Skip to main content

Deep Belief Network Algorithm-Based Intrusion Detection System in Internet of Things Environments

  • Conference paper
  • First Online:
Decision Intelligence Solutions (InCITe 2023)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 1080))

Included in the following conference series:

  • 67 Accesses

Abstract

Intelligent environments can improve the quality of human existence by reducing inconveniences and maximizing productivity. An Internet of Things (IoT) concept has recently established into a method for making smart atmospheres. Protecting users’ personal information and preventing unauthorized access are paramount in any IoT-based smart ecosystem used in the real world. Smart environment applications face security risks from Internet of Things-based technologies. Accordingly, intrusion detection systems (IDSs) that are adapted to IoT settings are crucial for reducing the risk of attacks that exploit vulnerabilities in the IoT. Due to the inadequate processing and storage abilities of IoT technology and the specific protocols in use, traditional IDSs may not be applicable. In this article, we will discuss the most up-to-date intrusion detection systems (IDSs) for the IoT, with an emphasis on the appropriate approaches, features, and procedures. This research presents a Deep Belief Network (DBN) based Intrusion Detection System (IDS) employing the K-Nearest Neighbor technique for monitoring IoT networks for intrusions (KNN). Step one of this process involved using an Absolute Maximum Scaling (AMS) notion of normalization to the UNSW-NB15 dataset in order to cut down on data loss. This dataset, which consists of both recent attacks and normal network activity, covers nine distinct attack types. The next step was to use Principal Component Analysis (PCA) to minimize the dimensionality (PCA). Additionally, we have compared our method to other state-of-the-art studies. Experiments showed that DBN-KNN was superior to other intrusion detection systems in IoT technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. softbank-son-iot-1000-devices-2040@ www.techinasia.com,” May 2021. https://www.techinasia.com/softbank-soniot-1000-devices-2040

  2. Ding Y, Chen S, Xu J (2016). Application of deep belief networks for opcode based malware detection. In: Proceedings of IJCNN, pp 3901–3908

    Google Scholar 

  3. Yang D, Rundensteiner EA, Ward MO (2009) Neighbor-based pattern detection for windows over streaming data. In: Proceedings of the 12th international conference on extending database technology: advances in database technology (EDBT), Saint Petersburg, Russia, pp 529–540

    Google Scholar 

  4. Kang MJ, Kang JW (2016) Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11:1–17

    MathSciNet  Google Scholar 

  5. Fang J, Guo L, Wang X, Yang N (2007) Ontology-based automatic classification and ranking for web documents. In: IEEE fourth international conference on fuzzy systems and knowledge discovery (FSKD), pp 7695–2874

    Google Scholar 

  6. Tao X, Li Y, Liu B, Shen Y (2012) Semantic labelling for document feature patterns using ontological subjects. In: IEEE/WIC/ACM international conferences on web intelligence and intelligent agent technology, pp 530–534. 978-07695-4880

    Google Scholar 

  7. Manimurugan S, Al-Mutairi S, Aborokbah MM, Chilamkurti N, Ganesan S, Patan R (2020) Effective attack detection in internet of medical things smart environment using a deep belief neural network. IEEE Access 8:77396–77404

    Article  Google Scholar 

  8. Anand P, Singh Y, Selwal A, Alazab M, Tanwar S, Kumar N (2020) IoT vulnerability assessment for sustainable computing: threats, current solutions, and open challenges. IEEE Access 8:168825–168853

    Article  Google Scholar 

  9. Tanwar S, Tyagi S, Kumar S (2018) The role of internet of things and smart grid for the development of a smart city. Intell Commun Comput Technol 19:23–33

    Google Scholar 

  10. Hinton GE (2012). A practical guide to training restricted Boltzmann machines. In: Neural networks: tricks of the trade. Lecture notes in computer science, vol 7700, pp 599–619

    Google Scholar 

  11. Ieracitano C, Adeel A, Morabito FC, Hussain A (2020) A novel statistical analysis and autoencoder driven intelligent intrusion detection approach. Neurocomputing 387:51–62

    Article  Google Scholar 

  12. Pu J, Wang Y, Liu X, Zhang X (2019) STLP-OD: Spatial and temporal label propagation for traffic outlier detection. IEEE Access 7:63036–63044

