Abstract
The use of current data management technologies for the Internet of Things (IoT) is not straightforward due to interface heterogeneity, highly complex and potentially unprotected conditions, and the huge scale of the network. A vast number of devices and sensors around the world are connected to wireless networks, making the data transmitted to and from them vulnerable to attack. In addition, data sent through such devices can be unrelated, duplicated or inaccurate, making it impossible to execute the necessary tasks. Therefore, the transmitted data must be screened and chosen to fit the issue being handled in order to maintain the best possible degree of protection and thereby keep devices free from any data that could pose a threat. Reducing the size of the data often contributes to an increase in the level of communication between different networks, which in turn leads to a boost in the overall performance of the wireless network infrastructure. The process of obtaining only the relevant features from all of the data in a dataset for use in a particular task is known as feature selection (FS). In this paper, a new FS wrapper model is proposed that uses a shuffled shepherd optimization (SSO) algorithm as a search mechanism for the problem space and a K-nearest neighbor classifier to solve IoT problems with FS. Shuffled shepherd optimization was applied in a basic form as well as in two hybrid models with simulated annealing (SA) named SSO-SA1 and SSO-SA2. In order to test the performance of the three proposed models, they were applied to nine well-known IoT datasets. All the obtained results indicated that the two hybrids SSO-SA1 and SSO-SA2 enhanced the search capability of the original SSO algorithm. In comparison experiments, the SSO-SA2 outperformed three FS wrapper approaches, namely, EPC, MOPSO and MOPSO-Lévy. The SSO-SA2 surpassed the other methods in six out of the nine IoT benchmark datasets with an accuracy rate of 0.987. As for number of selected features, the SSO-SA2 surpassed the other methods in five out of the nine datasets with a selection size rate of 39.11 features. Furthermore, the wrapper-based SSO-SA2 surpassed four filter methods, namely, ReliefF, correlation, information gain and symmetrical.
Similar content being viewed by others
Abbreviations
- ABC:
-
Artificial bee colony
- ACO:
-
Ant colony optimization
- BA:
-
Bat algorithm
- B-ABC:
-
Binary artificial bee colony
- B-DA:
-
Binary dragonfly algorithm
- B-DE:
-
Binary-differential evolution
- CSO:
-
Cat swarm optimization
- CSO:
-
Crow search optimization
- DEA:
-
Differential evolution algorithm
- DA:
-
Dragonfly algorithm
- GWO:
-
Elephant herding optimization
- EPC:
-
Emperor penguin colony
- FS:
-
Feature selection
- FA:
-
Firefly algorithm
- GA:
-
Genetic algorithm
- GO:
-
Grasshopper optimization
- GWO:
-
Gray wolf optimization
- HS:
-
Harmony search
- IoT:
-
Internet of things
- IBDA:
-
Improved binary dragonfly algorithm
- IGA:
-
Improved genetic algorithm
- ID:
-
Intrusion detection
- MOPSO:
-
Multi-objective particle swarm optimization
- PSO:
-
Particle swarm optimization
- PIO:
-
Pigeon-inspired optimization
- RFA:
-
Random forest algorithm
- SSO:
-
Shuffled shepherd optimization
- SA:
-
Simulated annealing
- SMO:
-
Spider monkey optimization
- SVM:
-
Support vector machine
- WOA:
-
Watershed optimization algorithm
References
Singh RP, Javaid M, Haleem A, Suman R (2020) Internet of things (IoT) applications to fight against COVID-19 pandemic. Diabetes Metab Syndr 14:521–524
Qadri YA, Nauman A, Zikria YB, Vasilakos AV, Kim SW (2020) The future of healthcare internet of things: a survey of emerging technologies. IEEE Commun Surv Tutorials 22:1121–1167
Villa-Henriksen A, Edwards GT, Pesonen LA, Green O, Sørensen CAG (2020) Internet of Things in arable farming: Implementation, applications, challenges and potential. Biosys Eng 191:60–84
Vaya D, Hadpawat T (2020) Internet of everything (IoE) a new era of IOT. In: Kumar A, Mozar S (eds) ICCCE 2019. Springer, Singapore, pp 1–6
Dawson M (2020) Exploring secure computing for the Internet of things, Internet of everything, web of things, and hyperconnectivity. In: Dawson M (ed) Securing the internet of things concepts, methodologies, tools, and applications. IGI Global, Pennsylvania, pp 1186–1195
Ansari S, Aslam T, Poncela J, Otero P, Ansari A (2020) Internet of things-based healthcare applications. In: Chowdhry BS, Shaikh FK, Mahoto NA (eds) IoT architectures, models, and platforms for smart city applications. IGI Global, Pennsylvania, pp 1–28
Singh SK, Rathore S, Park JH (2020) Blockiotintelligence: a blockchain-enabled intelligent IoT architecture with artificial intelligence. Futur Gener Comput Syst 110:721–743
Adi E, Anwar A, Baig Z, Zeadally S (2020) Machine learning and data analytics for the IoT. Neural Comput Appl 32:16205–16233
