Skip to main content
Log in

Dynamic distributed generative adversarial network for intrusion detection system over internet of things

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) intelligently facilitates individuals interacting with the real-world applications which forms smart environment through internet connectivity at anywhere anytime (dynamic in nature), the devices in an IoT environment encounters several security threats. To overcome these security challenges numerous state of art approaches have been implemented to ensure the security of IoT appliances, but still innovative methods are desirable. The traditional Machine learning (ML) integrates with deep learning algorithm exhibits a potential of detecting abnormal intrusion patterns by formulating a seamless option for anomaly-based detection. This work proposed a Dynamic Distributed—Generative Adversarial Network (DD-GAN) with Improved Firefly Optimization- Hybrid Deep Learning based Convolutional Neural Network -Adaptive Neuro-Fuzzy Inference System (IFFO-HDLCNN + ANFIS) that takes gain of IoT's power, offers enhanced behavior for efficiently examining the entire traffic which traverses in the IoT. Initially, Synthetic Minority Over-sampling Technique (SMOTE) is engaged for pre-processing of data and then Modified Principal Component Analysis (MPCA) is being applied for feature reduction. The optimal features are selected through the Improve Firefly Optimization (IFFO) for optimum fitness value to enhance the classification accuracy of HDLCNN. Finally the intrusion detection is carried out by HDLCNN + ANFIS model, which is competent in detecting threats. The experimental results have proven that model demonstrates ability to perceive any kind of probable intrusion and anomalous behavior. In comparison to existing methods, the suggested IFFO-HDLCNN + ANFIS algorithm delivers improved intrusion detection performance regarding higher accuracy, precision, recall, f-measure, reduced False Positive Rate (FPR).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3 
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability

The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.

References

  1. Gendreau, A. A., & Moorman, M. (2016, August). Survey of intrusion detection systems towards an end to end secure internet of things. In: 2016 IEEE 4th International conference on future internet of things and cloud (FiCloud) pp. 84–90. IEEE.

  2. Bandyopadhyay, D., & Sen, J. (2011). Internet of things: Applications and challenges in technology and standardization. Wireless personal communications, 58(1), 49–69.

    Article  Google Scholar 

  3. IoT Bots Cause Massive Internet Outage. https://www.beyondtrust.com/blog/iot-bots-cause-october-21st-2016-massive-internet-outage/. Accessed 22 Oct 2016.

  4. Hodo, Elike, et al. 2016 Threat analysis of IoT networks using artificial neural network intrusion detection system.In: 2016 International symposium on networks, computers and communications (ISNCC). IEEE

  5. Li, W., et al. (2019). Designing collaborative blockchained signature-based intrusion detection in IoT environments. Future Generation Computer Systems, 96, 481–489.

    Article  Google Scholar 

  6. Ge, Mengmeng, et al. 2019 Deep learning-based intrusion detection for IoT networks. In: 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE

  7. Ding, Yalei, and Yuqing Zhai. 2018 Intrusion detection system for NSL-KDD dataset using convolutional neural networks. In: Proceedings of the 2018 2nd International conference on computer science and artificial intelligence.

  8. Ferdowsi, A., & Saad, W. (2018). Deep learning for signal authentication and security in massive internet-of-things systems. IEEE Transactions on Communications, 67(2), 1371–1387.

    Article  Google Scholar 

  9. Miyato, Takeru, Toshiki Kataoka, Masanori Koyama, and Yuichi Yoshida. (2018) Spectral normalization for generative adversarial networks. arXiv preprint arXiv:1802.05957 .

  10. Verma, A., & Ranga, V. (2020). Machine learning based intrusion detection systems for IoT applications. Wireless Personal Communications, 111(4), 2287–2310.

    Article  Google Scholar 

  11. Yilmaz, Ibrahim, Rahat Masum, and Ambareen Siraj. 2020 Addressing imbalanced data problem with generative adversarial network for intrusion detection. In: 2020 IEEE 21st International conference on information reuse and integration for data science (IRI). IEEE

  12. Ambusaidi, Mohammed A., et al. 2014 A novel feature selection approach for intrusion detection data classification. In: 2014 IEEE 13th International conference on trust, security and privacy in computing and communications. IEEE

  13. Shu, Dule, et al. 2020 Generative adversarial attacks against intrusion detection systems using active learning. In: Proceedings of the 2nd ACM workshop on wireless security and machine learning

  14. Liu, Caiming, et al. 2011 Research on immunity-based intrusion detection technology for the Internet of Things. In: 2011 Seventh International conference on natural computation. Vol. 1. IEEE

  15. Thanigaivelan, Nanda Kumar, et al. "Distributed internal anomaly detection system for Internet-of-Things." 2016 13th IEEE annual consumer communications & networking conference (CCNC). IEEE, 2016.

  16. Schlegl, Thomas, et al. Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: International conference on information processing in medical imaging. Springer, Cham, 2017.

  17. Vasan, K. K., & Surendiran, B. (2016). Dimensionality reduction using principal component analysis for network intrusion detection. Perspectives in Science, 8, 510–512.

    Article  Google Scholar 

  18. Intrator, Yotam, Gilad Katz, and Asaf Shabtai. Mdgan (2018) Boosting anomaly detection using\\multi-discriminator generative adversarial networks. arXiv preprint arXiv:1810.05221

  19. Seo, Jae-Hyun, and Yong-Hyuk Kim. (2018) Machine-learning approach to optimize smote ratio in class imbalance dataset for intrusion detection. Computational intelligence and neuroscience 2018.

