An Optimized Intrusion Detection System Framework for Internet of Things Networks: Integrating Arctic Puffin Optimization and RNN
Subject Areas : Multimedia Processing, Communications Systems, Intelligent Systems
Mohammad Arefi
1
,
Parisa Rahmani
2
*
,
Zoleikha Jahanbakhsh Naghadeh
3
,
Mahdieh Rahmani
4
1 - Department of Computer Engineering, ST.C., Islamic Azad University, Tehran, Iran
2 - Department of Computer Engineering, Par.C., Islamic Azad University, Tehran, Iran
3 - Department of Computer Engineering, ST.C., Islamic Azad University, Tehran, Iran
4 - Department of Electrical Engineering, Iran University of Science and Technology, Tehran, Iran
Keywords: IoT, Machine Learning Algorithm, Network Security, Metaheuristic Algorithms, Intrusion Detection System ,
Abstract :
Over the past few years, significant research has been conducted on the Internet of Things (IoT), with a major challenge being network security and penetration. Security solutions require careful planning and vigilance to safeguard system security and privacy. In this paper, we propose a new hybrid Intrusion Detection System (IDS) based on machine learning and metaheuristic algorithms called IDS-RNNAPO, which has 3 stages: (1) Pre- Processing, (2) Feature Selection, and (3) Attack Detection. In the pre-processing stage, including Cleaning, Visualization, Feature Engineering, and Vectorization. Intrusion Detection Systems (IDS) form a transitional security component of networks that monitor malicious activities within networks. In the feature selection stage, Arctic puffin Optimization (APO) is used, In the attack detection stage, a modified Random Neural Network (RNN) is used, the proposed method is evaluated using the DS2OS dataset. The results have shown that The proposed approach in these experiments through a multiple learning model resulted in an improvement in accuracy to 99.62%.
[1] Chao Chen, Li-Chun Wang, CHIH-Min Yu, (2022), “D2CRP: A Novel Distributed 2-Hop Cluster Routing Protocol for Wireless Sensor Networks” IEEE INTERNET OF THINGS JOURNAL, DOI: 10.1109/JIOT.2022.3148106
[2] MAHDIEH MAAZAAHI, SOODEH HOSSEINI. (2025) “MACHINE LEARNING AND METAHEURISTIC OPTIMIZATION ALGORITHMS FOR FEATURE SELECTION AND BOTNET ATTACK DETECTION” KNOWLEDGE AND INFORMATION SYSTEMS, HTTPS://DOI.ORG/10.1007/S10115-024-02322-0
[3] SANGREZ KHAN A, AHMAD NASEEM ALVI A, MUHAMMAD AWAIS JAVED, YASSER D. AL-OTAIBI, ALI KASHIF BASHIR, (2021), “AN EFFICIENT MEDIUM ACCESS CONTROL PROTOCOL FOR RF ENERGY HARVESTING BASED IOT DEVICES”COMPUTERCOMMUNICATIONS,HTTPS://DOI.ORG/10.1016/J.COMCOM.2021.02.011.
[4] SAMIRA RAJABI, SAMANE ASGARI, SHAHRAM JAMALI, REZA FOTOHI, (2024), “AN INTRUSION DETECTION SYSTEM USING THE ARTIFICIAL NEURAL NETWORK‑BASED APPROACH AND FIREFLY ALGORITHM” WIRELESS PERSONAL COMMUNICATIONS, HTTPS://DOI.ORG/10.1007/S11277-024-11505-5
[5] SHAHID LATIF, ZHUO ZOU, ZEBA IDREES, JAWAD AHMAD, (2020), “Novel Attack Detection Scheme for the Industrial Internet of Things using a Lightweight Random Neural Network” IEEE Access Digital Object Identifier 10.1109/ACCESS.2020.2994079
[6] ZHENDONG WANG, XIN YANG, ZHIYUAN ZENG, DAOJING HE, SAMMY CHAN, (2024), “A HIERARCHICAL HYBRID INTRUSION DETECTION MODEL FOR INDUSTRIAL INTERNET OF THINGS” PEER-TO-PEER NETWORKING AND APPLICATIONS, HTTPS://DOI.ORG/10.1007/S12083-024-01749-0
