Abstract
Internet of Things (IoT) involves wide-ranging devices connected through the Internet with an aim to enable coherent communication amongst them without human intervention to realize profuse smart applications which inherently makes our life a lot easier and furthermore productive. These connected devices continuously sense and gather information from surroundings, thereby producing an immense amount of data that cater for big data analytics. In the current era, number of smart devices are increasing rapidly due to the magnificent features they offer. Moreover, public access to the Internet makes the system even more vulnerable to intrusions. Catastrophically, this has fascinated numerous cybercriminals who have turned the IoT ecosystem into a hotbed of illicit activities. Thereupon, implication of Intrusion Detection System (IDS) in IoT is apparent. The literature suggests a number of IDS to address intrusions/attacks in the discipline of IoT. In the current paper, besides Systematic Literature Review of the IDS for IoT environment, a deep learning model with aquila optimization is proposed to predict anomaly using IoTID20, UNSW-NB15–1 and UNSW_2018_IoT_Botnet_Full5pc_4 datasets. The hybrid model that we have developed, uses a combined network structure of convolutional neural network and aquila optimization algorithm. In all of the studies that were carried out, the swarm intelligence-driven deep learning strategy outperformed other, comparable approaches. Based on current findings, it is reasonable to draw the conclusion that the suggested technique offers an efficient method for early anomaly detection and contributes to viable control of anomaly in the IoT environment.
Similar content being viewed by others
Data availability
All data generated or analyzed during this study are included in this published article.
References
Abualigah L, Diabat A, Geem ZW (2020) A comprehensive survey of the harmony search algorithm in clustering applications. Appl Sci 10(11):3827
Albawi S, Mohammed TAM, Alzawi S (2017) Layers of a Convolutional Neural Network. Icet2017, 1–6
Al-Haija AQ, Krichen M, Abu Elhaija W (2022) Machine-learning-based darknet traffic detection system for IoT applications. Electronics 11(4):1–19
Ali MH, Jaber MM, Abd SK, Rehman A, Awan MJ, Damaševičius R, Bahaj SA (2022) Threat analysis and distributed denial of service (DDoS) attack recognition in the internet of things (IoT). Electronics 11(3):494
Alkahtani H, Aldhyani TH (2021) Intrusion detection system to advance internet of things infrastructure-based deep learning algorithms. Complexity 2021:1–18
Alsulami AA, Abu Al-Haija Q, Tayeb A, Alqahtani A (2022) An Intrusion Detection and Classification System for IoT Traffic with Improved Data Engineering. Appl Sci 12(23):12336
Amin SO, Siddiqui MS, Hong CS, Choe J (2009) A novel coding scheme to implement signature-based IDS in IP based Sensor Networks. IFIP/IEEE International Symposium on Integrated Network Management-Workshops: 269–274
Anitha AA, Arockiam L (2021) Ada-IDS: AdaBoost Intrusion Detection System for ICMPv6 based Attacks in Internet of Things. Int J Adv Comput Sci Appl 12(11)
Benkhelifa E, Welsh T, Hamouda W (2018) A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems. IEEE Commun Surv Tutor 20(4):3496–3509
Bhor HN, Kalla M (2020) An Intrusion Detection in Internet of Things: A Systematic Study. International Conference on Smart Electronics and Communication, 939–944
Bostani H, Sheikhan M (2017) Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach. Comput Commun 98:52–71
Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, Faruki P (2019) Network intrusion detection for IoT security based on learning techniques. IEEE Commun Surv Tutor 21(3):2671–2701
Creech G, Hu J (2013) A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns. IEEE Trans Comput 63(4):807–819
Dat-Thinh N, Xuan-Ninh H, Kim-Hung L (2022) MidSiot: a multistage intrusion detection system for internet of things. Wirel Commun Mob Comput 2022:1–15
