Skip to main content
Log in

Enhanced security for IoT networks: a hybrid optimized learning model for intrusion classification

  • Published:
Sādhanā Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) features multiple device connectivity and breaks the conventional network connectivity limitations like limited wireless range, scalability specific communication protocol dependency, etc. Multiple devices can be connected in an IoT network without significant infrastructure changes and the devices can communicate with each other through variety of protocols, which could be more beneficial in many organizations, consumers, and governments. However, the rapid development of IoT technology requires a secure network as it must access different devices and communication methods. This diversity and heterogeneity make network intrusions more convenient for intruders. IoT network complexity and security flaws increase when a large volume of data is transferred through a network. Intrusion detection systems (IDS) are used to monitor the network behavior for detecting unusual behaviors or intrusions. Numerous machine learning models are used in IDS for classifying network traffic. However, these methods lag in detection performances due to limited feature handling abilities. Thus, in selecting optimal features that correctly indicate the intrusions in the network, optimization models are used in IDSs. However, due to the limited exploration and exploitation ability of conventional optimization algorithms, this research presents a hybrid optimization algorithm using Salp Swarm Optimization and Bee Foraging (SSA-BF) optimization approaches for optimal feature selection. The optimal features are classified using a multiplicative Long Short-Term Memory (MLSTM) network. To check the robustness of the proposed IDS, accuracy, recall, f1-score, and precision metrics are considered for analysis. Simulation results of the proposed IDS exhibited a maximum accuracy of 95.8%, better than conventional Auto Encoder, Convolutional Neural Network, Gaussian mixture model with Generative adversarial Network, Multi-CNN, and DeepNet-based IDSs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7

Similar content being viewed by others

References

  1. Haghi M, Neubert S, Geissler A, Fleischer H, Stoll N, Stoll R and Thurow K 2020 A flexible and pervasive IoT-based healthcare platform for physiological and environmental parameters monitoring. IEEE Internet of Things J. 7(6): 5628–5647

    Article  Google Scholar 

  2. Wenjin Y, Liu Y, Dillon T, Rahayu W and Mostafa F 2022 An integrated framework for health state monitoring in a smart factory employing IoT and big data techniques. IEEE Internet of Things J. 9(3): 2443–2454

    Article  Google Scholar 

  3. Zhu F, Lv Y, Chen Y, Wang X, Xiong G and Wang F-Y 2020 Parallel transportation systems: toward IoT-Enabled smart urban traffic control and management. IEEE Trans. Intell. Transp. Syst. 21(10): 4063–4071

    Article  Google Scholar 

  4. Lv Z, Bin H and Lv H 2020 Infrastructure monitoring and operation for smart cities based on IoT system. IEEE Trans. Ind. Inform. 16(3): 1957–1962

    Article  Google Scholar 

  5. Lesi V, Jakovljevic Z and Pajic M 2022 Security analysis for distributed IoT-based industrial automation. IEEE Trans. Autom. Sci. Eng. 19(4): 3093–3108

    Article  Google Scholar 

  6. Ayaz M, Ammad-Uddin M, Sharif Z, Mansour A and Aggoune E M 2019 Internet-of-Things (IoT)-based smart agriculture: toward making the fields talk. IEEE Access 7: 129551–129583

    Article  Google Scholar 

  7. Kang J J, Yang W, Dermody G, Ghasemian M, Adibi S and Haskell-Dowland P 2020 No soldiers left behind: an IoT-based low-power military mobile health system design. IEEE Access 8: 201498–201515

    Article  Google Scholar 

  8. Baccour E, Mhaisen N, Abdellatif A A, Erbad A, Mohamed A, Hamdi M and Guizani M 2022 Pervasive AI for IoT applications: A survey on resource-efficient distributed artificial intelligence. IEEE Commun. Surv. Tutor. 24(4): 2366–2418

    Article  Google Scholar 

  9. Naseer S, Saleem Y, Khalid S, Bashir M K, Han J, Iqbal M M and Han K 2018 Enhanced network anomaly detection based on deep neural networks. IEEE Access 6: 48231–48246