  20. Najeeb, R. F., & Dhannoon, B. N. (2018). A feature selection approach using binary firefly algorithm for network intrusion detection system. ARPN Journal of Engineering and Applied Sciences, 13(6), 2347–2352.

    Google Scholar 

  21. Rahman, Saoreen, et al. 2016 PHY/MAC layer attack detection system using neuro-fuzzy algorithm for IoT network. In: 2016 International conference on electrical, electronics, and optimization techniques (ICEEOT). IEEE

  22. Yao, H., Wang, Q., Wang, L., Zhang, P., Li, M., & Liu, Y. (2019). An Intrusion Detection framework Based on Hybrid Multi-Level Data Mining. International Journal of Parallel Programming, 47(4), 740–758.

    Article  Google Scholar 

  23. P. Toupas, D. Chamou, K. M. Giannoutakis, A. Drosou and D. Tzovaras, 2019 An Intrusion Detection System for Multi-class Classification Based on Deep Neural Networks, In: 2019 18th IEEE International conference on machine learning and applications (ICMLA) pp. 1253–1258, doi: https://doi.org/10.1109/ICMLA.2019.00206.

  24. Tian Dong, Song Li, Han Qiu, Jialiang Lu., 2022, An Interpretable Federated learning based network intrusion Detection framework, cryptography and network security.

  25. Xiong, Wei, et al. 2018 Learning to generate time-lapse videos using multi-stage dynamic generative adversarial networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition.

  26. Yin, Chuanlong, et al. 2018 An enhancing framework for botnet detection using generative adversarial networks. In: 2018 International conference on artificial intelligence and big data (ICAIBD). IEEE

  27. Upasani, N., & Om, H. (2019). A modified neuro-fuzzy classifier and its parallel implementation on modern GPUs for real time intrusion detection. Applied Soft Computing, 82, 105595.

    Article  Google Scholar 

  28. Zhang, H., et al. (2020). An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset. Computer Networks, 177, 107315.

    Article  Google Scholar 

  29. Taguchi, Y. H., and Yoshiki Murakami. "Principal component analysis based feature extraction approach to identify circulating microRNA biomarkers." PloS one 8.6 (2013): e66714.

  30. Pal, A. (2018). Principal Component Analysis of TF-IDF In Click Through Rate Prediction‖. International Journal of New Technology and Research IJNTR, ISSN: 2454-4116, 4(12), 24–26.

    Google Scholar 

  31. Yang, X.-S. (2010). Firefly algorithm, Levy flights and global optimization (pp. 209–218). Research and development in intelligent systems XXVI. Springer.

    Google Scholar 

  32. Kaur, A., Pal, S. K., & Singh, A. P. (2018). Hybridization of K-Means and Firefly Algorithm for intrusion detection system. International Journal of System Assurance Engineering and Management, 9.4, 901–910.

    Google Scholar 

  33. Zhang, L., Shan, L., & Wang, J. (2017). Optimal feature selection using distance-based discrete firefly algorithm with mutual information criterion. Neural Computing and Applications, 28(9), 2795–2808.

    Article  Google Scholar 

  34. Cheung, N. J., Ding, X. M., & Shen, H. B. (2014). Adaptive firefly algorithm: Parameter analysis and its application. PLoS ONE, 9(11), e112634.

    Article  Google Scholar 

  35. Turabieh, H., Mafarja, M., & Mirjalili, S. (2019). Dynamic adaptive network-based fuzzy inference system (D-ANFIS) for the imputation of missing data for Internet of medical Things applications. IEEE Internet of Things Journal, 6(6), 9316–9325.

    Article  Google Scholar 

  36. Shahriar, Md Hasan, et al. 2020 G-ids: Generative adversarial networks assisted intrusion detection system. In: 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE

  37. Aslam, P. M., & Abulaish, M. (2019). Multi-label classification of microblogging texts using convolution neural network. IEEE Access, 7, 68678–68691.

    Article  Google Scholar 

  38. Reyes-Ortiz, J.-L., et al. (2016). Transition-aware human activity recognition using smartphones. Neurocomputing, 171, 754–767.

    Article  Google Scholar 

  39. Ferdowsi, A., & Saad, W. (2019). Generative adversarial networks for distributed intrusion detection in the internet of things. In: 2019 IEEE Global Communications Conference (GLOBECOM) pp. 1–6. IEEE.

  40. Xie, G., Yang, L. T., Yang, Y., Luo, H., Li, R., & Alazab, M. (2021). Threat analysis for automotive CAN networks: A GAN model-based intrusion detection technique. IEEE Transactions on Intelligent Transportation Systems, 22(7), 4467–4477.

    Article  Google Scholar 

Download references

Funding

The authors did not receive support from any organization for the submitted work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Balaji.

Ethics declarations

Conflict of interests

The authors have no relevant financial or non-financial interests to disclose.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Balaji, S., Narayanan, S.S. Dynamic distributed generative adversarial network for intrusion detection system over internet of things. Wireless Netw 29, 1949–1967 (2023). https://doi.org/10.1007/s11276-022-03182-8

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-022-03182-8

Keywords

Navigation