Disha RA, Waheed S (2022) Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection technique. Cybersecurity 5(1):1–22
Fenanir S, Semchedine F, Harous S, Baadache A (2020) A Semi-supervised Deep Auto-encoder Based Intrusion Detection for IoT. Ing des Syst d’Information 25(5): 569–577
Garcia Ribera E, Martinez Alvarez B, Samuel C, Ioulianou PP, Vassilakis VG (2022) An Intrusion Detection System for RPL-Based IoT Networks. Electronics 11(23), 4041:1–27
Gassais R, Ezzati-Jivan N, Fernandez JM, Aloise D, Dagenais MR (2020) Multi-level host-based intrusion detection system for Internet of things. J Cloud Comput 9:1–16
Gyamfi E, Jurcut A (2022) Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets. Sensors 22(10):3744
Hajiheidari S, Wakil K, Badri M, Navimipour NJ (2019) Intrusion detection systems in the Internet of things: A comprehensive investigation. Comput Netw 160:165–191
Hindy H, Brosset D, Bayne E, Seeam AK, Tachtatzis C, Atkinson R, Bellekens X (2020) A taxonomy of network threats and the effect of current datasets on intrusion detection systems. IEEE Access 8:104650–104675
Javed SH, Ahmad MB, Asif M, Almotiri SH, Masood K, Ghamdi MAA (2022) An intelligent system to detect advanced persistent threats in industrial internet of things (I-IoT). Electronics 11(5):742
Khraisat A, Alazab A (2021) A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity 4:1–27
Khraisat A, Gondal I, Vamplew P, Kamruzzaman J, Alazab A (2019) A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks. Electronics 8(11):1210
Koroniotis N (2020) Designing an effective network forensic framework for the investigation of botnets in the Internet of Things (Doctoral dissertation, UNSW Sydney)
Koroniotis N, Moustafa N (2020). Enhancing network forensics with particle swarm and deep learning: The particle deep framework. arXiv preprint arXiv:2005.00722
Koroniotis N, Moustafa N, Sitnikova E, Slay J (2018) Towards developing network forensic mechanism for botnet activities in the IoT based on machine learning techniques. In Mobile Networks and Management: 9th International Conference, MONAMI Melbourne, Australia, 30–44
Koroniotis N, Moustafa N, Sitnikova E, Turnbull B (2019) Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Futur Gener Comput Syst 100:779–796
Koroniotis N, Moustafa N, Sitnikova E (2020) A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework. Futur Gener Comput Syst 110:91–106
Koroniotis N, Moustafa N, Schiliro F, Gauravaram P, Janicke H (2020) A holistic review of cybersecurity and reliability perspectives in smart airports. IEEE Access 8:209802–209834
Krishna E, Arunkumar T (2021) Hybrid particle swarm and gray wolf optimization algorithm for IoT intrusion detection system. Int J Intell Eng Syst 14(4):66–76
Laith A, Dalia Y, Abd EM, Ewees Ahmed A, Al-qaness Mohammed AA, Gandomi Amir H (2021) Aquila optimizer: A novel meta-heuristic optimization algorithm. Comput Ind Eng 157:107250
Le A, Loo J, Chai KK, Aiash M (2016) A specification-based IDS for detecting attacks on RPL-based network topology. Information 7(2):25
Le KH, Nguyen MH, Tran TD, Tran ND (2022) IMIDS: An intelligent intrusion detection system against cyber threats in IoT. Electronics 11(4):524
Maciá-Pérez F, Mora-Gimeno FJ, Marcos-Jorquera D, Gil-Martínez-Abarca JA, Ramos-Morillo H, Lorenzo-Fonseca I (2010) Network intrusion detection system embedded on a smart sensor. IEEE Trans Ind Electron 58(3):722–732
Min E, Long J, Liu Q, Cui J, Chen W (2018) TR-IDS: Anomaly-based intrusion detection through text-convolutional neural network and random forest. Secur Commun Netw 2018:1–9
Moustafa N, Slay J (2015) UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). Military communications and information systems conference, 1–6
Moustafa N, Slay J (2016) The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf Secur J: A Global Perspective 25(1–3):18–31
Moustafa N, Slay J, Creech G (2017) Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks. IEEE Trans Big Data 5(4):481–494
