tools and Applications, 1-19.
Pandey, B. K., Veeramanickam, M. R. M., Ahmad, S., Rodriguez, C., & Esenarro, D. (2023). ExpSSOA-Deep maxout: Exponential Shuffled shepherd optimization based Deep maxout network for intrusion detection using big data in cloud computing framework. Computers & Security, 124, 102975.
Kumar, R., Malik, A., & Ranga, V. (2022). An intellectual intrusion detection system using Hybrid Hunger Games Search and Remora Optimization Algorithm for IoT wireless networks. Knowledge-Based Systems, 256, 109762.
Alqahtani, A. S. (2022). FSO-LSTM IDS: Hybrid optimized and ensembled deep-learning network-based intrusion detection system for smart networks. The Journal of Supercomputing, 78(7), 9438-9455.
Vijayan, P. M., & Sundar, S. (2022). Hybrid MQTTNet: An Intrusion Detection System Using Heuristic-Based Optimal Feature Integration and Hybrid Fuzzy with 1DCNN. Cybernetics and Systems, 1-34.
RM, S. P., Maddikunta, P. K. R., Parimala, M., Koppu, S., Gadekallu, T. R., Chowdhary, C. L., & Alazab, M. (2020). An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture. Computer Communications, 160, 139-149.
Davahli, A., Shamsi, M., & Abaei, G. (2020). Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for IoT wireless networks. Journal of Ambient Intelligence and Humanized Computing, 11, 5581-5609.
Kan, X., Fan, Y., Fang, Z., Cao, L., Xiong, N. N., Yang, D., & Li, X. (2021). A novel IoT network intrusion detection approach based on adaptive particle swarm optimization convolutional neural network. Information Sciences, 568, 147-162.
Khare, N., Devan, P., Chowdhary, C. L., Bhattacharya, S., Singh, G., Singh, S., & Yoon, B. (2020). Smo-dnn: Spider monkey optimization and deep neural network hybrid classifier model for intrusion detection. Electronics, 9(4), 692.
N. Moustafa, J. Slay, UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems, in: Military Communications and Information Systems Conference (MilCIS), IEEE, 2015, pp. 1–6. doi: 10.1109/MilCIS.2015.7348942
A. Shiravi, H. Shiravi, M. Tavallaee, A. A. Ghorbani, Toward developing a systematic approach to generate benchmark datasets for 16 intrusion detection, Computers & Security 31 (3) (2012) 357–374. doi:10.1016/j.cose.2011.12.012
A. S. Tanenbaum, D. Wetherall, Computer Networks, 5th Edition, Pearson, 2011
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.