Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Intrusion detection for IoT based on a hybrid shuffled shepherd optimization algorithm

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The use of current data management technologies for the Internet of Things (IoT) is not straightforward due to interface heterogeneity, highly complex and potentially unprotected conditions, and the huge scale of the network. A vast number of devices and sensors around the world are connected to wireless networks, making the data transmitted to and from them vulnerable to attack. In addition, data sent through such devices can be unrelated, duplicated or inaccurate, making it impossible to execute the necessary tasks. Therefore, the transmitted data must be screened and chosen to fit the issue being handled in order to maintain the best possible degree of protection and thereby keep devices free from any data that could pose a threat. Reducing the size of the data often contributes to an increase in the level of communication between different networks, which in turn leads to a boost in the overall performance of the wireless network infrastructure. The process of obtaining only the relevant features from all of the data in a dataset for use in a particular task is known as feature selection (FS). In this paper, a new FS wrapper model is proposed that uses a shuffled shepherd optimization (SSO) algorithm as a search mechanism for the problem space and a K-nearest neighbor classifier to solve IoT problems with FS. Shuffled shepherd optimization was applied in a basic form as well as in two hybrid models with simulated annealing (SA) named SSO-SA1 and SSO-SA2. In order to test the performance of the three proposed models, they were applied to nine well-known IoT datasets. All the obtained results indicated that the two hybrids SSO-SA1 and SSO-SA2 enhanced the search capability of the original SSO algorithm. In comparison experiments, the SSO-SA2 outperformed three FS wrapper approaches, namely, EPC, MOPSO and MOPSO-Lévy. The SSO-SA2 surpassed the other methods in six out of the nine IoT benchmark datasets with an accuracy rate of 0.987. As for number of selected features, the SSO-SA2 surpassed the other methods in five out of the nine datasets with a selection size rate of 39.11 features. Furthermore, the wrapper-based SSO-SA2 surpassed four filter methods, namely, ReliefF, correlation, information gain and symmetrical.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Abbreviations

ABC:

Artificial bee colony

ACO:

Ant colony optimization

BA:

Bat algorithm

B-ABC:

Binary artificial bee colony

B-DA:

Binary dragonfly algorithm

B-DE:

Binary-differential evolution

CSO:

Cat swarm optimization

CSO:

Crow search optimization

DEA:

Differential evolution algorithm

DA:

Dragonfly algorithm

GWO:

Elephant herding optimization

EPC:

Emperor penguin colony

FS:

Feature selection

FA:

Firefly algorithm

GA:

Genetic algorithm

GO:

Grasshopper optimization

GWO:

Gray wolf optimization

HS:

Harmony search

IoT:

Internet of things

IBDA:

Improved binary dragonfly algorithm

IGA:

Improved genetic algorithm

ID:

Intrusion detection

MOPSO:

Multi-objective particle swarm optimization

PSO:

Particle swarm optimization

PIO:

Pigeon-inspired optimization

RFA:

Random forest algorithm

SSO:

Shuffled shepherd optimization

SA:

Simulated annealing

SMO:

Spider monkey optimization

SVM:

Support vector machine

WOA:

Watershed optimization algorithm

References

  1. Singh RP, Javaid M, Haleem A, Suman R (2020) Internet of things (IoT) applications to fight against COVID-19 pandemic. Diabetes Metab Syndr 14:521–524

    Article  Google Scholar 

  2. Qadri YA, Nauman A, Zikria YB, Vasilakos AV, Kim SW (2020) The future of healthcare internet of things: a survey of emerging technologies. IEEE Commun Surv Tutorials 22:1121–1167

    Article  Google Scholar 

  3. Villa-Henriksen A, Edwards GT, Pesonen LA, Green O, Sørensen CAG (2020) Internet of Things in arable farming: Implementation, applications, challenges and potential. Biosys Eng 191:60–84

