Enhancing iot network security through advanced data preprocessing and hybrid firefly-salp swarm optimized deep CNN-based intrusion detection

  • Bijili Jayan Lecturer, Faculty of Information Technology, University of Technology & Applied Sciences- Al Musannah, Sultanate of Oman http://orcid.org/0009-0008-0526-4511
  • Tamilarasi G. Lecturer, Faculty of Information Technology, University of Technology & Applied Sciences- Al Musannah, Sultanate of Oman http://orcid.org/0009-0000-3466-7549
  • Binu B. Lecturer, Faculty of Information Technology, University of Technology & Applied Sciences- Al Musannah, Sultanate of Oman. http://orcid.org/0009-0002-1220-3553

Abstract

This concept addresses the imperative need for robust Intrusion Detection system (IDs) in Internet of Things (IoT) networks by presenting a comprehensive approach that integrates advanced data preprocessing techniques and Deep Convolutional Neural Network (DCNN) based IDS. The process commences with raw and inherently noisy data generated by IoT sensors. To fortify the detection capabilities, a sequence of preprocessing steps is applied, including data cleaning, one-hot encoding and normalization, ensuring the prepared data is resilient to outliers and irrelevant information while being conducive to Deep Learning (DL) models. The core of the proposed system is a DCNN, adept at capturing sequential patterns within diverse and dynamic IoT data. To further optimize the performance of the DCNN, a hybrid firefly-salp swarm optimization algorithm is employed. This hybrid approach leverages the strengths of both Firefly and salp swarm optimization techniques (FFA-SSA), enhancing the model's ability to identify potential security threats effectively. The synergy of advanced data preprocessing and nature-inspired optimization methods not only strengthens the security posture of IoT networks but also contributes to the resilience and adaptability of intrusion detection systems. The presented concept signifies a crucial step towards ensuring more secure and resilient IoT deployments, acknowledging the pivotal role played by innovative techniques in preparing data and optimizing deep learning models for enhanced cybersecurity.

Downloads

Download data is not yet available.

References

N. A. Hikal, and M. M. Elgayar, “Enhancing IoT botnets attack detection using machine learning-IDS and ensemble data preprocessing technique”, In Internet of Things—Applications and Future: Proceedings of ITAF 2019, pp. 89-102, Singapore: Springer Singapore, 2020.

X. Larriva-Novo, V. A. Villagrá, M. Vega-Barbas, D. Rivera, and M. S. Rodrigo, “An IoT-focused intrusion detection system approach based on preprocessing characterization for cybersecurity datasets”, Sensors, vol. 21, no. 2, pp. 656, 2021.

K. M. Abuali, L. Nissirat, and A. Al-Samawi, "Advancing Network Security with AI: SVM-Based Deep Learning for Intrusion Detection”, Sensors, vol. 23, no. 21, pp. 8959, 2023.

S. Singh, A. S. M. Sanwar Hosen, and Byungun Yoon, “Blockchain security attacks, challenges, and solutions for the future distributed iot network”, IEEE Access, vol. 9, pp. 13938-13959, 2021.

M. A. Hossain, and M. S. Islam, “Ensuring network security with a robust intrusion detection system using ensemble-based machine learning”, Array, vol. 19, pp. 100306, 2023.

J. M. Kizza, “System intrusion detection and prevention”, In Guide to computer network security, pp. 295-323, Cham: Springer international publishing, 2024.

J. Díaz-Verdejo, J. Muñoz-Calle, A. E. Alonso, R. Estepa Alonso, and G. Madinabeitia, “On the detection capabilities of signature-based intrusion detection systems in the context of web attacks”, Applied Sciences, vol. 12, no. 2 pp. 852, 2022

R. Krishnan, R. Santhana Krishnan, Y. Harold Robinson, E. Golden Julie, H. V. Long, A. Sangeetha, M. Subramanian, and R. Kumar, “An intrusion detection and prevention protocol for internet of things based wireless sensor networks”, Wireless Personal Communications, vol. 124, no. 4, pp. 3461-3483, 2022.

J. F. C. Garcia, and G. E. Taborda Blandon, “A deep learning-based intrusion detection and preventation system for detecting and preventing denial-of-service attacks”, IEEE Access, vol. 10, pp. 83043-83060, 2022.

M. A. Rahman, A. TaufiqAsyhari, L. S. Leong, G. B. Satrya, M. Hai Tao, and M. F. Zolkipli, “Scalable machine learning-based intrusion detection system for IoT-enabled smart cities”, Sustainable Cities and Society, vol. 61, pp. 102324, 2020.

S. Dina, and D. Manivannan, “Intrusion detection based on machine learning techniques in computer networks”, Internet of Things, vol. 16, pp. 100462, 2021.

R. Gad, A. A. Nashat, and T. M. Barkat, “Intrusion detection system using machine learning for vehicular ad hoc networks based on ToN-IoT dataset”, IEEE Access, vol. 9, pp. 142206-142217, 2021.

