A Novel Approach for Intrusion Detection System in IoT Using Correlation-Based Hybrid Feature Selection and Harris Hawk Optimization Algorithm
Subject Areas : Neural networks and deep learningyashar salami 1 , yaser ebazadeh 2 , Mehdi Hamrang 3 , Nooshin Allahbakhshi 4
1 - Department of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin, Iran.
2 - Department of Computer engineering, Germi Branch, Islamic Azad University, Germi, Iran.
3 - Department of Computer Engineering, Germi Branch, Islamic Azad University, Germi. Iran.
4 - Department of Computer and Information Technology Engineering, Khoy Branch, Islamic Azad University, Khoy, Iran
Keywords: IoT, IDS, Optimization, Algorithm.,
Abstract :
With the rapid growth of the Internet of Things (IoT), the number of devices connected to various networks has significantly increased. These devices generate vast amounts of data and are often deployed in open and unsecured environments, making them vulnerable to various cyber-attacks. Therefore, ensuring the security of IoT networks has become a primary concern for researchers. One of the most effective methods for maintaining network security is using Intrusion Detection Systems (IDS). Intrusion detection monitors and analyzes incoming data to detect suspicious activities and potential attacks. Given the resource constraints of IoT devices and the complexity of the networks, improving the accuracy and efficiency of IDS is crucial. The primary goal of this research is to present a novel and optimized IDS for IoT networks. A hybrid feature selection method has been employed to enhance accuracy and reduce computational complexity, combining correlation-based filtering and wrapper methods using the Harris Hawk Optimization (HHO) algorithm. In this approach, unnecessary features are removed, and essential features for classification are selected. Simulation results indicate that this method has achieved a 96.46% accuracy, outperforming traditional methods such as DT and SVM while improving false positive and false negative rates
[1] M. Wazid, P. Bagga, A. K. Das, S. Shetty, J. J. P. C. Rodrigues, and Y. Park, “AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment,” IEEE Internet Things J., vol. 6, no. 5, pp. 8804–8817, 2019. [2] Y. Salami, V. Khajehvand, and E. Zeinali, “SOS-FCI: a secure offloading scheme in fog–cloud-based IoT,” J. Supercomput., vol. 80, no. 1, pp. 570–600, 2024, doi: 10.1007/s11227-023-05499-3. [3] X. Mu and M. F. Antwi-Afari, “The applications of Internet of Things (IoT) in industrial management: a science mapping review,” Int. J. Prod. Res., vol. 62, no. 5, pp. 1928–1952, 2024. [4] M. Sugar and I. H. Berkovitz, “Fog Computing Conceptual Model,” Adolesc. Psychiatry (Hilversum)., vol. 1, no. 2, pp. 169–178, 2011, doi: 10.2174/2210677411101020169. [5] M. Nassereddine and A. Khang, “Applications of Internet of Things (IoT) in smart cities,” in Advanced IoT technologies and applications in the industry 4.0 digital economy, CRC Press, 2024, pp. 109–136. [6] Y. Salami, V. Khajehvand, and E. Zeinali, “SAIFC: A Secure Authentication Scheme for IOV Based on Fog-Cloud Federation,” Secur. Commun. Networks, vol. 1, pp. 1–19, 2023. [7] A. Rajagopalan et al., “Empowering power distribution: Unleashing the synergy of IoT and cloud computing for sustainable and efficient energy systems,” Results Eng., p. 101949, 2024. [8] Y. Salami, Y. Ebazadeh, and V. Khajehvand, “CE-SKE: cost-effective secure key exchange scheme in Fog Federation,” Iran J. Comput. Sci., vol. 4, no. 3, pp. 1–13, 2021. [9] A. Souri, M. Norouzi, and Y. Alsenani, “A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things,” Cluster Comput., vol. 27, no. 3, pp. 3639–3655, 2024. [10] Y. Salami and S. Hosseini, “BSAMS: Blockchain-Based Secure Authentication Scheme in Meteorological Systems,” Nivar, vol. 47, no. 120–121, pp. 181–197, 2023. [11] Y. Salami, F. Taherkhani, Y. Ebazadeh, M. Nemati, V. Khajehvand, and E. Zeinali, “Blockchain-Based Internet of Vehicles in Green Smart City: Applications and