JNACSISSN:2582-3817

Deep Learning based optimization for Detection of Attacks in IoT

Abstract

Internet of Things (IoT) is an intelligent network which links smart objects to the Internet. A great amount of IoT devices are linking to the Internet, so far a lot of of these devices are apprehensive, exposing them to a number of security threats. Most IoT devices are resource constrained hence making it difficult to secure them using existing security techniques. Numerous researchers have developed intrusion detection model implemented at IoT gateways. In this work, to defend cyberspace a novel detection technique with a novel concept was introduced which helps the deep learning model. Here, the process includes two stages such as classification as well as feature extraction. Initially, the feature extraction is performed, from the subjected input data the extraction of features is carried out with the aid of the well-known Principal Component Analysis (PCA). Then, the extracted features are fed to the classification stage; here the Convolutional Neural network (CNN) model is exploited. The presence of attacks is classified by the classifiers, the attacks such as R2L, denial of service (DoS), U2R as well as a probe. For this, a novel optimization approach is called Hybrid Whale Optimization Algorithm (WOA)-Bat Algorithm (BA). This optimization is mainly exploited to choose optimally the hidden neurons. The developed algorithm performance is analyzed with the existing techniques regarding both the positive as well as negative metrics, and the analysis revealed the superiority of the proposed model.

References

  • Jerry John KponyoJustice Owusu AgyemangJoshua Ofori Boateng,"Lightweight and host-based denial of service (DoS) detection and defense mechanism for resource-constrained IoT devices", Internet of Things, vol.12, 6 November 2020.
  • Bohan LiRenjun YeKen Cai,"A detection mechanism on malicious nodes in IoT", Computer Communications, vol. 151, pp 51-59, 30 December 2019.
  • Fal SadikinTon van DeursenSandeep Kumar,"A ZigBee Intrusion Detection System for IoT using Secure and Efficient Data Collection", vol. 12, Internet of Things,20 October 2020.
  • Quoc-Dung NgoHuy-Trung NguyenDoan-Hieu Nguyen,"A survey of IoT malware and detection methods based on static features", vol. 6, no.4, pp. 280-286, ICT Express,15 May 2020.
  • Francesco CauteruccioLuca CinelliGiancarlo Fortino,"A framework for anomaly detection and classification in Multiple IoT scenarios", Future Generation Computer Systems,vol. 114, pp.322-335, 14 August 2020.
  • A.Vinay, C. AkshayKumar, Gaurav R.Shenoy, K. N. BalasubramanayaMurthy and S.Natarajan, " ORB-PCA Based Feature Extraction Technique for Face Recognition, Procedia Computer Science, vol. 58, pp. 614-621,2015.
  • Sisi LiuIckjai Lee,"Sequence encoding incorporated CNN model for Email document sentiment classification", Applied Soft Computing,13 January 2021.
  • Sameena PathanP. C. SiddalingaswamyTanweer Ali," Automated Detection of Covid-19 from Chest X-ray scans using an optimized CNN architecture", Applied Soft Computing,24 February 2021.
  • Dr.Sivaram Rajeyyagari,"Automatic Speaker Diarization using Deep LSTM in Audio Lecturing of e-Khool Platform", Journal of Networking and Communication Systems, vol.3, no. 4, October 2020.
  • Amit Sarkar,Senthil Murugan T,"Adaptive Cuckoo Search and Squirrel Search Algorithm for Optimal Cluster Head Selection in WSN", Journal of Networking and Communication Systems, vol.2, no. 3, July 2019.