    Article  Google Scholar 

  4. Vaya D, Hadpawat T (2020) Internet of everything (IoE) a new era of IOT. In: Kumar A, Mozar S (eds) ICCCE 2019. Springer, Singapore, pp 1–6

    Google Scholar 

  5. Dawson M (2020) Exploring secure computing for the Internet of things, Internet of everything, web of things, and hyperconnectivity. In: Dawson M (ed) Securing the internet of things concepts, methodologies, tools, and applications. IGI Global, Pennsylvania, pp 1186–1195

    Google Scholar 

  6. Ansari S, Aslam T, Poncela J, Otero P, Ansari A (2020) Internet of things-based healthcare applications. In: Chowdhry BS, Shaikh FK, Mahoto NA (eds) IoT architectures, models, and platforms for smart city applications. IGI Global, Pennsylvania, pp 1–28

    Google Scholar 

  7. Singh SK, Rathore S, Park JH (2020) Blockiotintelligence: a blockchain-enabled intelligent IoT architecture with artificial intelligence. Futur Gener Comput Syst 110:721–743

    Article  Google Scholar 

  8. Adi E, Anwar A, Baig Z, Zeadally S (2020) Machine learning and data analytics for the IoT. Neural Comput Appl 32:16205–16233

    Article  Google Scholar 

  9. Sankaranarayanan S, Rodrigues JJ, Sugumaran V, Kozlov S (2020) Data flow and distributed deep neural network based low latency IoT-edge computation model for big data environment. Eng Appl Artif Intell 94:103785

    Article  Google Scholar 

  10. Diène B, Rodrigues JJ, Diallo O, Ndoye EHM, Korotaev VV (2020) Data management techniques for internet of things. Mech Syst Signal Process 138:106564

    Article  Google Scholar 

  11. Yu M, Zhuge J, Cao M, Shi Z, Jiang L (2020) A survey of security vulnerability analysis, discovery, detection, and mitigation on IoT devices. Future Internet 12:27

    Article  Google Scholar 

  12. Atlam HF, Wills GB (2020) IoT security, privacy, safety and ethics. In: Farsi M, Daneshkhah A, Hosseinian-Far A, Jahankhani H (eds) Digital twin technologies and smart cities. Springer, Cham, pp 123–149

    Chapter  Google Scholar 

  13. Sivanathan A, Gharakheili HH, Sivaraman V (2020) Managing IoT cyber-security using programmable telemetry and machine learning. IEEE Trans Netw Serv Manage 17:60–74

    Article  Google Scholar 

  14. Román S, Cuestas PJ (2008) The perceptions of consumers regarding online retailers’ ethics and their relationship with consumers’ general internet expertise and word of mouth: a preliminary analysis. J Bus Ethics 83:641–656

    Article  Google Scholar 

  15. Abbas AW, Marwat SNK, Ahmed S, Hafeez A, Ullah K, Khan IU (2020) Proposing model for security of IoT devices in smart logistics: a review. In: 2020 3rd international conference on computing, mathematics anssd engineering technologies (iCoMET) pp. 1–4

  16. Lee JK, Chang Y, Kwon HY, Kim B (2020) Reconciliation of privacy with preventive cybersecurity: the bright internet approach. Inf Syst Front 22:45–57

    Article  Google Scholar 

  17. Roldán J, Boubeta-Puig J, Martínez JL, Ortiz G (2020) Integrating complex event processing and machine learning: an intelligent architecture for detecting IoT security attacks. Expert Syst Appl 149:113251

    Article  Google Scholar 

  18. Qureshi A, Qureshi MA, Haider HA, Khawaja R (2020) A review on machine learning techniques for secure IoT networks. In: 2020 IEEE 23rd international multitopic conference (INMIC) pp. 1–6

  19. Saranya T, Sridevi S, Deisy C, Chung TD, Khan MA (2020) Performance analysis of machine learning algorithms in intrusion detection system: a review. Proced Comput Sci 171:1251–1260