K. H. Le, M. H. Nguyen, T. D. Tran, and N. D. Tran, “IMIDS: An intelligent intrusion detection system against cyber threats in IoT”, Electronics, vol. 11, no. 4, pp. 524, 2022.

Y. Otoum, D. Liu, and A. Nayak, “DL‐IDS: a deep learning–based intrusion detection framework for securing IoT”, Transactions on Emerging Telecommunications Technologies, vol. 33, no. 3, pp. e3803, 2022.

D. Kalaivani, "An Intrusion Detection System Based on Data Analytics and Convolutional Neural Network in NSS-KDD dataset”, Machine Learning Algorithms for Intelligent Data Analytics, pp. 93, 2022.

B. Wang, Y. Su, M. Zhang, and J. Nie, “A deep hierarchical network for packet-level malicious traffic detection”, IEEE Access, vol. 8, pp. 201728-201740, 2020.

A. Abhale, and S. S. Manivannan, “Deep Learning Algorithmic Approach for Operational Anomaly Based Intrusion Detection System in Wireless Sensor Networks”, 2021.

M. A. Khan, "HCRNNIDS: Hybrid convolutional recurrent neural network-based network intrusion detection system”, Processes, vol. 9, no. 5, pp. 834, 2021.

A. El-Ghamry, A. Darwish, and A. E. Hassanien, “An optimized CNN-based intrusion detection system for reducing risks in smart farming”, Internet of Things, vol. 22, pp. 100709, 2023.

N. Kunhare, R. Tiwari, and JDhar, “Intrusion detection system using hybrid classifiers with meta-heuristic algorithms for the optimization and feature selection by genetic algorithm”, Computers and Electrical Engineering, vol. 103, pp. 108383, 2022.

L. Narengbam, and S. Dey, “Harris hawk optimization trained artificial neural network for anomaly-based intrusion detection system”, Concurrency and Computation: Practice and Experience, vol. 35, no. 23, pp. e7771, 2023.

A. Khanna, P. Rani, P. Garg, P. KSingh, and A. Khamparia, “An enhanced crow searches inspired feature selection technique for intrusion detection based wireless network system”, Wireless Personal Communications, vol. 127, no. 3, pp. 2021-2038, 2022.

W. Elmasry, A. Akbulut, and A. H. Zaim, “Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic”, Computer Networks vol. 168, pp. 107042, 2020.

M. Faris, M. Mahmud, M. F. MohdSalleh, and B. Alsharaa, “A differential evolution-based algorithm with maturity extension for feature selection in intrusion detection system”, Alexandria Engineering Journal, vol. 81, pp. 178-192, 2023.

T. Wu, H. Fan, H. Zhu, C. You, H. Zhou, and X. Huang, “Intrusion detection system combined enhanced random forest with SMOTE algorithm”, EURASIP Journal on Advances in Signal Processing 2022, no. 1, pp. 1-20, 2022.

C. M. Hsu, H. Yen, S. W. Prakosa, M. Z. Azhari, and J. ShiouLeu, “Using long-short-term memory based convolutional neural networks for network intrusion detection”, In Wireless Internet: 11th EAI International Conference, WiCON 2018, Taipei, Taiwan, October 15-16, 2018, Proceedings, vol. 11, pp. 86-94, Springer International Publishing, 2019.

K. Samunnisa, G. S. Vijaya Kumar, and K. Madhavi, “Intrusion detection system in distributed cloud computing: Hybrid clustering and classification methods”, Measurement: Sensors, vol. 25, pp. 100612, 2023.

Y. Ding, and Y. Zhai, “Intrusion detection system for NSL-KDD dataset using convolutional neural networks”, on computer science and artificial intelligence, pp. 81-85, 2018.

A. A. Awad, A. F. Ali, and T. Gaber, “An improved long short term memory network for intrusion detection”, Plos one, vol. 18, no. 8, pp. e0284795, 2023.

F. Laghrissi, S. Douzi, K. Douzi, and B. Hssina, “Intrusion detection systems using long short-term memory (LSTM)”, Journal of Big Data, vol. 8, no. 1, pp. 65, 2021.

A. Agarwal, P. Sharma, M. Alshehri, A. A. Mohamed, and O. Alfarraj, “Classification model for accuracy and intrusion detection using machine learning approach”, PeerJ Computer Science, vol. 7, pp. e437, 2021.

Z. Ahmad, A. S. Khan, C. W. Shiang, J. Abdullah, and F. Ahmad, “Network intrusion detection system: A systematic study of machine learning and deep learning approaches”, Transactions on Emerging Telecommunications Technologies, vol. 32, no. 1, pp. e4150, 2021.

Published
2024-07-01
How to Cite
Jayan, B., G., T., & B., B. (2024). Enhancing iot network security through advanced data preprocessing and hybrid firefly-salp swarm optimized deep CNN-based intrusion detection. ITEGAM-JETIA, 10(47), 73-82. https://doi.org/10.5935/jetia.v10i47.1096
Section
Articles