Moustafa N, Creech G, Slay J (2017) Big data analytics for intrusion detection system: Statistical decision-making using finite dirichlet mixture models. Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications 127–156
Qaddoura R, Al-Zoubi A M, Faris H, Almomani I (2021) A multi-layer classification approach for intrusion detection in iot networks based on deep learning. Sensors 21(9):2987
Ramadan RA, Yadav K (2020) A novel hybrid intrusion detection system (IDS) for the detection of internet of things (IoT) network attacks. Ann Emerg Technol Comput (AETiC) 4(5):61–74
Saghezchi FB, Mantas G, Violas MA, de Oliveira Duarte AM, Rodriguez J (2022) Machine learning for DDoS attack detection in industry 4.0 CPPSs. Electronics 11(4):602
Saheed YK, Abiodun AI, Misra S, Holone MK, Colomo-Palacios R (2022) A machine learning-based intrusion detection for detecting internet of things network attacks. Alex Eng J, Elsevier 61(12):9395–9409
Salcedo-Sanz S (2016) Modern meta-heuristics based on nonlinear physics processes: A review of models and design procedures. Phys Rep 655:1–70
Sandhya E, Kumarappan A (2021) Enhancing the Performance of an Intrusion Detection System Using Spider Monkey Optimization in IoT. Int J Intell Eng Syst 14(6):30–39
Sarhan M, Layeghy S, Moustafa N, Portmann M (2021) Netflow datasets for machine learning-based network intrusion detection systems. Big Data Technologies and Applications: 10th EAI International Conference, BDTA 2020, and 13th EAI International Conference on Wireless Internet, 117–135
Sedjelmaci H, Senouci SM, Al-Bahri M (2016) A lightweight anomaly detection technique for low-resource IoT devices: A game-theoretic methodology. IEEE International Conference on Communications (ICC), p 1–6
Sekar R, Gupta A, Frullo J, Shanbhag T, Tiwari A, Yang H, Zhou S (2002) Specification-based anomaly detection: a new approach for detecting network intrusions. ACM conference on Computer and communications security, 265–274
Sicato JCS, Singh SK, Rathore S, Park JH (2020) A comprehensive analyses of intrusion detection system for IoT environment. J Inf Process Syst 16(4):975–990
Song Y, Hyun S, Cheong YG (2021) Analysis of autoencoders for network intrusion detection. Sensors 21(13):4294
Spadaccino P, Cuomo F (2020) Intrusion detection systems for iot: opportunities and challenges offered by edge computing. arXiv preprint arXiv:2012.01174
Syamsuddin I, Barukab OM (2022) SUKRY: Suricata IDS with Enhanced kNN Algorithm on Raspberry Pi for Classifying IoT Botnet Attacks. Electronics 11(5):737
Tharewal S, Ashfaque MW, Banu SS, Uma P, Hassen SM, Shabaz M (2022) Intrusion detection system for industrial Internet of Things based on deep reinforcement learning. Wirel Commun Mob Comput 2022:1–8
Ullah I, Mahmoud HQ (2020) A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks, Goutte C., Zhu X. (eds) Advances in Artificial Intelligence. Canadian AI, Lecture Notes in Computer Science
Ullah I, Mahmoud QH (2020) A scheme for generating a dataset for anomalous activity detection in iot networks. Advances in Artificial Intelligence: 33rd Canadian Conference on Artificial Intelligence, 08–520
Wang J, Kuang Q, Duan S (2015) A new online anomaly learning and detection for large-scale service of internet of thing. Pers Ubiquit Comput 19:1021–1031
Wani A, Khaliq R (2021) SDN-based intrusion detection system for IoT using deep learning classifier (IDSIoT-SDL). CAAI Trans Intell Technol 6(3):281–290
Zarpelão BB, Miani RS, Kawakani CT, de Alvarenga SC (2017) A survey of intrusion detection in Internet of Things. J Netw Comput Appl 84:25–37
Funding
This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
Conflict of interest
The authors declare that they do not have any conflict of interests that influence the work reported in this paper.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Choudhary, V., Tanwar, S. & Choudhury, T. Evaluation of contemporary intrusion detection systems for internet of things environment. Multimed Tools Appl 83, 7541–7581 (2024). https://doi.org/10.1007/s11042-023-15918-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15918-5