    Article  Google Scholar 

  13. Mohamed T, Otsuka T, Ito T (2018) Towards machine learning based IoT intrusion detection service. In: Recent trends and future technology in applied intelligence, IEA/AIE 2018, Lecture Notes in Computer Science, vol. 10868, pp 580–585. Springer, Cham

    Google Scholar 

  14. Sharath MN, Rajesh TM, Patil M (2022) Design of optimal metaheuristics based pixel selection with homomorphic encryption technique for video steganography. Int J Inf Technol 14:2265–2274. https://doi.org/10.1007/s41870-022-01005-9

    Article  Google Scholar 

  15. Gupta S et al (2023) Mobility aware load balancing using Kho-Kho optimization algorithm for hybrid Li-Fi and Wi-Fi network. Wireless Netw. https://doi.org/10.1007/s11276-022-03225-0

    Article  Google Scholar 

  16. Mardani A, Mohan P, Raj Mishra A, Ezhumalai P (2023) A fuzzy logic and DEEC protocol-based clustering routing method for wireless sensor networks. AIMS Math 8(4):8310–8331. https://doi.org/10.3934/math.2023419

  17. Ezhumalai P, Prakash M (2022) A deep learning modified neural network (DLMNN) based proficient sentiment analysis technique on Twitter data. J Exp Theor Artif Intell. https://doi.org/10.1080/0952813X.2022.2093405

    Article  Google Scholar 

  18. Mary Rexcy Asha S, Roberts MK (2022) Artificial humming bird with data science enabled stability prediction model for smart grids. Sustain Comput Inf Syst 36. https://doi.org/10.1016/j.suscom.2022.100821

  19. Metwally AM, Gupta MS (2022) Metaheuristics with deep transfer learning enabled detection and classification model for industrial waste management. Chemosphere 136046. https://doi.org/10.1016/j.chemosphere.2022.136046

  20. Sathishkumar VE et al (2022) Deep learning based sentiment analysis and offensive language identification on multilingual code-mixed data. Sci Rep 12:21557. https://doi.org/10.1038/s41598-022-26092-3

    Article  Google Scholar 

  21. Sambath N, Ramanujam V, Ram M (2022) Deep learning enabled cross-lingual search with metaheuristic web-based query optimization model for multi-document summarization. Concurrency Comput Pract Exp. e7476. https://doi.org/10.1002/cpe.7476

  22. Ying Z, Peisong L, Xinheng W (2019) Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access 7:31711–31722

    Article  Google Scholar 

  23. Alotaibi Y, Alghamdi S, Khalafand OI, Nanda AK (2022) Improved metaheuristic-driven energy-aware cluster-based routing scheme for IoT-assisted wireless sensor networks. Sustainability 14:7712. https://doi.org/10.3390/su14137712

    Article  Google Scholar 

  24. Sridevi M, Chandrasekaran S, Lingaiah B (2022) Deep learning approaches for cyberbullying detection and classification on social media. Comput Intell Neurosci 2022. https://doi.org/10.1155/2022/2163458

  25. Fiore U, Palmieri F, Castiglione A, De Santis A (2013) Network anomaly detection with the restricted Boltzmann machine. Neurocomputing 122:13–23

    Article  Google Scholar 

  26. Nix R, Zhang J (2017). Classification of android apps and malware using deep neural networks. In: Proceedings of IJCNN, pp 1871–1878

    Google Scholar 

  27. Nour M, Slay J (2015). UNSW-NB15: a comprehensive data set for network intrusion detection systems. In: Proceedings of IEEE MilCIS, pp 1–6. NSL dataset. https://www.unb.ca/cic/datasets/nsl.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. Geetha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Geetha, C., Gilda, A.J., Neelakandan, S. (2023). Deep Belief Network Algorithm-Based Intrusion Detection System in Internet of Things Environments. In: Hasteer, N., McLoone, S., Khari, M., Sharma, P. (eds) Decision Intelligence Solutions. InCITe 2023. Lecture Notes in Electrical Engineering, vol 1080. Springer, Singapore. https://doi.org/10.1007/978-981-99-5994-5_12

Download citation

Publish with us

Policies and ethics