Abstract
The Internet of Things (IoT) features multiple device connectivity and breaks the conventional network connectivity limitations like limited wireless range, scalability specific communication protocol dependency, etc. Multiple devices can be connected in an IoT network without significant infrastructure changes and the devices can communicate with each other through variety of protocols, which could be more beneficial in many organizations, consumers, and governments. However, the rapid development of IoT technology requires a secure network as it must access different devices and communication methods. This diversity and heterogeneity make network intrusions more convenient for intruders. IoT network complexity and security flaws increase when a large volume of data is transferred through a network. Intrusion detection systems (IDS) are used to monitor the network behavior for detecting unusual behaviors or intrusions. Numerous machine learning models are used in IDS for classifying network traffic. However, these methods lag in detection performances due to limited feature handling abilities. Thus, in selecting optimal features that correctly indicate the intrusions in the network, optimization models are used in IDSs. However, due to the limited exploration and exploitation ability of conventional optimization algorithms, this research presents a hybrid optimization algorithm using Salp Swarm Optimization and Bee Foraging (SSA-BF) optimization approaches for optimal feature selection. The optimal features are classified using a multiplicative Long Short-Term Memory (MLSTM) network. To check the robustness of the proposed IDS, accuracy, recall, f1-score, and precision metrics are considered for analysis. Simulation results of the proposed IDS exhibited a maximum accuracy of 95.8%, better than conventional Auto Encoder, Convolutional Neural Network, Gaussian mixture model with Generative adversarial Network, Multi-CNN, and DeepNet-based IDSs.
Similar content being viewed by others
References
Haghi M, Neubert S, Geissler A, Fleischer H, Stoll N, Stoll R and Thurow K 2020 A flexible and pervasive IoT-based healthcare platform for physiological and environmental parameters monitoring. IEEE Internet of Things J. 7(6): 5628–5647
Wenjin Y, Liu Y, Dillon T, Rahayu W and Mostafa F 2022 An integrated framework for health state monitoring in a smart factory employing IoT and big data techniques. IEEE Internet of Things J. 9(3): 2443–2454
Zhu F, Lv Y, Chen Y, Wang X, Xiong G and Wang F-Y 2020 Parallel transportation systems: toward IoT-Enabled smart urban traffic control and management. IEEE Trans. Intell. Transp. Syst. 21(10): 4063–4071
Lv Z, Bin H and Lv H 2020 Infrastructure monitoring and operation for smart cities based on IoT system. IEEE Trans. Ind. Inform. 16(3): 1957–1962
Lesi V, Jakovljevic Z and Pajic M 2022 Security analysis for distributed IoT-based industrial automation. IEEE Trans. Autom. Sci. Eng. 19(4): 3093–3108
Ayaz M, Ammad-Uddin M, Sharif Z, Mansour A and Aggoune E M 2019 Internet-of-Things (IoT)-based smart agriculture: toward making the fields talk. IEEE Access 7: 129551–129583
Kang J J, Yang W, Dermody G, Ghasemian M, Adibi S and Haskell-Dowland P 2020 No soldiers left behind: an IoT-based low-power military mobile health system design. IEEE Access 8: 201498–201515
Baccour E, Mhaisen N, Abdellatif A A, Erbad A, Mohamed A, Hamdi M and Guizani M 2022 Pervasive AI for IoT applications: A survey on resource-efficient distributed artificial intelligence. IEEE Commun. Surv. Tutor. 24(4): 2366–2418
Naseer S, Saleem Y, Khalid S, Bashir M K, Han J, Iqbal M M and Han K 2018 Enhanced network anomaly detection based on deep neural networks. IEEE Access 6: 48231–48246
Li L, Yang Y, Bai S, Hou Y and Chen X 2018 An effective two-step intrusion detection approach based on binary classification and k -NN. IEEE Access 6: 12060–12073
Xiaofei Q, Yang L, Guo K, Sun M, Ma L, Feng T, Ren S, Li K and Ma X 2020 Direct batch growth hierarchical self-organizing mapping based on statistics for efficient network intrusion detection. IEEE Access 8: 42251–42260
Injadat M N, Moubayed A, Nassif A B and Shami A 2021 Multi-stage optimized machine learning framework for network intrusion detection. IEEE Trans. Netw. Serv. Manag. 18(2): 1803–1816
Liang H, Liu D, Zeng X and Ye C 2023 An intrusion detection method for advanced metering infrastructure system based on federated learning. J. Mod. Power Syst. Clean Energy 11(3): 927–937
Sun Y, Esaki H and Ochiai H 2021 Adaptive intrusion detection in the networking of large-scale LANs with segmented federated learning. IEEE Open J. Commun. Soc. 2: 102–112
Liang W, Hu Y, Zhou X, Pan Y, Kevin I and Wang K 2022 Variational few-shot learning for microservice-oriented intrusion detection in distributed industrial IoT. IEEE Trans. Ind. Inform. 18(8): 5087–5095
Hussen N, Elghamrawy S M, Salem M and El-Desouky A I 2023 A fully streaming big data framework for cyber security based on optimized deep learning algorithm. IEEE Access 11: 65675–65688