    Article  Google Scholar 

  10. Li L, Yang Y, Bai S, Hou Y and Chen X 2018 An effective two-step intrusion detection approach based on binary classification and k -NN. IEEE Access 6: 12060–12073

    Article  Google Scholar 

  11. Xiaofei Q, Yang L, Guo K, Sun M, Ma L, Feng T, Ren S, Li K and Ma X 2020 Direct batch growth hierarchical self-organizing mapping based on statistics for efficient network intrusion detection. IEEE Access 8: 42251–42260

    Article  Google Scholar 

  12. Injadat M N, Moubayed A, Nassif A B and Shami A 2021 Multi-stage optimized machine learning framework for network intrusion detection. IEEE Trans. Netw. Serv. Manag. 18(2): 1803–1816

    Article  Google Scholar 

  13. Liang H, Liu D, Zeng X and Ye C 2023 An intrusion detection method for advanced metering infrastructure system based on federated learning. J. Mod. Power Syst. Clean Energy 11(3): 927–937

    Article  Google Scholar 

  14. Sun Y, Esaki H and Ochiai H 2021 Adaptive intrusion detection in the networking of large-scale LANs with segmented federated learning. IEEE Open J. Commun. Soc. 2: 102–112

    Article  Google Scholar 

  15. Liang W, Hu Y, Zhou X, Pan Y, Kevin I and Wang K 2022 Variational few-shot learning for microservice-oriented intrusion detection in distributed industrial IoT. IEEE Trans. Ind. Inform. 18(8): 5087–5095

    Article  Google Scholar 

  16. Hussen N, Elghamrawy S M, Salem M and El-Desouky A I 2023 A fully streaming big data framework for cyber security based on optimized deep learning algorithm. IEEE Access 11: 65675–65688

    Article  Google Scholar 

  17. Wei P, Li Y, Zhang Z, Tao H, Li Z and Liu D 2019 An optimization method for intrusion detection classification model based on deep belief network. IEEE Access 7: 87593–87605

    Article  Google Scholar 

  18. Ding W, Nayak J, Naik B, Pelusi D and Mishra M 2021 Fuzzy and real-coded chemical reaction optimization for intrusion detection in industrial big data environment. IEEE Trans. Ind. Inform. 17(6): 4298–4307

    Article  Google Scholar 

  19. Samuel Manoharan J 2021 Study of variants of extreme learning machine (ELM) brands and its performance measure on classification algorithm. J. Soft Comput. Paradigm. 3(2): 83–95

    Article  Google Scholar 

  20. Tang Y and Li C 2021 An online network intrusion detection model based on improved regularized extreme learning machine. IEEE Access 9: 94826–94844

    Article  Google Scholar 

  21. Tao L and Xueqiang M 2023 Hybrid strategy improved sparrow search algorithm in the field of intrusion detection. IEEE Access 11: 32134–32151

    Article  Google Scholar 

  22. Elhefnawy R, Abounaser H and Badr A 2020 A hybrid nested genetic-fuzzy algorithm framework for intrusion detection and attacks. IEEE Access 8: 98218–98233

    Article  Google Scholar 

  23. Okey O D, Melgarejo D C, Saadi M, Rosa R L, Kleinschmidt J H and Rodríguez D Z 2023 Transfer learning approach to IDS on cloud IoT Devices using optimized CNN. IEEE Access 11: 1023–1038

    Article  Google Scholar 

  24. Gao X, Shan C, Changzhen H, Niu Z and Liu Z 2019 An adaptive ensemble machine learning model for intrusion detection. IEEE Access 7: 82512–82521

    Article  Google Scholar 

  25. Raza A, Munir K, Almutairi M S and Sehar R 2023 Novel class probability features for optimizing network attack detection with machine learning. IEEE Access 11: 98685–98694

    Article  Google Scholar 

  26. Wang M, Zheng K, Yang Y and Wang X 2020 An explainable machine learning framework for intrusion detection systems. IEEE Access 8: 73127–73141

