Skip to main content
Erschienen in: Wireless Personal Communications 2/2023

24.12.2022

Intrusion Detection Model for IoT Using Recurrent Kernel Convolutional Neural Network

verfasst von: C. U. Om Kumar, Suguna Marappan, Bhavadharini Murugeshan, P. Mercy Rajaselvi Beaulah

Erschienen in: Wireless Personal Communications | Ausgabe 2/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In communication and information technology, the Internet of Things (IoT) creates an enormous amount of data traffic that permits data analysis to expose and detect unusual network load and hidden trends. There are different existing DL (Deep Learning) classification methods applied for IDM (Intrusion Detection Model) detection, but it has some limitations, such as being difficult for security and more complex. In order to overcome these problems, the proposed work used the DL based RK.CNN-MMBO (Recurrent Kernel Convolution Neural Network-Modified Monarch Butterfly Optimization) model to identify the attacks in the network. In the pre-processing stage, the data are pre-processed by min_max normalization. After pre-processing, the optimal features are selected by the IBRO (Improved Battle Royale Optimization) algorithm. Then the selected features are classified using the DL classifier RKCNN (Recurrent kernel convolutional neural network). Moreover, MMBO (Modified Monarch Butterfly Optimization) improves the classifier’s performance in attack detection. The proposed work used two different types of datasets for experimental validation, N-BaIoT and CICIDS-2017. The proposed IDM classification using the N-BaIoT dataset with the RKCNN-MMBO model attains the accuracy of (99.96%), and the CICIDS-2017 dataset with the RKCNN-MMBO model obtains the accuracy value of (99.95%). The proposed RKCNN-MMBO classifier model obtained higher accuracy in the detection of IDM than other methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Patel, K. K., & Patel, S. M. (2016). Internet of things-IOT: definition, characteristics, architecture, enabling technologies, application and future challenges. International journal of engineering science and computing, 6(5). Patel, K. K., & Patel, S. M. (2016). Internet of things-IOT: definition, characteristics, architecture, enabling technologies, application and future challenges. International journal of engineering science and computing, 6(5).
2.
Zurück zum Zitat Ramchurn, S. D., Vytelingum, P., Rogers, A., & Jennings, N. R. (2012). Putting the’smarts’ into the smart grid: a grand challenge for artificial intelligence. Communications of the ACM, 55(4), 86–97.CrossRef Ramchurn, S. D., Vytelingum, P., Rogers, A., & Jennings, N. R. (2012). Putting the’smarts’ into the smart grid: a grand challenge for artificial intelligence. Communications of the ACM, 55(4), 86–97.CrossRef
3.
Zurück zum Zitat Abdullah, T. A., Ali, W., Malebary, S., & Ahmed, A. A. (2019). A review of cyber security challenges attacks and solutions for Internet of Things based smart home. International Journal Computing Science Network Security, 19(9), 139. Abdullah, T. A., Ali, W., Malebary, S., & Ahmed, A. A. (2019). A review of cyber security challenges attacks and solutions for Internet of Things based smart home. International Journal Computing Science Network Security, 19(9), 139.
4.
Zurück zum Zitat Kumar, S., & Dutta, K. (2016). Intrusion detection in mobile ad hoc networks: Techniques, systems, and future challenges. Security and Communication Networks, 9(14), 2484–2556.CrossRef Kumar, S., & Dutta, K. (2016). Intrusion detection in mobile ad hoc networks: Techniques, systems, and future challenges. Security and Communication Networks, 9(14), 2484–2556.CrossRef
5.
Zurück zum Zitat Margolis, J., Oh, T.T., Jadhav, S., Kim, Y.H., & Kim, J.N. (2017). An in-depth analysis of the mirai botnet. In 2017 international conference on software security and assurance (icssa), ieee, 6–12. Margolis, J., Oh, T.T., Jadhav, S., Kim, Y.H., & Kim, J.N. (2017). An in-depth analysis of the mirai botnet. In 2017 international conference on software security and assurance (icssa), ieee, 6–12.
7.
Zurück zum Zitat Vagts, H., and Bauer, A. (2010, August). Privacy-aware object representation for surveillance systems. In 2010 7th IEEE international conference on advanced video and signal based surveillance IEEE, 601–608. Vagts, H., and Bauer, A. (2010, August). Privacy-aware object representation for surveillance systems. In 2010 7th IEEE international conference on advanced video and signal based surveillance IEEE, 601–608.
8.
Zurück zum Zitat Om Kumar, C. U., & Sathia Bhama, P. R. (2019). Detecting and confronting flash attacks from IoT botnets. The Journal of Supercomputing, 75(12), 8312–8338. Om Kumar, C. U., & Sathia Bhama, P. R. (2019). Detecting and confronting flash attacks from IoT botnets. The Journal of Supercomputing, 75(12), 8312–8338.
9.
Zurück zum Zitat Shin, S., Xu, L., Hong, S., and Gu, G. (2016). Enhancing network security through software defined networking (SDN). In 2016 25th international conference on computer communication and networks (ICCCN) IEEE, 1–9. Shin, S., Xu, L., Hong, S., and Gu, G. (2016). Enhancing network security through software defined networking (SDN). In 2016 25th international conference on computer communication and networks (ICCCN) IEEE, 1–9.
10.
Zurück zum Zitat Om Kumar, Chandra Umakantham, Jeyakumar Durairaj, Samsu Aliar Ahamed Ali, Y. Justindhas, and Suguna Marappan. "Effective intrusion detection system for IoT using optimized capsule auto encoder model." Concurrency and Computation: Practice and Experience (2022): e6918. Om Kumar, Chandra Umakantham, Jeyakumar Durairaj, Samsu Aliar Ahamed Ali, Y. Justindhas, and Suguna Marappan. "Effective intrusion detection system for IoT using optimized capsule auto encoder model." Concurrency and Computation: Practice and Experience (2022): e6918.
11.
Zurück zum Zitat Om Kumar, C. U., & Sathia Bhama, P. R. “Efficient ensemble to combat flash attacks.” Computational Intelligence. Om Kumar, C. U., & Sathia Bhama, P. R. “Efficient ensemble to combat flash attacks.” Computational Intelligence.
12.
Zurück zum Zitat Rose, T., Kifayat, K., Abbas, S., & Asim, M. (2020). A hybrid anomaly-based intrusion detection system to improve time complexity in the Internet of Energy environment. Journal of Parallel and Distributed Computing, 145, 124–139.CrossRef Rose, T., Kifayat, K., Abbas, S., & Asim, M. (2020). A hybrid anomaly-based intrusion detection system to improve time complexity in the Internet of Energy environment. Journal of Parallel and Distributed Computing, 145, 124–139.CrossRef
13.
Zurück zum Zitat Das, A. K., Zeadally, S., & He, D. (2018). Taxonomy and analysis of security protocols for Internet of Things. Future Generation Computer Systems, 89, 110–125.CrossRef Das, A. K., Zeadally, S., & He, D. (2018). Taxonomy and analysis of security protocols for Internet of Things. Future Generation Computer Systems, 89, 110–125.CrossRef
14.
Zurück zum Zitat Schjolberg, S., & Ghernaouti-Helie, S. (2011). A global treaty on cybersecurity and cybercrime. Cybercrime Law, 97. Schjolberg, S., & Ghernaouti-Helie, S. (2011). A global treaty on cybersecurity and cybercrime. Cybercrime Law, 97.
15.
Zurück zum Zitat Cox, D., & Fafchamps, M. (2007). Extended family and kinship networks: Economic insights and evolutionary directions. Handbook of development economics, 4, 3711–3784.CrossRef Cox, D., & Fafchamps, M. (2007). Extended family and kinship networks: Economic insights and evolutionary directions. Handbook of development economics, 4, 3711–3784.CrossRef
16.
Zurück zum Zitat Waheed, N., He, X., Ikram, M., Usman, M., Hashmi, S. S., & Usman, M. (2020). Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures. ACM Computing Surveys (CSUR), 53(6), 1–37. Waheed, N., He, X., Ikram, M., Usman, M., Hashmi, S. S., & Usman, M. (2020). Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures. ACM Computing Surveys (CSUR), 53(6), 1–37.
17.
Zurück zum Zitat Rich, M.L. (2016). Machine learning, automated suspicion algorithms, and the fourth amendment. University of Pennsylvania Law Review, 871–929. Rich, M.L. (2016). Machine learning, automated suspicion algorithms, and the fourth amendment. University of Pennsylvania Law Review, 871–929.
18.
Zurück zum Zitat Om Kumar, C. U., & Sathia Bhama, P. R. (2022). “Proficient detection of flash attacks using a predictive strategy.” In Emerging research in computing, information, communication and applications (pp. 367–379). Singapore: Springer. Om Kumar, C. U., & Sathia Bhama, P. R. (2022). “Proficient detection of flash attacks using a predictive strategy.” In Emerging research in computing, information, communication and applications (pp. 367–379). Singapore: Springer.
19.
Zurück zum Zitat Om Kumar, C. U., & Sathia Bhama, P. R. (2023). “Efficacious intrusion detection on cloud using improved BES and HYBRID SKINET-EKNN.” In Emerging research in computing, information, communication and applications (pp. 61–72). Singapore: Springer. Om Kumar, C. U., & Sathia Bhama, P. R. (2023). “Efficacious intrusion detection on cloud using improved BES and HYBRID SKINET-EKNN.” In Emerging research in computing, information, communication and applications (pp. 61–72). Singapore: Springer.
20.
Zurück zum Zitat Long, J., Luo, Y., Zhu, X., Luo, E., & Huang, M. (2020). Computation offloading through mobile vehicles in IoT-edge-cloud network. EURASIP Journal on Wireless Communications and Networking, 1, 1–21. Long, J., Luo, Y., Zhu, X., Luo, E., & Huang, M. (2020). Computation offloading through mobile vehicles in IoT-edge-cloud network. EURASIP Journal on Wireless Communications and Networking, 1, 1–21.
21.
Zurück zum Zitat Keller, K. L. (2013). Building strong brands in a modern marketing communications environment. In The evolution of integrated marketing communications (pp. 73–90). Routledge. Keller, K. L. (2013). Building strong brands in a modern marketing communications environment. In The evolution of integrated marketing communications (pp. 73–90). Routledge.
22.
Zurück zum Zitat Idrissi, I., Boukabous, M., Azizi, M., Moussaoui, O., & El Fadili, H. (2021). Toward a deep learning-based intrusion detection system for IoT against botnet attacks. IAES International Journal of Artificial Intelligence, 10(1), 110. Idrissi, I., Boukabous, M., Azizi, M., Moussaoui, O., & El Fadili, H. (2021). Toward a deep learning-based intrusion detection system for IoT against botnet attacks. IAES International Journal of Artificial Intelligence, 10(1), 110.
23.
Zurück zum Zitat Derhab, A., Aldweesh, A., Emam, A. Z., & Khan, F. A. (2020). Intrusion detection system for internet of things based on temporal convolution neural network and efficient feature engineering. Wireless Communications and Mobile Computing, 2020, 1–16. https://doi.org/10.1155/2020/6689134CrossRef Derhab, A., Aldweesh, A., Emam, A. Z., & Khan, F. A. (2020). Intrusion detection system for internet of things based on temporal convolution neural network and efficient feature engineering. Wireless Communications and Mobile Computing, 2020, 1–16. https://​doi.​org/​10.​1155/​2020/​6689134CrossRef
24.