    Article  Google Scholar 

  20. Kunhare N, Tiwari R, Dhar J (2020) Particle swarm optimization and feature selection for intrusion detection system. Sādhanā 45:1–14

    Article  Google Scholar 

  21. Wei W, Chen S, Lin Q, Ji J, Chen J (2020) A multi-objective immune algorithm for intrusion feature selection. Appl Soft Comput 95:106522

    Article  Google Scholar 

  22. Alweshah M (2020) Solving feature selection problems by combining mutation and crossover operations with the monarch butterfly optimization algorithm. Appl Intell 51:1–24

    Google Scholar 

  23. Alweshah M, Alkhalaileh S, Albashish D, Mafarja M, Bsoul Q, Dorgham O (2020) A hybrid mine blast algorithm for feature selection problems. Soft Comput 25:1–18

    Google Scholar 

  24. Alweshah M, Al Khalaileh S, Gupta BB, Almomani A, Hammouri AI, Al-Betar MA (2020) The monarch butterfly optimization algorithm for solving feature selection problems. Neural comput appl, pp. 1–15

  25. Almomani A, Alweshah M, Al S (2019) Metaheuristic algorithms-based feature selection approach for intrusion detection. In: Gupta BB, Sheng M (eds) Machine learning for computer and cyber security: principle, algorithms, and practices. CRC Press, England, pp 184–208

    Chapter  Google Scholar 

  26. Karasu S, Altan A, Bekiros S, Ahmad W (2020) A new forecasting model with wrapper-based feature selection approach using multi-objective optimization technique for chaotic crude oil time series. Energy 212:118750

    Article  Google Scholar 

  27. Kumar A, Gandhi C, Liu X, Liu Y, Zhou Y, Kumar R, Xiang J, (2020) A novel health indicator developed using filter-based feature selection algorithm for the identification of rotor defects. In: Proceedings of the institution of mechanical engineers, Part O: J Risk Reliab, p. 1748006X20916953

  28. Fu Y, Liu X, Sarkar S, Wu T (2020) Gaussian mixture model with feature selection: an embedded approach. Comput Ind Eng 152:107000

    Article  Google Scholar 

  29. Moslehi F, Haeri A (2020) A novel hybrid wrapper–filter approach based on genetic algorithm, particle swarm optimization for feature subset selection. J Ambient Intell Humaniz Comput 11:1105–1127

    Article  Google Scholar 

  30. Mehmod T, Rais HBM (2016) Ant colony optimization and feature selection for intrusion detection. In: Soh PJ, Woo WL, Sulaiman HA, Othman MA, Saat MS (eds) Advances in machine learning and signal processing. Springer, Cham, pp 305–312

    Chapter  Google Scholar 

  31. Dorgham O, Alweshah M, Ryalat M, Alshaer J, Khader M, Alkhalaileh S (2021) Monarch butterfly optimization algorithm for computed tomography image segmentation. Multimed Tools Appl 80:1–34

    Article  Google Scholar 

  32. Alweshah M, Al-Sendah M, Dorgham OM, Al-Momani A, Tedmori S (2020) Improved water cycle algorithm with probabilistic neural network to solve classification problems. Clust Comput 23:2703–2718

    Article  Google Scholar 

  33. Alweshah M, Rababa L, Ryalat MH, Al Momani A, Ababneh MF (2020) African Buffalo algorithm: training the probabilistic neural network to solve classification problems. J King Saud Univ-Comput Info Sci

  34. Alweshah M, Ramadan E, Ryalat MH, Almi’ani M, Hammouri AI (2020) Water evaporation algorithm with probabilistic neural network for solving classification problems. Jordanian J Comput Info Technol (JJCIT) 6:1–15

    Google Scholar 

  35. Alweshah M, Qadoura MA, Hammouri AI, Azmi MS, AlKhalaileh S (2020) Flower pollination algorithm for solving classification problems. Int J Adv Soft Compu Appl, p 12

