Attack Detection in IoT using combined classification and HHO
Subject Areas : Information Technology in Engineering Design (ITED) Journal
محمدحسین Ekhtiari
1
,
mehdi jafari
2
,
Mahdiyeh Eslami
3
1 - Department of Electrical Engineering, Kerman Branch, Islamic Azad University, Kerman, Iran
2 - Department of Electrical Engineering, Kerman Branch, Islamic Azad University, Kerman, Iran
3 - Department of Electrical Engineering, Kerman Branch, Islamic Azad University, Kerman, Iran
Keywords: Anomaly detection, penetration detection, Harris hawks optimization, data mining,
Abstract :
Computer networks are exposed to various types of attacks due to their vulnerability. Due to many characteristics of network traffic, machine learning models are time-consuming to identify attacks. In this article, the aim is to provide a new method to detect the penetration of attacks. The new method for detecting network intrusion is to use machine learning technique and Shahin Harris optimization algorithm in order to increase the accuracy of detection in detecting intrusion in computer networks.The proposed method is that first classification is done with the help of individual classifications and then diagnosis is done using the final classification. The proposed method is tested on the NSL-KDD dataset. Accuracy, recall and correctness criteria are used to evaluate the proposed method. The accuracy of the proposed method is above 98% in the best test mode, and its validity can be confirmed based on comparison with other sources.
1. Fraihat, S.; Makhadmeh, S.; Awad, M.; Al-Betar, M.A.; Al-Redhaei, A. Intrusion detection system for large-scale IoT NetFlow networks using machine learning with modified Arithmetic Optimization Algorithm. Internet Things 2023, 22, 100819. #
2. The Growth in Connected IoT Devices Is Expected to Generate 79.4zb of Data in 2025, according to a New IDC Forecast. 2019. Available online: https://www.businesswire.com/news/home/20190618005012/en/The-Growth-in-Connected-IoT-Devices-is-Expected-to-Generate-79.4ZB-of-Data-in-2025-According-to-a-New-IDC-Forecast (accessed on 1 January 2020).#
3. Pinto, A. Ot/iot Security Report: Rising Iot Botnets and Shifting Ransomware Escalate Enterprise Risk. 2020. Available online: https://www.nozominetworks.com/blog/whatit-needs-to-know-about-ot-io-securitythreats-in-2020/ (accessed on 1 January 2020).#
4. Santhosh Kumar, S.V.N.; Selvi, M.; Kannan, A. A comprehensive survey on machine learning-based intrusion detection systems for secure communication in internet of things. Comput. Intell. Neurosci. 2023, 2023, 8981988. #
5. Kponyo, J.J.; Agyemang, J.O.; Klogo, G.S.; Boateng, J.O. Lightweight and host-based denial of service (DoS) detection and defense mechanism for resource-constrained IoT devices. Internet Things 2020, 12, 100319. #
6. Awajan, A. A novel deep learning-based intrusion detection system for IOT networks. Computers 2023, 12, 34.
7. Si-Ahmed, A.; Al-Garadi, M.A.; Boustia, N. Survey of Machine Learning based intrusion detection methods for Internet of Medical Things. Appl. Soft Comput. 2023, 140, 110227. #
8. Elaziz, M.A.; Al-qaness, M.A.A.; Dahou, A.; Ibrahim, R.A.; El-Latif, A.A.A. Intrusion detection approach for cloud and IoT environments using deep learning and Capuchin Search Algorithm. Adv. Eng. Softw. 2023, 176, 103402. #
9. Halim, Z.; Yousaf, M.N.; Waqas, M.; Sulaiman, M.; Abbas, G.; Hussain, M.; Ahmad, I.; Hanif, M. An effective genetic algorithm-based feature selection method for intrusion detection systems. Comput. Secur. 2021, 110, 102448. #
10. Dubey, G.P.; Bhujade, R.K. Optimal feature selection for machine learning based intrusion detection system by exploiting attribute dependence. Mater. Today Proc. 2021, 47, 6325–6331. #
11. Li, X.; Ren, J. MICQ-IPSO: An effective two-stage hybrid feature selection algorithm for high-dimensional data. Neurocomputing 2022, 501, 328–342. #
12. Unler, A.; Murat, A. A discrete particle swarm optimization method for feature selection in binary classification problems. Eur. J. Oper. Res. 2010, 206, 528–539. #
13. Mafarja, M.; Mirjalili, S. Whale optimization approaches for wrapper feature selection. Appl. Soft Comput. 2018, 62, 441–453.#
14. Zhou, Y.Y.; Cheng, G.; Jiang, S.Q.; Dai, M. Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput. Netw. 2020, 174, 107247. #
15. Hassan, I.H.; Abdullahi, M.; Aliyu, M.M.; Yusuf, S.A.; Abdulrahim, A. An improved binary manta ray foraging optimization algorithm based feature selection and random forest classifier for network intrusion detection. Intell. Syst. Appl. 2022, 16, 200114. #