Zurück zum Zitat Elsayed, N., Zaghloul, Z.S., Azumah, S.W., and Li, C. (2021, August). Intrusion Detection System in Smart Home Network Using Bidirectional LSTM and Convolutional Neural Networks Hybrid Model. In 2021 IEEE international midwest symposium on circuits and systems (MWSCAS)IEEE, 55–58. Elsayed, N., Zaghloul, Z.S., Azumah, S.W., and Li, C. (2021, August). Intrusion Detection System in Smart Home Network Using Bidirectional LSTM and Convolutional Neural Networks Hybrid Model. In 2021 IEEE international midwest symposium on circuits and systems (MWSCAS)IEEE, 55–58.
26.
Zurück zum Zitat Aljumah, A. (2021). IoT-based intrusion detection system using convolution neural networks. PeerJ Computer Science, 7, e721.CrossRef Aljumah, A. (2021). IoT-based intrusion detection system using convolution neural networks. PeerJ Computer Science, 7, e721.CrossRef
27.
Zurück zum Zitat Wang, X., Yin, S., Li, H., Wang, J., & Teng, L. (2020). A network intrusion detection method based on deep multi-scale convolutional neural network. International Journal of Wireless Information Networks, 27(4), 503–517.CrossRef Wang, X., Yin, S., Li, H., Wang, J., & Teng, L. (2020). A network intrusion detection method based on deep multi-scale convolutional neural network. International Journal of Wireless Information Networks, 27(4), 503–517.CrossRef
28.
Zurück zum Zitat Kim, J., Kim, J., Kim, H., Shim, M., & Choi, E. (2020). CNN-based network intrusion detection against denial-of-service attacks. Electronics, 9(6), 916.CrossRef Kim, J., Kim, J., Kim, H., Shim, M., & Choi, E. (2020). CNN-based network intrusion detection against denial-of-service attacks. Electronics, 9(6), 916.CrossRef
29.
Zurück zum Zitat Li, Y., Xu, Y., Liu, Z., Hou, H., Zheng, Y., Xin, Y., Zhao, Y., & Cui, L. (2020). Robust detection for network intrusion of industrial IoT based on multi-CNN fusion. Measurement, 154, 107450.CrossRef Li, Y., Xu, Y., Liu, Z., Hou, H., Zheng, Y., Xin, Y., Zhao, Y., & Cui, L. (2020). Robust detection for network intrusion of industrial IoT based on multi-CNN fusion. Measurement, 154, 107450.CrossRef
30.
Zurück zum Zitat Ruiz, N., Tavera, B., Abuzneid, A.S. (2020 Dec 16). Intrusion Detection System: The Use of Neural Network Packet Classification. In2020 international conference on computational science and computational intelligence (CSCI) IEEE, 1276–1281. Ruiz, N., Tavera, B., Abuzneid, A.S. (2020 Dec 16). Intrusion Detection System: The Use of Neural Network Packet Classification. In2020 international conference on computational science and computational intelligence (CSCI) IEEE, 1276–1281.
31.
Zurück zum Zitat Le, K. H., Nguyen, M. H., Tran, T. D., & Tran, N. D. (2022). IMIDS: an intelligent intrusion detection system against cyber threats in IoT. Electronics, 11(4), 524.CrossRef Le, K. H., Nguyen, M. H., Tran, T. D., & Tran, N. D. (2022). IMIDS: an intelligent intrusion detection system against cyber threats in IoT. Electronics, 11(4), 524.CrossRef
Metadaten
Titel
Intrusion Detection Model for IoT Using Recurrent Kernel Convolutional Neural Network
verfasst von
C. U. Om Kumar
Suguna Marappan
Bhavadharini Murugeshan
P. Mercy Rajaselvi Beaulah
Publikationsdatum
24.12.2022
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2023
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-10155-9

Weitere Artikel der Ausgabe 2/2023

Wireless Personal Communications 2/2023 Zur Ausgabe