{"title":"Blockchain-assisted improved interval type-2 fuzzy deep learning-based attack detection on internet of things driven consumer electronics","authors":"","doi":"10.1016/j.aej.2024.09.117","DOIUrl":null,"url":null,"abstract":"<div><div>The Internet of Things (IoTs) revolutionizes the consumer electronics landscape by presenting a degree of personalization and interactivity that was previously unimaginable. Interconnected devices are now familiar with user characteristics, giving custom skills that improve the user's satisfaction. Still, IoT remains to transform the consumer electronics field; security in IoT becomes critical, and it is utilized by cyber attackers to pose risks to public safety, compromise data privacy, gain unauthorized access, and even disrupt operations. Robust security measures are crucial for maintaining trust in the proliferation and adoption of interconnected technologies, mitigating those risks, protecting sensitive data, and certifying the integrity of the IoT ecosystem. An intrusion detection system (IDS) is paramount in IoT security, as it dynamically monitors device behaviours and network traffic to detect and mitigate any possible cyber threats. Using machine learning (ML) methods and anomaly detection algorithms, IDS can rapidly identify abnormal activities, unauthorized access, or malicious behaviours within the IoT ecosystem, thus preserving the integrity of interconnected devices and networks, safeguarding sensitive data, and protecting against cyber-attacks. This work presents an Improved Crayfish Optimization Algorithm with Interval Type-2 Fuzzy Deep Learning (ICOA-IT2FDL) technique for Intrusion Detection on IoT infrastructure. The main intention of the ICOA-IT2FDL technique is to utilize a hyperparameter-tuned improved deep learning (DL) method for intrusion detection, thereby improving safety in the IoT infrastructure. BC technology can be used to accomplish security among consumer electronics. The ICOA-IT2FDL technique employs a linear scaling normalization (LSN) approach for data normalization. In addition, features are selected using an improved crayfish optimization algorithm (ICOA). This is followed by the ICOA-IT2FDL technique, which applies the interval type-2 fuzzy deep belief network (IT2-FDBN) model to identify intrusions. Finally, the bald eagle search (BES) model strategy improves the intrusion recognition rate. A series of investigations is accomplished to ensure the enhanced accomplishment of the ICOA-IT2FDL model. The experimentation results specified that the ICOA-IT2FDL model shows better recognition results compared to recent models.</div></div>","PeriodicalId":7484,"journal":{"name":"alexandria engineering journal","volume":null,"pages":null},"PeriodicalIF":6.2000,"publicationDate":"2024-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"alexandria engineering journal","FirstCategoryId":"5","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1110016824011529","RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0
Abstract
The Internet of Things (IoTs) revolutionizes the consumer electronics landscape by presenting a degree of personalization and interactivity that was previously unimaginable. Interconnected devices are now familiar with user characteristics, giving custom skills that improve the user's satisfaction. Still, IoT remains to transform the consumer electronics field; security in IoT becomes critical, and it is utilized by cyber attackers to pose risks to public safety, compromise data privacy, gain unauthorized access, and even disrupt operations. Robust security measures are crucial for maintaining trust in the proliferation and adoption of interconnected technologies, mitigating those risks, protecting sensitive data, and certifying the integrity of the IoT ecosystem. An intrusion detection system (IDS) is paramount in IoT security, as it dynamically monitors device behaviours and network traffic to detect and mitigate any possible cyber threats. Using machine learning (ML) methods and anomaly detection algorithms, IDS can rapidly identify abnormal activities, unauthorized access, or malicious behaviours within the IoT ecosystem, thus preserving the integrity of interconnected devices and networks, safeguarding sensitive data, and protecting against cyber-attacks. This work presents an Improved Crayfish Optimization Algorithm with Interval Type-2 Fuzzy Deep Learning (ICOA-IT2FDL) technique for Intrusion Detection on IoT infrastructure. The main intention of the ICOA-IT2FDL technique is to utilize a hyperparameter-tuned improved deep learning (DL) method for intrusion detection, thereby improving safety in the IoT infrastructure. BC technology can be used to accomplish security among consumer electronics. The ICOA-IT2FDL technique employs a linear scaling normalization (LSN) approach for data normalization. In addition, features are selected using an improved crayfish optimization algorithm (ICOA). This is followed by the ICOA-IT2FDL technique, which applies the interval type-2 fuzzy deep belief network (IT2-FDBN) model to identify intrusions. Finally, the bald eagle search (BES) model strategy improves the intrusion recognition rate. A series of investigations is accomplished to ensure the enhanced accomplishment of the ICOA-IT2FDL model. The experimentation results specified that the ICOA-IT2FDL model shows better recognition results compared to recent models.
期刊介绍:
Alexandria Engineering Journal is an international journal devoted to publishing high quality papers in the field of engineering and applied science. Alexandria Engineering Journal is cited in the Engineering Information Services (EIS) and the Chemical Abstracts (CA). The papers published in Alexandria Engineering Journal are grouped into five sections, according to the following classification:
• Mechanical, Production, Marine and Textile Engineering
• Electrical Engineering, Computer Science and Nuclear Engineering
• Civil and Architecture Engineering
• Chemical Engineering and Applied Sciences
• Environmental Engineering