Challenges and Solutions,” Anthropog. Pollut., vol. 7, no. 1, pp. 87–96, 2023. [12] S. C. Vetrivel, R. Maheswari, and T. P. Saravanan, “Industrial IOT: Security Threats and Counter Measures,” in Communication Technologies and Security Challenges in IoT: Present and Future, Springer, 2024, pp. 403–425. [13] Y. Salami, V. Khajevand, and E. Zeinali, “Cryptographic Algorithms: A Review of the Literature, Weaknesses and Open Challenges,” J. Comput. Robot., vol. 16, no. 2, pp. 46–56, 2023. [14] U. D. Maiwada, S. A. Imran, K. U. Danyaro, A. A. Janisar, A. Salameh, and A. B. Sarlan, “Security Concerns of IoT Against DDoS in 5G Systems,” Int. J. Electr. Eng. Comput. Sci., vol. 6, pp. 98–105, 2024. [15] Y. Salami, V. Khajehvand, and E. Zeinali, “A new secure offloading approach for internet of vehicles in fog-cloud federation,” Sci. Rep., vol. 14, no. 1, p. 5576, 2024. [16] Y. Salami and V. Khajehvand, “SMAK-IOV: Secure Mutual Authentication Scheme and Key Exchange Protocol in Fog Based IoV,” J. Comput. Robot., vol. 13, no. 1, pp. 11–20, 2020. [17] Y. Salami, V. Khajehvand, and E. Zeinali, “LSMAK-IOV: Lightweight Secure Mutual AKE Scheme in Fog-Based IoV,” in 2024 10th International Conference on Artificial Intelligence and Robotics (QICAR), IEEE, 2024, pp. 1–5. [18] Z. Wang, J. Li, S. Yang, X. Luo, D. Li, and S. Mahmoodi, “A lightweight IoT intrusion detection model based on improved BERT-of-Theseus,” Expert Syst. Appl., vol. 238, p. 122045, 2024. [19] O. B. J. Rabie, S. Selvarajan, T. Hasanin, A. M. Alshareef, C. K. Yogesh, and M. Uddin, “A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models,” Sci. Rep., vol. 14, no. 1, p. 386, 2024. [20] E. Altulaihan, M. A. Almaiah, and A. Aljughaiman, “Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms,” Sensors, vol. 24, no. 2, p. 713, 2024. [21] M. M. Inuwa and R. Das, “A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on IoT networks,” Internet of Things, vol. 26, p. 101162, 2024. [22] A. Aldhaheri, F. Alwahedi, M. A. Ferrag, and A. Battah, “Deep learning for cyber threat detection in IoT networks: A review,” Internet Things cyber-physical Syst., vol. 4, pp. 110–128, 2024. [23] N. O. Aljehane et al., “Golden jackal optimization algorithm with deep learning assisted intrusion detection system for network security,” Alexandria Eng. J., vol. 86, pp. 415–424, 2024. [24] C. Hazman, A. Guezzaz, S. Benkirane, and M. Azrour, “Enhanced ids with deep learning for iot-based smart cities security,” Tsinghua Sci. Technol., vol. 29, no. 4, pp. 929–947, 2024. [25] D. Li, L. Deng, M. Lee, and H. Wang, “IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning,” Int. J. Inf. Manage., vol. 49, pp. 533–545, 2019. [26] A. Elsaeidy, K. S. Munasinghe, D. Sharma, and A. Jamalipour, “Intrusion detection in smart cities using Restricted Boltzmann Machines,” J. Netw. Comput. Appl., vol. 135, pp. 76–83, 2019. [27] T. Saba, “Intrusion detection in smart city hospitals using ensemble classifiers,” in 2020 13th International Conference on Developments in eSystems Engineering (DeSE), IEEE, 2020, pp. 418–422. [28] E. M. Onyema, S. Dalal, C. A. T. Romero, B. Seth, P. Young, and M. A. Wajid, “Design of intrusion detection system based on cyborg intelligence for security of cloud network traffic of smart cities,” J. Cloud Comput., vol. 11, no. 1, p. 26, 2022. [29] M. M. Rashid et al., “Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications,” Comput. Secur., vol. 120, p. 102783, 2022. [30] M. Abdedaime, A. Qafas, M. Jerry, and A. Guezzaz, “A KNN-based intrusion detection model for smart cities security,” in International Conference on Innovative Computing and Communications: Proceedings of ICICC 2022, Volume 3, Springer, 2022, pp. 265–272. [31] M. Roopak, G. Y. Tian, and J. Chambers, “Multi‐objective‐based feature selection for DDoS attack detection in IoT networks,” IET Networks, vol. 9, no. 3, pp. 120–127, 2020. [32] A. Awajan, “A novel deep learning-based intrusion detection system for IOT networks,” Computers, vol. 12, no. 2, p. 34, 2023.