Improved perturbation based hybrid firefly algorithm and long short-term memory based intelligent security model for IoT network intrusion detection

IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Computers & Electrical Engineering Pub Date : 2024-12-01 DOI:10.1016/j.compeleceng.2024.109926
Janmenjoy Nayak , Pooja Puspita Priyadarshani , Pandit Byomakesha Dash
{"title":"Improved perturbation based hybrid firefly algorithm and long short-term memory based intelligent security model for IoT network intrusion detection","authors":"Janmenjoy Nayak ,&nbsp;Pooja Puspita Priyadarshani ,&nbsp;Pandit Byomakesha Dash","doi":"10.1016/j.compeleceng.2024.109926","DOIUrl":null,"url":null,"abstract":"<div><div>The widespread implementation of the Internet of Things (IoT) has introduced several potential opportunities and benefits in all aspects of our life. However, regrettably, IoT is also accompanied by a range of vulnerabilities and susceptibility to attacks and anomalies. The primary goal of these attacks is to illicitly acquire confidential information from the system while also causing disruptions in system availability for authorized users. This research introduces an improved Long Short-Term Memory (LSTM) architecture designed to accurately detect attacks in an IoT environment. The hyper-parameters of LSTM are tuned employing a novel Memetic Self Adaptive Firefly Algorithm (MAFA). This research introduced a perturbation operator and integrated it into the proposed MAFA to prevent the occurrence of local optimum solutions in the standard firefly approach. With comparative assessment of the suggested methodology and other competing deep learning (DL) approaches, it has been determined that the proposed method outperforms in different performance measures including F1 score, F2 score, Fbeta score, precision, recall, ROC-AUC score and accuracy. The MAFA-LSTM methodology is superior to all other approaches studied, with an accuracy of 99.99%. It is highly efficient for accurately detecting intrusions in an IoT environment.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"121 ","pages":"Article 109926"},"PeriodicalIF":4.0000,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Electrical Engineering","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0045790624008516","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

Abstract

The widespread implementation of the Internet of Things (IoT) has introduced several potential opportunities and benefits in all aspects of our life. However, regrettably, IoT is also accompanied by a range of vulnerabilities and susceptibility to attacks and anomalies. The primary goal of these attacks is to illicitly acquire confidential information from the system while also causing disruptions in system availability for authorized users. This research introduces an improved Long Short-Term Memory (LSTM) architecture designed to accurately detect attacks in an IoT environment. The hyper-parameters of LSTM are tuned employing a novel Memetic Self Adaptive Firefly Algorithm (MAFA). This research introduced a perturbation operator and integrated it into the proposed MAFA to prevent the occurrence of local optimum solutions in the standard firefly approach. With comparative assessment of the suggested methodology and other competing deep learning (DL) approaches, it has been determined that the proposed method outperforms in different performance measures including F1 score, F2 score, Fbeta score, precision, recall, ROC-AUC score and accuracy. The MAFA-LSTM methodology is superior to all other approaches studied, with an accuracy of 99.99%. It is highly efficient for accurately detecting intrusions in an IoT environment.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
求助全文
约1分钟内获得全文 去求助
来源期刊
Computers & Electrical Engineering
Computers & Electrical Engineering 工程技术-工程:电子与电气
CiteScore
9.20
自引率
7.00%
发文量
661
审稿时长
47 days
期刊介绍: The impact of computers has nowhere been more revolutionary than in electrical engineering. The design, analysis, and operation of electrical and electronic systems are now dominated by computers, a transformation that has been motivated by the natural ease of interface between computers and electrical systems, and the promise of spectacular improvements in speed and efficiency. Published since 1973, Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and electronic systems. The journal publishes papers featuring novel implementations of computers and computational techniques in areas like signal and image processing, high-performance computing, parallel processing, and communications. Special attention will be paid to papers describing innovative architectures, algorithms, and software tools.
期刊最新文献
Editorial Board Improved perturbation based hybrid firefly algorithm and long short-term memory based intelligent security model for IoT network intrusion detection iZKP-AKA: A secure and improved ZKP-AKA protocol for sustainable healthcare BlockGuard: Advancing digital copyright integrity with blockchain technique Reliability-based preventive maintenance scheduling in power generation systems: A lévy flight and chaotic local search-based discrete mayfly algorithm
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1