16. Hsu, H.H.; Hsieh, C.W.; Lu, M.D. Hybrid feature selection by combining filters and wrappers. Expert Syst. #Appl. 2011, 38, 8144–8150.4
17. S. M. Tahsien, H. Karimipour and P. Spachos, "Machine learning based solutions for security of Internet of Things (IoT): A survey," Journal of Network and Computer Applications, vol. 161, 2020, doi: 10.1016/j.jnca.2020.102630 .#
18. Enache, A.C. and Patriciu, V.V., 2014, May. Intrusions detection based on support vector machine optimized with swarm intelligence. In Applied Computational Intelligence and Informatics (SACI), 2014 IEEE 9th International Symposium on (pp. 153-158). IEEE.#
19. Kevric, J., Jukic, S. and Subasi, A., 2017. An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Computing and Applications, 28(1), pp.1051-1058.#
20. D. G. Yong Wang, Xiuxia Tian, Jing Li, "Genetic Algorithm Rule Definition for Denial of Services Network Intrusion Detection," Seoul, 2009.#
21. R. R. Amuthan Prabakar Muniyandia, R. Rajaram, "Network Anomaly Detection by Cascading K-Means Clustering and C4.5 Decision Tree algorithm," in international Conference on Communication Technology and System INDIA 2012, pp. 174–182.#
22. S. S. Manoj Rameshchandra Thakur, "A Multi-Dimensional approach towards Intrusion Detection System," 2013.#
23. S. Chebrolu, Abraham, A. and Thomas, JP, "Feature Deduction and Ensemble Design of Intrusion Detection Systems," Journal of Computers and Security, vol. 24, pp. 295-307, 2005.#
24. C. Chitrakar R., H, "Anomaly detection using Support Vector Machine classification with k-Medoids clustering," presented at the In Proceedings of IEEE Third Asian Himalayas International Conference on Internet (AH-ICI), Asian, 2012.#
25. M. P. Padhy N., Panigrahi R, "The Survey of Data Mining Applications and Feature Scope," International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), vol. 2(3), pp. 43-58, 2012.#
26. D. B. M. JABEZ Ja, "Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach," Bhubaneswar, Odisha, India, 2015.#
27. Borji, Ali. "Combining heterogeneous classifiers for network intrusion detection." In Annual Asian Computing Science Conference, pp. 254-260. Springer, Berlin, Heidelberg, 2007.#
28. Panda, M., Abd Allah, A. M., & Hassanien, A. E. (2021). Developing an efficient feature engineering and machine learning model for detecting IoT-Botnet cyber attacks. IEEE Access, 9, 91038-91052.#
29. Chiba, Z., Abghour, N., Moussaid, K., El Omri, A., & Rida, M. (2019). New anomaly network intrusion detection system in cloud environment based on optimized back propagation neural network using improved genetic algorithm. International Journal of Communication Networks and Information Security, 11(1), 61-84.#
30. Yue, W., Yiming, J., & Julong, L. (2021). A fast deep learning method for network intrusion detection without manual feature extraction. In Journal of Physics: Conference Series (Vol. 1738, No. 1, p. 012127). IOP Publishing.#
31. Nguyen, M. T., & Kim, K. (2020). Genetic convolutional neural network for intrusion detection systems. Future Generation Computer Systems, 113, 418-427.#
32. Majid, Saima, Fayadh Alenezi, Sarfaraz Masood, Musheer Ahmad, Emine Selda Gündüz, and Kemal Polat. "Attention based CNN model for fire detection and localization in real-world images." Expert Systems with Applications 189 (2022): 116114.#
33. Lazzarini, R.; Tianfield, H.; Charissis, V. A stacking ensemble of deep learning models for IoT intrusion detection. Knowl.-Based Syst. 2023, 279, 110941. #
34. Alani, M.M. An explainable efficient flow-based Industrial IoT intrusion detection system. Comput. Electr. Eng. 2023, 108, 108732.#
35. Nizamudeen, S.M.T. Intelligent Intrusion Detection Framework for Multi-Clouds–Iot Environment Using Swarm-Based Deep Learning Classifier. J. Cloud Comput. 2023, 12, 134. #
36. Sharma, B.; Sharma, L.; Lal, C.; Roy, S. Anomaly based network intrusion detection for IoT attacks using deep learning technique. Comput. Electr. Eng. 2023, 107, 108626. #
37. Kareem, S.S.; Mostafa, R.R.; Hashim, F.A.; El-Bakry, H.M. An effective feature selection model using hybrid metaheuristic algorithms for iot intrusion detection. Sensors 2022, 22, 1396. #
38. Mohy-eddine, M.; Guezzaz, A.; Benkirane, S.; Azrour, M. An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection. Multimed. Tools Appl. 2023, 82, 23615–23633. #
39. Liu, X.; Du, Y. Towards Effective Feature Selection for IoT Botnet Attack Detection Using a Genetic Algorithm. Electronics 2023, 12, 1260. #
40. Alweshah, M.; Hammouri, A.; Alkhalaileh, S.; Alzubi, O. Intrusion detection for the internet of things (IoT) based on the emperor penguin colony optimization algorithm. J. Ambient Intell. Humaniz. Comput. 2023, 14, 6349–6366. #