Enhanced security for IoT networks: a hybrid optimized learning model for intrusion classification

S Rajarajan, M G Kavitha
{"title":"Enhanced security for IoT networks: a hybrid optimized learning model for intrusion classification","authors":"S Rajarajan, M G Kavitha","doi":"10.1007/s12046-024-02535-7","DOIUrl":null,"url":null,"abstract":"<p>The Internet of Things (IoT) features multiple device connectivity and breaks the conventional network connectivity limitations like limited wireless range, scalability specific communication protocol dependency, etc. Multiple devices can be connected in an IoT network without significant infrastructure changes and the devices can communicate with each other through variety of protocols, which could be more beneficial in many organizations, consumers, and governments. However, the rapid development of IoT technology requires a secure network as it must access different devices and communication methods. This diversity and heterogeneity make network intrusions more convenient for intruders. IoT network complexity and security flaws increase when a large volume of data is transferred through a network. Intrusion detection systems (IDS) are used to monitor the network behavior for detecting unusual behaviors or intrusions. Numerous machine learning models are used in IDS for classifying network traffic. However, these methods lag in detection performances due to limited feature handling abilities. Thus, in selecting optimal features that correctly indicate the intrusions in the network, optimization models are used in IDSs. However, due to the limited exploration and exploitation ability of conventional optimization algorithms, this research presents a hybrid optimization algorithm using Salp Swarm Optimization and Bee Foraging (SSA-BF) optimization approaches for optimal feature selection. The optimal features are classified using a multiplicative Long Short-Term Memory (MLSTM) network. To check the robustness of the proposed IDS, accuracy, recall, f1-score, and precision metrics are considered for analysis. Simulation results of the proposed IDS exhibited a maximum accuracy of 95.8%, better than conventional Auto Encoder, Convolutional Neural Network, Gaussian mixture model with Generative adversarial Network, Multi-CNN, and DeepNet-based IDSs.</p>","PeriodicalId":21498,"journal":{"name":"Sādhanā","volume":"2012 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sādhanā","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1007/s12046-024-02535-7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The Internet of Things (IoT) features multiple device connectivity and breaks the conventional network connectivity limitations like limited wireless range, scalability specific communication protocol dependency, etc. Multiple devices can be connected in an IoT network without significant infrastructure changes and the devices can communicate with each other through variety of protocols, which could be more beneficial in many organizations, consumers, and governments. However, the rapid development of IoT technology requires a secure network as it must access different devices and communication methods. This diversity and heterogeneity make network intrusions more convenient for intruders. IoT network complexity and security flaws increase when a large volume of data is transferred through a network. Intrusion detection systems (IDS) are used to monitor the network behavior for detecting unusual behaviors or intrusions. Numerous machine learning models are used in IDS for classifying network traffic. However, these methods lag in detection performances due to limited feature handling abilities. Thus, in selecting optimal features that correctly indicate the intrusions in the network, optimization models are used in IDSs. However, due to the limited exploration and exploitation ability of conventional optimization algorithms, this research presents a hybrid optimization algorithm using Salp Swarm Optimization and Bee Foraging (SSA-BF) optimization approaches for optimal feature selection. The optimal features are classified using a multiplicative Long Short-Term Memory (MLSTM) network. To check the robustness of the proposed IDS, accuracy, recall, f1-score, and precision metrics are considered for analysis. Simulation results of the proposed IDS exhibited a maximum accuracy of 95.8%, better than conventional Auto Encoder, Convolutional Neural Network, Gaussian mixture model with Generative adversarial Network, Multi-CNN, and DeepNet-based IDSs.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
增强物联网网络的安全性:用于入侵分类的混合优化学习模型
物联网(IoT)具有多设备连接的特点,打破了传统网络连接的限制,如有限的无线范围、可扩展性、特定通信协议依赖性等。在物联网网络中可以连接多个设备,而无需对基础设施进行重大改动,设备之间可以通过各种协议进行通信,这对许多组织、消费者和政府来说可能更加有利。然而,物联网技术的快速发展需要一个安全的网络,因为它必须接入不同的设备和通信方式。这种多样性和异质性为入侵者的网络入侵提供了更多便利。当大量数据通过网络传输时,物联网网络的复杂性和安全漏洞就会增加。入侵检测系统(IDS)用于监控网络行为,以检测异常行为或入侵。IDS 中使用了大量机器学习模型来对网络流量进行分类。然而,由于处理特征的能力有限,这些方法在检测性能方面存在不足。因此,在选择能正确显示网络入侵的最佳特征时,IDS 使用了优化模型。然而,由于传统优化算法的探索和利用能力有限,本研究提出了一种混合优化算法,使用 Salp Swarm Optimization 和 Bee Foraging(SSA-BF)优化方法进行最佳特征选择。最佳特征使用乘法长短期记忆(MLSTM)网络进行分类。为了检测所提出的 IDS 的鲁棒性,分析中考虑了准确率、召回率、f1-分数和精确度指标。仿真结果表明,所提出的 IDS 的准确率最高可达 95.8%,优于传统的自动编码器、卷积神经网络、高斯混合模型与生成式对抗网络、Multi-CNN 和基于 DeepNet 的 IDS。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Buckling performance optimization of sub-stiffened composite panels with straight and curvilinear sub-stiffeners Transformer-based Pouranic topic classification in Indian mythology Influence of non-stoichiometric solutions on the THF hydrate growth: chemical affinity modelling and visualization Development and analysis of Hastelloy-X alloy butt joint made by laser beam welding Comparative analysis of a remotely-controlled wetland paddy seeder and conventional drum seeder
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1