استفاده از الگوریتم رقابت استعماری اصلاح شده به منظور افزایش سرعت و دقت سیستم تشخیص نفوذ هوشمند
محورهای موضوعی : پردازش چند رسانه ای، سیستمهای ارتباطی، سیستمهای هوشمندمحمد نظرپور 1 , نوید نظافتی 2 , سجاد شکوهیار 3
1 - دانشجوی دکتری، مدیریت فناوری اطلاعات، واحد تهران مرکزی، دانشگاه آزاد اسلامی، تهران، ایران
2 - استادیار، گروه مدیریت، دانشگاه شهید بهشتی، تهران، ایران
3 - دانشیار، گروه مدیریت، دانشگاه شهید بهشتی، تهران، ایران.
کلید واژه: فرمولاسیون انطباقی, قانون فازی, الگوریتم ICA, تشخیص حمله, شبکه عصبی,
چکیده مقاله :
در تمام سیستمهای پردازش اطلاعات، شناسایی حملات سایبری یک چالش اصلی محسوب می شود و با شناسایی به موقع حملات میتوان اثرات آن را مسدود یا کم کرد. سیستم اینترنت اشیا نیز از این پدیده مستثنی نبوده و با پیشرفت رو به رشد این فناوری و گسترش زیرساخت های آن، نیاز به سیستم تشخیص نفوذ هوشمند با دقت و سرعت بالا یک امر ضروری است. شبکههای عصبی سیستمهای مدرنی هستند که از روشهای محاسباتی نوین برای یادگیری ماشین، نمایش دانش و در نهایت استفاده از دانش کسبشده برای به حداکثر رساندن پاسخهای خروجی سیستمهای پیچیده استفاده می کنند. یکی از معایب استفاده از آموزش با روش های کلاسیک در شبکه های عصبی، گیرافتادن در نقاط بهینه محلی است. در این مقاله از الگوریتم فراابتکاری رقابت امپریال (ICA) برای آموزش شبکه های عصبی استفاده کرده، نشان دادیم که این الگوریتم در زمینه تشخیص نفوذ در سیستم اینترنت اشیا، می تواند عملکرد بسیار بهتری از منظر سرعت و دقت نسبت به روش های آموزشی کلاسیک داشته باشد .نتایج نشان می دهد روش پیشنهادی دارای دقت 90% می باشد که در مقایسه با روش شبکه عصبی کلاسیک که دارای دقت 75 درصد بوده عملکرد بهتری دارد.
Introduction: In recent decades, rapid development in the world of technology and networks has achieved, also there is a spread of Internet of thing services in all fields over the world. Piracy numbers have increased, also a lot of modern systems were penetrated. Thus the developing information security technologies to detect the new attack become an important requirement.Method: One of the most important information security technologies is an Intrusion Detection System (IDS) that uses machine learning and deep learning techniques to detect anomalies in the network. In all of the information processing systems, detecting cyber-attacks is one of the main challenges and its effects can be blocked or limited by timely detection of attacks. The IoT system is no exception to this phenomenon, and with the high development of this technology and the expansion of its infrastructure, the need for an intelligent intrusion detection system with high accuracy and speed is essential. Neural networks are modern systems and computational methods for machine learning, knowledge representation, and the application of acquired knowledge to maximize the output accuracy of complex systems. Neural networks have already been used to solve many problems related to pattern recognition, data mining, data compression and research is still underway with regards to intrusion detection systems. One of the disadvantages of using training with classical methods in neural networks is getting stuck in local optimal points. In this paper, we use the meta-heuristic algorithm of Imperial competition algorithm (ICA) to train neural networks and show that in the field of intrusion detection in the IoT system, it can show much better accuracy and speed to classical training methods.Results: Results show that our proposed method has 90% accuracy. This method has a better performance in comparison to classical neural network that has 75% accuracy.Discussion: In this article, we will show that the use of imperial competition evolutionary optimization algorithms instead of traditional methods can increase the accuracy of the IDS system. In addition, evolutionary optimization algorithms are zero order and less complicated than gradient methods. Therefore, using this method, in addition to reducing the cost of system implementation, can increase the speed and accuracy of intrusion detection. In addition, from reliability point of view, we will show that the ICA-based systems are more stable in different implementations.
1- Hasan, Mahmudul, et al. "Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches." Internet of Things 7 (2019): 100059.
2- Kotenko, Igor, et al. "Attack detection in IoT critical infrastructures: a machine learning and big data processing approach." 2019 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). IEEE, 2019.
3- Foley, John, Naghmeh Moradpoor, and Henry Ochen. "Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset." Security and Communication Networks 2020 (2020).
4- Doshi, Rohan, Noah Apthorpe, and Nick Feamster. "Machine learning ddos detection for consumer internet of things devices." 2018 IEEE Security and Privacy Workshops (SPW). IEEE, 2018.
5- Syed, Naeem Firdous, et al. "Denial of service attack detection through machine learning for the IoT." Journal of Information and Telecommunication (2020): 1-22.
6- Radi, Sanaz Amirmokhtar, and Sajjad Shokouhyar. "Toward consumer perception of cellphones sustainability: A social media banalytics." Sustainable Production and Consumption 25 (2021): 217-233.
7- Shokohyar, Sajjad, Ehsan Taati, and Sara Zolfaghari. "The Effect of Drivers' Demographic Characteristics on Road Accidents in Different Seasons Using Data Mining." Promet-Traffic&Transportation 29.6 (2017): 555-567.