    Article  Google Scholar 

  27. Kim H, Ahn S, Ha W R, Kang H, Kim D S, Kim H K and Paek Y 2021 Panop: mimicry-resistant ANN-based distributed NIDS for IoT networks. IEEE Access 9: 111853–111864

    Article  Google Scholar 

  28. Zhang X, Zhou Y, Pei S, Zhuge J and Chen J 2020 Adversarial examples detection for XSS attacks based on generative adversarial networks. IEEE Access 8: 10989–10996

    Article  Google Scholar 

  29. Salem M and Al-Tamimi A K 2022 A novel threat intelligence detection model using neural networks. IEEE Access 10: 131229–131245

    Article  Google Scholar 

  30. Wang Z and Ghaleb F A 2023 An attention-based convolutional neural network for intrusion detection model. IEEE Access 11: 43116–43127

    Article  Google Scholar 

  31. Yang H and Wang F 2019 Wireless network intrusion detection based on improved convolutional neural network. IEEE Access 7: 64366–64374

    Article  Google Scholar 

  32. Bhardwaj A, Mangat V and Vig R 2020 Hyperband tuned deep neural network with well posed stacked sparse autoencoder for detection of DDoS attacks in cloud. IEEE Access 8: 181916–181929

    Article  Google Scholar 

  33. Lahasan B and Samma H 2022 Optimized deep autoencoder model for internet of things intruder detection. IEEE Access 10: 8434–8448

    Article  Google Scholar 

  34. Yukun W, Lee W W, Zhicheng X and Ni M 2020 Large-scale and robust intrusion detection model combining improved deep belief network with feature-weighted SVM. IEEE Access 8: 98600–98611

    Article  Google Scholar 

  35. Wang Z, Zeng Y, Liu Y and Li D 2021 Deep belief network integrating improved kernel-based extreme learning machine for network intrusion detection. IEEE Access 9: 16062–16091

    Article  Google Scholar 

  36. Alsaleh A and Binsaeedan W 2021 The influence of salp swarm algorithm-based feature selection on network anomaly intrusion detection. IEEE Access 9: 112466–112477

    Article  Google Scholar 

  37. Barhoush M, Abed-alguni B H and Al-qudah N E A 2023 Improved discrete salp swarm algorithm using exploration and exploitation techniques for feature selection in intrusion detection systems. J. Supercomput. 79: 21265–21309

    Article  Google Scholar 

  38. Mazini M, Shirazi B and Mahdavi I 2019 Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. J. King Saud Univ.: Comput. Inf. Sci. 31: 541–553

    Google Scholar 

  39. Tavallaee M, Bagheri E, Lu W and Ghorbani A 2009 A Detailed Analysis of the KDD CUP 99 Data Set. Submitted to Second. In: IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), 2009

  40. Gurung S, Ghose M K and Subedi A 2019 Deep learning approach on network intrusion detection system using NSL-KDD dataset. Int. J. Comput. Netw. Inf. Secur. 3: 8–14

    Google Scholar 

  41. Cui J, Zong L, Xie J and Tang M 2023 A novel multi-module integrated intrusion detection system for high-dimensional imbalanced data. Appl. Intell. 53: 272–288

    Article  Google Scholar 

  42. Li Y, Yingying X, Liu Z, Hou H, Zheng Y, Xin Y, Zhao Y and Cui L 2020 Robust detection for network intrusion of industrial IoT based on multi-CNN fusion. Measurement 154: 1–10

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S Rajarajan.

Ethics declarations

Conflict of interest

The author did not receive support from any organization for the submitted work. The author has no relevant financial or non-financial interests to disclose. Since future works are based on the custom codes developed in this work, the code may not be available from the author.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rajarajan, S., Kavitha, M.G. Enhanced security for IoT networks: a hybrid optimized learning model for intrusion classification. Sādhanā 49, 180 (2024). https://doi.org/10.1007/s12046-024-02535-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12046-024-02535-7

Keywords

Navigation