Sankaranarayanan S, Rodrigues JJ, Sugumaran V, Kozlov S (2020) Data flow and distributed deep neural network based low latency IoT-edge computation model for big data environment. Eng Appl Artif Intell 94:103785
Diène B, Rodrigues JJ, Diallo O, Ndoye EHM, Korotaev VV (2020) Data management techniques for internet of things. Mech Syst Signal Process 138:106564
Yu M, Zhuge J, Cao M, Shi Z, Jiang L (2020) A survey of security vulnerability analysis, discovery, detection, and mitigation on IoT devices. Future Internet 12:27
Atlam HF, Wills GB (2020) IoT security, privacy, safety and ethics. In: Farsi M, Daneshkhah A, Hosseinian-Far A, Jahankhani H (eds) Digital twin technologies and smart cities. Springer, Cham, pp 123–149
Sivanathan A, Gharakheili HH, Sivaraman V (2020) Managing IoT cyber-security using programmable telemetry and machine learning. IEEE Trans Netw Serv Manage 17:60–74
Román S, Cuestas PJ (2008) The perceptions of consumers regarding online retailers’ ethics and their relationship with consumers’ general internet expertise and word of mouth: a preliminary analysis. J Bus Ethics 83:641–656
Abbas AW, Marwat SNK, Ahmed S, Hafeez A, Ullah K, Khan IU (2020) Proposing model for security of IoT devices in smart logistics: a review. In: 2020 3rd international conference on computing, mathematics anssd engineering technologies (iCoMET) pp. 1–4
Lee JK, Chang Y, Kwon HY, Kim B (2020) Reconciliation of privacy with preventive cybersecurity: the bright internet approach. Inf Syst Front 22:45–57
Roldán J, Boubeta-Puig J, Martínez JL, Ortiz G (2020) Integrating complex event processing and machine learning: an intelligent architecture for detecting IoT security attacks. Expert Syst Appl 149:113251
Qureshi A, Qureshi MA, Haider HA, Khawaja R (2020) A review on machine learning techniques for secure IoT networks. In: 2020 IEEE 23rd international multitopic conference (INMIC) pp. 1–6
Saranya T, Sridevi S, Deisy C, Chung TD, Khan MA (2020) Performance analysis of machine learning algorithms in intrusion detection system: a review. Proced Comput Sci 171:1251–1260
Kunhare N, Tiwari R, Dhar J (2020) Particle swarm optimization and feature selection for intrusion detection system. Sādhanā 45:1–14
Wei W, Chen S, Lin Q, Ji J, Chen J (2020) A multi-objective immune algorithm for intrusion feature selection. Appl Soft Comput 95:106522
Alweshah M (2020) Solving feature selection problems by combining mutation and crossover operations with the monarch butterfly optimization algorithm. Appl Intell 51:1–24
Alweshah M, Alkhalaileh S, Albashish D, Mafarja M, Bsoul Q, Dorgham O (2020) A hybrid mine blast algorithm for feature selection problems. Soft Comput 25:1–18
Alweshah M, Al Khalaileh S, Gupta BB, Almomani A, Hammouri AI, Al-Betar MA (2020) The monarch butterfly optimization algorithm for solving feature selection problems. Neural comput appl, pp. 1–15
Almomani A, Alweshah M, Al S (2019) Metaheuristic algorithms-based feature selection approach for intrusion detection. In: Gupta BB, Sheng M (eds) Machine learning for computer and cyber security: principle, algorithms, and practices. CRC Press, England, pp 184–208
Karasu S, Altan A, Bekiros S, Ahmad W (2020) A new forecasting model with wrapper-based feature selection approach using multi-objective optimization technique for chaotic crude oil time series. Energy 212:118750
Kumar A, Gandhi C, Liu X, Liu Y, Zhou Y, Kumar R, Xiang J, (2020) A novel health indicator developed using filter-based feature selection algorithm for the identification of rotor defects. In: Proceedings of the institution of mechanical engineers, Part O: J Risk Reliab, p. 1748006X20916953
Fu Y, Liu X, Sarkar S, Wu T (2020) Gaussian mixture model with feature selection: an embedded approach. Comput Ind Eng 152:107000
Moslehi F, Haeri A (2020) A novel hybrid wrapper–filter approach based on genetic algorithm, particle swarm optimization for feature subset selection. J Ambient Intell Humaniz Comput 11:1105–1127
Mehmod T, Rais HBM (2016) Ant colony optimization and feature selection for intrusion detection. In: Soh PJ, Woo WL, Sulaiman HA, Othman MA, Saat MS (eds) Advances in machine learning and signal processing. Springer, Cham, pp 305–312
Dorgham O, Alweshah M, Ryalat M, Alshaer J, Khader M, Alkhalaileh S (2021) Monarch butterfly optimization algorithm for computed tomography image segmentation. Multimed Tools Appl 80:1–34
Alweshah M, Al-Sendah M, Dorgham OM, Al-Momani A, Tedmori S (2020) Improved water cycle algorithm with probabilistic neural network to solve classification problems. Clust Comput 23:2703–2718
Alweshah M, Rababa L, Ryalat MH, Al Momani A, Ababneh MF (2020) African Buffalo algorithm: training the probabilistic neural network to solve classification problems. J King Saud Univ-Comput Info Sci
Alweshah M, Ramadan E, