An adaptive detection framework based on artificial immune for IoT intrusion detection system

IF 7.2 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Applied Soft Computing Pub Date : 2024-08-24 DOI:10.1016/j.asoc.2024.112152
{"title":"An adaptive detection framework based on artificial immune for IoT intrusion detection system","authors":"","doi":"10.1016/j.asoc.2024.112152","DOIUrl":null,"url":null,"abstract":"<div><p>Given the continual evolution of new network attack methodologies, defenders face the imperative of constantly upgrading security defenses. Current security technologies, albeit effective against known threats, often fall short in handling the intricacies of diverse and novel attacks. Artificial immunity-based network anomaly detection offers a promising avenue by dynamically adapting to evolving threats. However, prevailing algorithms in this domain suffer from low detection rates, limited adaptability, and extended detector generation times. This study aims to tackle these challenges by introducing a high-efficiency network anomaly detection framework, emphasizing both high-dimensional feature selection and adaptive detector generation. Our approach begins with an enhanced dual-module hybrid high-dimensional feature selection method, leveraging evolutionary principles. Furthermore, we introduce a self-sample clustering algorithm based on fuzzy clustering during the tolerance stage, enhancing detector tolerance efficiency. Additionally, an adaptive detector generation scheme is devised. It divides the non-boundary sub-population based on non-self differences and evolution, while employing the red fox optimization algorithm in the boundary region. This adaptive approach dynamically adjusts detector positions and radii to derive optimal detectors. Through comprehensive validation using well-established IoT and network anomaly datasets, our proposed artificial immunity-based IoT intrusion detection framework exhibits superior performance. It achieves higher classification accuracy and lower error rates compared to current state-of-the-art machine learning and artificial immunity algorithms.</p></div>","PeriodicalId":50737,"journal":{"name":"Applied Soft Computing","volume":null,"pages":null},"PeriodicalIF":7.2000,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Applied Soft Computing","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1568494624009268","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0

Abstract

Given the continual evolution of new network attack methodologies, defenders face the imperative of constantly upgrading security defenses. Current security technologies, albeit effective against known threats, often fall short in handling the intricacies of diverse and novel attacks. Artificial immunity-based network anomaly detection offers a promising avenue by dynamically adapting to evolving threats. However, prevailing algorithms in this domain suffer from low detection rates, limited adaptability, and extended detector generation times. This study aims to tackle these challenges by introducing a high-efficiency network anomaly detection framework, emphasizing both high-dimensional feature selection and adaptive detector generation. Our approach begins with an enhanced dual-module hybrid high-dimensional feature selection method, leveraging evolutionary principles. Furthermore, we introduce a self-sample clustering algorithm based on fuzzy clustering during the tolerance stage, enhancing detector tolerance efficiency. Additionally, an adaptive detector generation scheme is devised. It divides the non-boundary sub-population based on non-self differences and evolution, while employing the red fox optimization algorithm in the boundary region. This adaptive approach dynamically adjusts detector positions and radii to derive optimal detectors. Through comprehensive validation using well-established IoT and network anomaly datasets, our proposed artificial immunity-based IoT intrusion detection framework exhibits superior performance. It achieves higher classification accuracy and lower error rates compared to current state-of-the-art machine learning and artificial immunity algorithms.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于人工免疫的物联网入侵检测系统自适应检测框架
鉴于新的网络攻击方法不断演变,防御者必须不断升级安全防御系统。当前的安全技术虽然能有效地应对已知威胁,但往往无法应对错综复杂的各种新型攻击。基于人工免疫的网络异常检测能够动态地适应不断变化的威胁,是一条大有可为的途径。然而,该领域的主流算法存在检测率低、适应性有限、检测器生成时间长等问题。本研究旨在通过引入高效网络异常检测框架来应对这些挑战,同时强调高维特征选择和自适应检测器生成。我们的方法首先是利用进化原理,采用增强型双模块混合高维特征选择方法。此外,我们还在容差阶段引入了基于模糊聚类的自采样聚类算法,从而提高了检测器的容差效率。此外,我们还设计了一种自适应检测器生成方案。它根据非自差异和演化来划分非边界子群,同时在边界区域采用红狐优化算法。这种自适应方法可动态调整探测器的位置和半径,以获得最佳探测器。通过使用成熟的物联网和网络异常数据集进行综合验证,我们提出的基于人工免疫的物联网入侵检测框架表现出卓越的性能。与当前最先进的机器学习和人工免疫算法相比,它的分类准确率更高,错误率更低。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Applied Soft Computing
Applied Soft Computing 工程技术-计算机:跨学科应用
CiteScore
15.80
自引率
6.90%
发文量
874
审稿时长
10.9 months
期刊介绍: Applied Soft Computing is an international journal promoting an integrated view of soft computing to solve real life problems.The focus is to publish the highest quality research in application and convergence of the areas of Fuzzy Logic, Neural Networks, Evolutionary Computing, Rough Sets and other similar techniques to address real world complexities. Applied Soft Computing is a rolling publication: articles are published as soon as the editor-in-chief has accepted them. Therefore, the web site will continuously be updated with new articles and the publication time will be short.
期刊最新文献
An effective surrogate-assisted rank method for evolutionary neural architecture search Knowledge graph-driven mountain railway alignment optimization integrating karst hazard assessment Medical image segmentation network based on feature filtering with low number of parameters Robust Chinese Clinical Named Entity Recognition with information bottleneck and adversarial training Clustering based fuzzy classification with a noise cluster in detecting fraud in insurance
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1