[7] SAYEDA SUAIBA ANWAR, ASADUZZMAN, IQBAL H. SARKER, (2024), “A DIFFERENTIAL PRIVACY AIDED DEEPFED INTRUSION DETECTION SYSTEM FOR IOT APPLICATIONS” SECURITY PRIVACY, HTTPS://DOI.ORG/10.1002/SPY2.445
[8] WEN-CHUAN WANG, WEI-CAN TIAN, DONG-MEI XU , HONG-FEI ZANG., (2024), “ARCTIC PUFFIN OPTIMIZATION: A BIO-INSPIRED METAHEURISTIC ALGORITHM FOR SOLVING ENGINEERING DESIGN OPTIMIZATION” ADVANCES IN ENGINEERING SOFTWARE, HTTPS://DOI.ORG/10.1016/J.ADVENGSOFT.2024.103694
[9] ZHENDONG WANG, XIN YANG, ZHIYUAN ZENG, DAOJING HE, SAMMY CHAN, (2024), “A HIERARCHICAL HYBRID INTRUSION DETECTION MODEL FOR INDUSTRIAL INTERNET OF THINGS” PEER-TO-PEER NETWORKING AND APPLICATIONS, HTTPS://DOI.ORG/10.1007/S12083-024-01749-0
[10] CHONGZHOU ZHONG, ARINDAM SARKAR, SARBAJIT MANNA, MOHAMMAD ZUBAIR KHAN, ABDULFATTAH NOORWALI, ASHISH DAS, KOYEL CHAKRABORTY, (2024), “FEDERATED LEARNING‑GUIDED INTRUSION DETECTION AND NEURAL KEY EXCHANGE FOR SAFEGUARDING PATIENT DATA ON THE INTERNET OF MEDICAL THINGS” INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, HTTPS://DOI.ORG/10.1007/S13042-024-02269-2
[11] G. SATHISH KUMAR, K. PREMALATHA, G. UMA MAHESHWARI, P. RAJESH KANNA. (2023), “NO MORE PRIVACY CONCERN: A PRIVACY-CHAIN BASED HOMOMORPHIC ENCRYPTION SCHEME AND STATISTICAL METHOD FOR PRIVACY PRESERVATION OF USER’S PRIVATE AND SENSITIVE DATA” EXPERT SYSTEMS WITH APPLICATIONS, HTTPS://DOI.ORG/10.1016/J.ESWA.2023.121071
[12] XIAO WANG, LIE DAI, GUANG YANG, (2024), “A NETWORK INTRUSION DETECTION SYSTEM BASED ON DEEP LEARNING IN THE IOT” THE JOURNAL OF SUPERCOMPUTING, HTTPS://DOI.ORG/10.1007/S11227-024-06345-W
[13] G. SATHISH KUMAR, K. PREMALATHA, G. UMA MAHESHWARI, P. RAJESH KANNA, G. VIJAYA, M. NIYAASHINI, (2024), “DIFFERENTIAL PRIVACY SCHEME USING LAPLACE MECHANISM AND STATISTICAL METHOD COMPUTATION IN DEEP NEURAL NETWORK FOR PRIVACY PRESERVATION” ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, HTTPS://DOI.ORG/10.1016/J.ENGAPPAI.2023.107399
[14] ANUVELAVAN SUBRAMANIAM, SURESHKUMAR CHELLADURAI, Stanly Kumar ANDE, SATHIYANDRAKUMAR Srinivasan, (2024), “Securing IOT network with hybrid evolutionary lion intrusion detection system: a composite motion optimization algorithm for feature selection and ensemble classification” JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, https://doi.org/10.1080/0952813X.2024.2342858
[15] M.-O. PAHL and F.-X. AUBET, (2018), “Ds2Os Traffic Traces IOT Traffic Traces Gathered in a The Ds2Os IOT Environment” [Online]. Available: https://www.kaggle.com/francoisxa/ds2ostraffictraces
[16] CHONGZHOU ZHONG, ARINDAM SARKAR, SARBAJIT MANNA, Mohammad ZUBAIR Khan, ABDULFATTAH NOORWALI, Ashish Das, KOYEL Chakraborty, (2024), “Federated learning‑guided intrusion detection and neural key exchange for safeguarding patient data on the internet of medical things” International Journal of Machine Learning and Cybernetics, https://doi.org/10.1007/s13042-024-02269-2
[17] Xiao Wang, Lie Dai, GUANG Yang, (2024), “A network intrusion detection system based on deep learning in the IOT” The Journal of Supercomputing, https://doi.org/10.1007/s11227-024-06345-w