Improving Detection of Intrusion to Internet of Things Network Using Deep Learning and Chaotic Krill Optimization Algorithm

Document Type : Original Article

Authors

1 Faculty of Computer Engineering and Information Technology, Sadjad University, Iran, Mashhad

2 Associate Professor, Faculty of Computer Engineering and Information Technology, Sadjad University, Iran

Abstract

The Internet of Things is a new technology that communicates with the surrounding objects through the Internet and is used for the purpose of remote measurement and control. In the field of Internet of Things (IoT) network security, it is very important to accurately identify the types of attacks on these networks that are launched by zombie hosts under the control of the attacker. In this article, a new neural network is proposed to improve the detection of intrusion into the Internet of Things network based on the ALEXNET convolutional neural network and chaotic krill optimization algorithm (MONANET). In the MONANET network, in order to improve the accuracy in detecting intrusion into the IoT network and not need to manually adjust the parameters, the hyperparameters of the neural network are dynamically selected using the chaotic krill algorithm. The value of the loss function of the validation set obtained from the first training of the neural network model using the Danmini doorbell dataset is considered as the CKH fitness value. The comprehensive performance of the proposed network and GRU, ANN, SVM, LSTM, R-CNN, and APSO-CNN algorithms have been compared in five evaluation indices and 12 times independent experiments. The obtained results show the improvement of intrusion detection to the Internet of Things network. The proposed algorithm has been able to accurately detect %99.89 attacks on the Internet of Things network. The experimental results show the superiority of the proposed method over other knowledge boundary methods in terms of improving classification accuracy.

Keywords


[1] A.Thakkar, R.Lohiya, "A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges." Archives of Computational Methods in Engineering 28, no.4, PP.3211-3243, 2021.
[2] Y.Shah, S.Shamik, "A survey on Classification of Cyber-attacks on IoT and IIoT devices." In 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), PP.0406-0413, IEEE, 2020.
[3] M.V.Kamal, P.Dileep, M.Gayatri, "A Novel Approach for Providing Security for IoT Applications Using Machine Learning and Deep Learning Techniques." In Intelligent Systems and Sustainable Computing, PP.155-164, Springer, Singapore, 2022.
[4] Y.Meidan, M.Bohadana, Y.Mathov, Y.Mirsky, A.Shabtai, D.Breitenbacher, Y.Elovici. "N-baiot—network-based detection of iot botnet attacks using deep autoencoders." IEEE Pervasive Computing 17, no.3, PP.12-22, 2018.
[5] Shah, Zawar, I.Ullah, H.Li, A.Levula, K.Khurshid, "Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey." Sensors 22, no. 3, P.1094, 2022.
[6] M.Mudassir, D.Unal, M.Hammoudeh, F.Azzedin. "Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches." Wireless Communications and Mobile Computing, 2022.
[7] M.A.Khan, K.Salah, "IoT security: Review, blockchain solutions, and open challenges." Future generation computer systems 82, PP.395-411, 2018.
[8] F.Zhu, W.Wu, Y.Zhang, and X.Chen, "Privacy-preserving authentication for general directed graphs in industrial IoT." Information sciences 502, PP.218-228, 2019.
[9]C.Perera, M.Barhamgi, A.K.Bandara, M.Ajmal, B.Price, B.Nuseibeh, "Designing privacy-aware internet of things applications." Information Sciences 512, PP.238-257, 2020.
[10] B.P.Poudel, A.Mustafa, A.Bidram, H.Modares, "Detection and mitigation of cyber-threats in the DC microgrid distributed control system." International Journal of Electrical Power & Energy Systems 120, P.105968, 2020.
[11] M.Vasou Jouybari, E.Ataie, M.Bastam, “An MLP-based Deep Learning Approach for Detecting DDoS Attacks”, Tabriz Journal of Electrical Engineering (TJEE), vol.52, no.3, PP.195-204, 2022.
[12] G.D.L.T.Parra, P.Rad, K.K.R.Choo, N.Beebe, "Detecting Internet of Things attacks using distributed deep learning." Journal of Network and Computer Applications 163, P.102662, 2020.
[13] A.Al Shorman, H.Faris, I.Aljarah, "Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection." Journal of Ambient Intelligence and Humanized Computing 11, no. 7, PP.2809-2825, 2020.
[14] S.Hosseini, B.M.Hasani Zade. "New hybrid method for attack detection using combination of evolutionary algorithms, SVM, and ANN." Computer Networks 173, P.107168, 2020
 [15] محمدهادی قومنجانی، جواد حمیدزاده، "دسته‌بند تک کلاسه مبتنی بر بردارهای پشتیبان برای داده‌های نویزی با استفاده از الگوریتم گروه میگوی آشوبی و تراکم محلی"، مجله مهندسی برق دانشگاه تبریز، جلد 48، شماره 3، صفحات 1325-1315، 1397.‌
[16] X.Kan, Y.Fan, Z.Fang, L.Cao, Neal N. Xiong, D.Yang, X.Li, "A novel IoT network intrusion detection approach based on adaptive particle swarm optimization convolutional neural network." Information Sciences 568, PP.147-162, 2021.