Wei P, Li Y, Zhang Z, Tao H, Li Z and Liu D 2019 An optimization method for intrusion detection classification model based on deep belief network. IEEE Access 7: 87593–87605
Ding W, Nayak J, Naik B, Pelusi D and Mishra M 2021 Fuzzy and real-coded chemical reaction optimization for intrusion detection in industrial big data environment. IEEE Trans. Ind. Inform. 17(6): 4298–4307
Samuel Manoharan J 2021 Study of variants of extreme learning machine (ELM) brands and its performance measure on classification algorithm. J. Soft Comput. Paradigm. 3(2): 83–95
Tang Y and Li C 2021 An online network intrusion detection model based on improved regularized extreme learning machine. IEEE Access 9: 94826–94844
Tao L and Xueqiang M 2023 Hybrid strategy improved sparrow search algorithm in the field of intrusion detection. IEEE Access 11: 32134–32151
Elhefnawy R, Abounaser H and Badr A 2020 A hybrid nested genetic-fuzzy algorithm framework for intrusion detection and attacks. IEEE Access 8: 98218–98233
Okey O D, Melgarejo D C, Saadi M, Rosa R L, Kleinschmidt J H and Rodríguez D Z 2023 Transfer learning approach to IDS on cloud IoT Devices using optimized CNN. IEEE Access 11: 1023–1038
Gao X, Shan C, Changzhen H, Niu Z and Liu Z 2019 An adaptive ensemble machine learning model for intrusion detection. IEEE Access 7: 82512–82521
Raza A, Munir K, Almutairi M S and Sehar R 2023 Novel class probability features for optimizing network attack detection with machine learning. IEEE Access 11: 98685–98694
Wang M, Zheng K, Yang Y and Wang X 2020 An explainable machine learning framework for intrusion detection systems. IEEE Access 8: 73127–73141
Kim H, Ahn S, Ha W R, Kang H, Kim D S, Kim H K and Paek Y 2021 Panop: mimicry-resistant ANN-based distributed NIDS for IoT networks. IEEE Access 9: 111853–111864
Zhang X, Zhou Y, Pei S, Zhuge J and Chen J 2020 Adversarial examples detection for XSS attacks based on generative adversarial networks. IEEE Access 8: 10989–10996
Salem M and Al-Tamimi A K 2022 A novel threat intelligence detection model using neural networks. IEEE Access 10: 131229–131245
Wang Z and Ghaleb F A 2023 An attention-based convolutional neural network for intrusion detection model. IEEE Access 11: 43116–43127
Yang H and Wang F 2019 Wireless network intrusion detection based on improved convolutional neural network. IEEE Access 7: 64366–64374
Bhardwaj A, Mangat V and Vig R 2020 Hyperband tuned deep neural network with well posed stacked sparse autoencoder for detection of DDoS attacks in cloud. IEEE Access 8: 181916–181929
Lahasan B and Samma H 2022 Optimized deep autoencoder model for internet of things intruder detection. IEEE Access 10: 8434–8448
Yukun W, Lee W W, Zhicheng X and Ni M 2020 Large-scale and robust intrusion detection model combining improved deep belief network with feature-weighted SVM. IEEE Access 8: 98600–98611
Wang Z, Zeng Y, Liu Y and Li D 2021 Deep belief network integrating improved kernel-based extreme learning machine for network intrusion detection. IEEE Access 9: 16062–16091
Alsaleh A and Binsaeedan W 2021 The influence of salp swarm algorithm-based feature selection on network anomaly intrusion detection. IEEE Access 9: 112466–112477
Barhoush M, Abed-alguni B H and Al-qudah N E A 2023 Improved discrete salp swarm algorithm using exploration and exploitation techniques for feature selection in intrusion detection systems. J. Supercomput. 79: 21265–21309
Mazini M, Shirazi B and Mahdavi I 2019 Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. J. King Saud Univ.: Comput. Inf. Sci. 31: 541–553
Tavallaee M, Bagheri E, Lu W and Ghorbani A 2009 A Detailed Analysis of the KDD CUP 99 Data Set. Submitted to Second. In: IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), 2009
Gurung S, Ghose M K and Subedi A 2019 Deep learning approach on network intrusion detection system using NSL-KDD dataset. Int. J. Comput. Netw. Inf. Secur. 3: 8–14
Cui J, Zong L, Xie J and Tang M 2023 A novel multi-module integrated intrusion detection system for high-dimensional imbalanced data. Appl. Intell. 53: 272–288
Li Y, Yingying X, Liu Z, Hou H, Zheng Y, Xin Y, Zhao Y and Cui L 2020 Robust detection for network intrusion of industrial IoT based on multi-CNN fusion. Measurement 154: 1–10
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The author did not receive support from any organization for the submitted work. The author has no relevant financial or non-financial interests to disclose. Since future works are based on the custom codes developed in this work, the code may not be available from the author.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Rajarajan, S., Kavitha, M.G. Enhanced security for IoT networks: a hybrid optimized learning model for intrusion classification. Sādhanā 49, 180 (2024). https://doi.org/10.1007/s12046-024-02535-7
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s12046-024-02535-7