Abstract
Intelligent environments can improve the quality of human existence by reducing inconveniences and maximizing productivity. An Internet of Things (IoT) concept has recently established into a method for making smart atmospheres. Protecting users’ personal information and preventing unauthorized access are paramount in any IoT-based smart ecosystem used in the real world. Smart environment applications face security risks from Internet of Things-based technologies. Accordingly, intrusion detection systems (IDSs) that are adapted to IoT settings are crucial for reducing the risk of attacks that exploit vulnerabilities in the IoT. Due to the inadequate processing and storage abilities of IoT technology and the specific protocols in use, traditional IDSs may not be applicable. In this article, we will discuss the most up-to-date intrusion detection systems (IDSs) for the IoT, with an emphasis on the appropriate approaches, features, and procedures. This research presents a Deep Belief Network (DBN) based Intrusion Detection System (IDS) employing the K-Nearest Neighbor technique for monitoring IoT networks for intrusions (KNN). Step one of this process involved using an Absolute Maximum Scaling (AMS) notion of normalization to the UNSW-NB15 dataset in order to cut down on data loss. This dataset, which consists of both recent attacks and normal network activity, covers nine distinct attack types. The next step was to use Principal Component Analysis (PCA) to minimize the dimensionality (PCA). Additionally, we have compared our method to other state-of-the-art studies. Experiments showed that DBN-KNN was superior to other intrusion detection systems in IoT technology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
softbank-son-iot-1000-devices-2040@ www.techinasia.com,” May 2021. https://www.techinasia.com/softbank-soniot-1000-devices-2040
Ding Y, Chen S, Xu J (2016). Application of deep belief networks for opcode based malware detection. In: Proceedings of IJCNN, pp 3901–3908
Yang D, Rundensteiner EA, Ward MO (2009) Neighbor-based pattern detection for windows over streaming data. In: Proceedings of the 12th international conference on extending database technology: advances in database technology (EDBT), Saint Petersburg, Russia, pp 529–540
Kang MJ, Kang JW (2016) Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11:1–17
Fang J, Guo L, Wang X, Yang N (2007) Ontology-based automatic classification and ranking for web documents. In: IEEE fourth international conference on fuzzy systems and knowledge discovery (FSKD), pp 7695–2874
Tao X, Li Y, Liu B, Shen Y (2012) Semantic labelling for document feature patterns using ontological subjects. In: IEEE/WIC/ACM international conferences on web intelligence and intelligent agent technology, pp 530–534. 978-07695-4880
Manimurugan S, Al-Mutairi S, Aborokbah MM, Chilamkurti N, Ganesan S, Patan R (2020) Effective attack detection in internet of medical things smart environment using a deep belief neural network. IEEE Access 8:77396–77404
Anand P, Singh Y, Selwal A, Alazab M, Tanwar S, Kumar N (2020) IoT vulnerability assessment for sustainable computing: threats, current solutions, and open challenges. IEEE Access 8:168825–168853
Tanwar S, Tyagi S, Kumar S (2018) The role of internet of things and smart grid for the development of a smart city. Intell Commun Comput Technol 19:23–33
Hinton GE (2012). A practical guide to training restricted Boltzmann machines. In: Neural networks: tricks of the trade. Lecture notes in computer science, vol 7700, pp 599–619
Ieracitano C, Adeel A, Morabito FC, Hussain A (2020) A novel statistical analysis and autoencoder driven intelligent intrusion detection approach. Neurocomputing 387:51–62
Pu J, Wang Y, Liu X, Zhang X (2019) STLP-OD: Spatial and temporal label propagation for traffic outlier detection. IEEE Access 7:63036–63044
Mohamed T, Otsuka T, Ito T (2018) Towards machine learning based IoT intrusion detection service. In: Recent trends and future technology in applied intelligence, IEA/AIE 2018, Lecture Notes in Computer Science, vol. 10868, pp 580–585. Springer, Cham
Sharath MN, Rajesh TM, Patil M (2022) Design of optimal metaheuristics based pixel selection with homomorphic encryption technique for video steganography. Int J Inf Technol 14:2265–2274. https://doi.org/10.1007/s41870-022-01005-9
Gupta S et al (2023) Mobility aware load balancing using Kho-Kho optimization algorithm for hybrid Li-Fi and Wi-Fi network. Wireless Netw. https://doi.org/10.1007/s11276-022-03225-0
Mardani A, Mohan P, Raj Mishra A, Ezhumalai P (2023) A fuzzy logic and DEEC protocol-based clustering routing method for wireless sensor networks. AIMS Math 8(4):8310–8331. https://doi.org/10.3934/math.2023419
Ezhumalai P, Prakash M (2022) A deep learning modified neural network (DLMNN) based proficient sentiment analysis technique on Twitter data. J Exp Theor Artif Intell. https://doi.org/10.1080/0952813X.2022.2093405
Mary Rexcy Asha S, Roberts MK (2022) Artificial humming bird with data science enabled stability prediction model for smart grids. Sustain Comput Inf Syst 36. https://doi.org/10.1016/j.suscom.2022.100821
Metwally AM, Gupta MS (2022) Metaheuristics with deep transfer learning enabled detection and classification model for industrial waste management. Chemosphere 136046. https://doi.org/10.1016/j.chemosphere.2022.136046
Sathishkumar VE et al (2022) Deep learning based sentiment analysis and offensive language identification on multilingual code-mixed data. Sci Rep 12:21557. https://doi.org/10.1038/s41598-022-26092-3
Sambath N, Ramanujam V, Ram M (2022) Deep learning enabled cross-lingual search with metaheuristic web-based query optimization model for multi-document summarization. Concurrency Comput Pract Exp. e7476. https://doi.org/10.1002/cpe.7476
Ying Z, Peisong L, Xinheng W (2019) Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access 7:31711–31722
Alotaibi Y, Alghamdi S, Khalafand OI, Nanda AK (2022) Improved metaheuristic-driven energy-aware cluster-based routing scheme for IoT-assisted wireless sensor networks. Sustainability 14:7712. https://doi.org/10.3390/su14137712
Sridevi M, Chandrasekaran S, Lingaiah B (2022) Deep learning approaches for cyberbullying detection and classification on social media. Comput Intell Neurosci 2022. https://doi.org/10.1155/2022/2163458
Fiore U, Palmieri F, Castiglione A, De Santis A (2013) Network anomaly detection with the restricted Boltzmann machine. Neurocomputing 122:13–23
Nix R, Zhang J (2017). Classification of android apps and malware using deep neural networks. In: Proceedings of IJCNN, pp 1871–1878
Nour M, Slay J (2015). UNSW-NB15: a comprehensive data set for network intrusion detection systems. In: Proceedings of IEEE MilCIS, pp 1–6. NSL dataset. https://www.unb.ca/cic/datasets/nsl.html
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Geetha, C., Gilda, A.J., Neelakandan, S. (2023). Deep Belief Network Algorithm-Based Intrusion Detection System in Internet of Things Environments. In: Hasteer, N., McLoone, S., Khari, M., Sharma, P. (eds) Decision Intelligence Solutions. InCITe 2023. Lecture Notes in Electrical Engineering, vol 1080. Springer, Singapore. https://doi.org/10.1007/978-981-99-5994-5_12
Download citation
DOI: https://doi.org/10.1007/978-981-99-5994-5_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-5993-8
Online ISBN: 978-981-99-5994-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)