    Google Scholar 

  36. Alweshah M, Al-Daradkeh A, Al-Betar MA, Almomani A, Oqeili S (2019) β β-hill climbing algorithm with probabilistic neural network for classification problems. J Ambient Intell Human Comput 11:1–12

    Google Scholar 

  37. Elmasry W, Akbulut A, Zaim AH (2020) Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Comput Netw 168:107042

    Article  Google Scholar 

  38. Li J, Kang H, Sun G, Feng T, Li W, Zhang W, Ji B (2020) IBDA: improved binary dragonfly algorithm with evolutionary population dynamics and adaptive crossover for feature selection. IEEE Access 8:108032–108051

    Article  Google Scholar 

  39. Mafarja M, Heidari AA, Faris H, Mirjalili S, Aljarah I (2020) Dragonfly algorithm: theory, literature review, and application in feature selection. In: Mirjalili S, SongDong J, Lewis A (eds) Nature-inspired optimizers. Springer, Cham, pp 47–67

    Google Scholar 

  40. Salami M, Sobhani FM, Ghazizadeh MS (2020) A hybrid short-term load forecasting model developed by factor and feature selection algorithms using improved grasshopper optimization algorithm and principal component analysis. Electr Eng 102:437–460

    Article  Google Scholar 

  41. Marie-Sainte SL, Alalyani N (2020) Firefly algorithm based feature selection for Arabic text classification. J King Saud Univ-Comput Inf Sci 32:320–328

    Google Scholar 

  42. Wang X-H, Zhang Y, Sun X-Y, Wang Y-L, Du C-H (2020) Multi-objective feature selection based on artificial bee colony: an acceleration approach with variable sample size. Appl Soft Comput 88:106041

    Article  Google Scholar 

  43. Durgut R, Baydilli YY, Aydin ME (2020) Feature selection with artificial bee colony algorithms for classifying parkinson’s diseases. In: Illadis L, Angelov PP, Jayne C, Pimenidis E (eds) International conference on engineering applications of neural networks. Springer, Cham, pp 338–351

    Google Scholar 

  44. Bekhouche S, Mohamed Ben Ali Y (2020) Feature selection in GPCR classification using BAT using algorithm. Inter J Comput Intell Appl 19:2050006

    Article  Google Scholar 

  45. Bansal P, Kumar S, Pasrija S, Singh S (2020) A hybrid grasshopper and new cat swarm optimization algorithm for feature selection and optimization of multi-layer perceptron. Soft computing 24:1–27

    Article  Google Scholar 

  46. Anter AM, Ali M (2020) Feature selection strategy based on hybrid crow search optimization algorithm integrated with chaos theory and fuzzy c-means algorithm for medical diagnosis problems. Soft Comput 24:1565–1584

    Article  Google Scholar 

  47. Zhang Y, Gong D-W, Gao X-Z, Tian T, Sun X-Y (2020) Binary differential evolution with self-learning for multi-objective feature selection. Inf Sci 507:67–85

    Article  MathSciNet  MATH  Google Scholar 

  48. Rivera-López R, Mezura-Montes E, Canul-Reich J, Cruz-Chávez MA (2020) A permutational-based differential evolution algorithm for feature subset selection. Pattern Recogn Lett 133:86–93

    Article  Google Scholar 

  49. Aghdam MH, Kabiri P (2016) Feature selection for intrusion detection system using ant colony optimization. IJ Netw Secur 18:420–432

    Google Scholar 

  50. Alazzam H, Sharieh A, Sabri KE (2020) A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer. Expert Syst Appl 148:113249s

    Article  Google Scholar 

  51. Lopez-Martin M, Sanchez-Esguevillas A, Arribas JI, Carro B (2022) Supervised contrastive learning over prototype-label embeddings for network intrusion detection. Inf Fus 79:200–228

    Article  Google Scholar 

  52. Lopez-Martin M, Carro B, Arribas JI, Sanchez-Esguevillas A (2021) Network intrusion detection with a novel hierarchy of distances between embeddings of hash IP addresses. Knowl-Based Syst 219:106887