8- Arabi, Mahsa, Saeed Mansour, and Sajjad Shokouhyar. "Optimizing a warranty–based sustainable product service system using game theory." International Journal of Sustainable Engineering 11.5 (2018): 330-341.
9- Shokouhyar, Sajjad, Mohammad Reza Seddigh, and Farhad Panahifar. "Impact of big data analytics capabilities on supply chain sustainability: A case study of Iran." World Journal of Science, Technology and Sustainable Development (2020).
10- Manimurugan, S., et al. "Effective Attack Detection in Internet of Medical Things Smart Environment Using a Deep Belief Neural Network." IEEE Access 8 (2020): 77396-77404.
11- Latif, Shahid, et al. "A Novel Attack Detection Scheme for the Industrial Internet of Things Using a Lightweight Random N`eural Network." IEEE Access 8 (2020): 89337-89350.
12- Nia, Masoud Ramezani, and Sajjad Shokouhyar. "Analyzing the effects of visual aesthetic of Web pages on users’ responses in online retailing using the VisAWI method." Journal of Research in Interactive Marketing (2020).
13- Shokohyar, Sajjad, Seed Mansour, and Behrooz Karimi. "Simulation-based optimization of ecological leasing: a step toward extended producer responsibility (EPR)." The International Journal of Advanced Manufacturing Technology 66.1 (2013): 159-169.
14- Sharifi, Zahra, and Sajjad Shokouhyar. "Promoting consumer's attitude toward refurbished mobile phones: A social media analytics approach." Resources, Conservation and Recycling 167 (2021): 105398.
15- Alkronz, Eyad Sameh, et al. "Prediction of Whether Mushroom is Edible or Poisonous Using Back-propagation Neural Network." (2019).
16- Wang, Weilin, et al. "Estimation of PM2. 5 concentrations in China using a spatial back propagation neural network." Scientific reports 9.1 (2019): 1-10.
17- Mohammadi, Farzaneh, et al. "Modelling and optimizing pyrene removal from the soil by phytoremediation using response surface methodology, artificial neural networks, and genetic algorithm." Chemosphere 237 (2019): 124486.
18- Azimi, Yousef, Seyed Hasan Khoshrou, and Morteza Osanloo. "Prediction of blast induced ground vibration (BIGV) of quarry mining using hybrid genetic algorithm optimized artificial neural network." Measurement 147 (2019): 106874.
19- Cai, Jianghui, et al. "A Novel Clustering Algorithm Based on DPC and PSO." IEEE Access 8 (2020): 88200-88214.
20- Singh, Shakti, Prachi Chauhan, and NirbhowJap Singh. "Capacity optimization of grid connected solar/fuel cell energy system using hybrid ABC-PSO algorithm." International Journal of Hydrogen Energy (2020).
21- Devarasiddappa, D., M. Chandrasekaran, and R. Arunachalam. "Experimental investigation and parametric optimization for minimizing surface roughness during WEDM of Ti6Al4V alloy using modified TLBO algorithm." Journal of the Brazilian Society of Mechanical Sciences and Engineering 42.3 (2020): 1-18.
22- Qiao, Weibiao, Hossein Moayedi, and Loke Kok Foong. "Nature-inspired hybrid techniques of IWO, DA, ES, GA, and ICA, validated through a k-fold validation process predicting monthly natural gas consumption." Energy and Buildings (2020): 110023.
23- Prithi, S., and S. Sumathi. "LD2FA-PSO: A novel Learning Dynamic Deterministic Finite Automata with PSO algorithm for secured energy efficient routing in Wireless Sensor Network." Ad Hoc Networks 97 (2020): 102024.
24- Kacimi, Mohand Akli, et al. "New mixed-coding PSO algorithm for a self-adaptive and automatic learning of Mamdani fuzzy rules." Engineering Applications of Artificial Intelligence 89 (2020): 103417.
25- Jallal, Mohammed Ali, Samira Chabaa, and Abdelouhab Zeroual. "A novel deep neural network based on randomly occurring distributed delayed PSO algorithm for monitoring the energy produced by four dual-axis solar trackers." Renewable Energy 149 (2020): 1182-1196.
26- Niknam, Taher, Ehsan Azadfarsani, and Masoud Jabbari. "A new hybrid evolutionary algorithm based on new fuzzy adaptive PSO and NM algorithms for distribution feeder reconfiguration." Energy Conversion and Management 54.1 (2012): 7-16.
27- Niknam, Taher, Hassan Doagou Mojarrad, and Majid Nayeripour. "A new fuzzy adaptive particle swarm optimization for non-smooth economic dispatch." Energy 35.4 (2010): 1764-1778.
28- Gao, Liuyang, et al. "Target Signal Extraction Method Based on Enhanced ICA with Reference." Mathematical Problems in Engineering 2019 (2019).
29- Gao, Wei, et al. "A predictive model based on an optimized ANN combined with ICA for predicting the stability of slopes." Engineering with Computers 36.1 (2020): 325-344.
30- Qiao, Weibiao, Hossein Moayedi, and Loke Kok Foong. "Nature-inspired hybrid techniques of IWO, DA, ES, GA, and ICA, validated through a k-fold validation process predicting monthly natural gas consumption." Energy and Buildings (2020): 110023.
31- Kaewwit, Chesada. "High accuracy EEG biometrics identification using ICA and AR model." Journal of Information and Communication Technology 16.2 (2020): 354-373.