    Article  Google Scholar 

  53. Almomani O (2020) A feature selection model for network intrusion detection system based on PSO, GWO, FFA and GA algorithms. Symmetry 12:1046

    Article  Google Scholar 

  54. Mafarja M, Heidari AA, Habib M, Faris H, Thaher T, Aljarah I (2020) Augmented whale feature selection for IoT attacks: structure, analysis and applications. Future Gener Comput Syst 112:18–40

    Article  Google Scholar 

  55. Habib M, Aljarah I, Faris H, Mirjalili S (2020) Multi-objective particle swarm optimization for botnet detection in internet of things. In: Mirijalili S, Faris H, Aljarah I (eds) Evolutionary machine learning techniques. Springer, Singapore, pp 203–229

    Chapter  Google Scholar 

  56. Kaveh A, Hamedani KB, Zaerreza A (2002) A set theoretical shuffled shepherd optimization algorithm for optimal design of cantilever retaining wall structures. Eng Comput 34:1–18

    Google Scholar 

  57. Kaveh A, Zaerreza A (2020) Size/layout optimization of truss structures using shuffled shepherd optimization method. Period Polytech Civil Eng 64:408–421

    Google Scholar 

  58. Kaveh A, Zaerreza A, Hosseini SM (2021) Shuffled shepherd optimization method simplified for reducing the parameter dependency Iranian. J Sci Technol Trans of Civil Eng 45:1397–1411s

    Article  Google Scholar 

  59. Zhan Z-H, Shi L, Tan KC, Zhang J (2021) A survey on evolutionary computation for complex continuous optimization. Artif Intell Rev 55:1–52

    Google Scholar 

  60. Alweshah M, Alkhalaileh S, Al-Betar MA, Bakar AA (2020) Coronavirus herd immunity optimizer with greedy crossover for feature selection in medical diagnosis. Knowl-Based Syst 235:107629

    Article  Google Scholar 

  61. Kaveh A, Zaerreza A (2020) Shuffled shepherd optimization method: a new meta-heuristic algorithm. Eng Comput 21:1087–1092

    Google Scholar 

  62. Metropolis N, Rosenbluth AW, Rosenbluth MN, Teller AH, Teller E (1953) Equation of state calculations by fast computing machines. J Chem Phys 21:1087–1092

    Article  MATH  Google Scholar 

  63. Kirkpatrick S, Gelatt CD, Vecchi MP (1983) “Optimization by simulated annealing.” Sci New Series 220(4598):671–680

    MathSciNet  MATH  Google Scholar 

  64. Hansen P, Mladenović N (2009) Variable neighborhood search methods. Springer, US City

    MATH  Google Scholar 

  65. Salhi S (2017) Not necessary improving heuristics. In: Salhi S (ed) Heuristic search. Springer, Cham, pp 49–76

    Chapter  Google Scholar 

  66. Wright M (2010) Automating parameter choice for simulated annealing

  67. Fan J, Upadhye S, Worster A (2006) Understanding receiver operating characteristic (ROC) curves. Canadian J Emerg Med 8:19–20

    Article  Google Scholar 

  68. Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The WEKA data mining software: an update. ACM SIGKDD Explor Newsl 11:10–18

    Article  Google Scholar 

Download references

Acknowledgements

The research reported in this publication was supported by the Deanship of Scientific Research and Innovation et al.-Balqa Applied University in Jordan. Grant Number: DSR-2020#295

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed Alweshah.

Ethics declarations

Conflict of interest

All authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alweshah, M., Alkhalaileh, S., Beseiso, M. et al. Intrusion detection for IoT based on a hybrid shuffled shepherd optimization algorithm. J Supercomput 78, 12278–12309 (2022). https://doi.org/10.1007/s11227-022-04357-y

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-022-04357-y

Keywords

Navigation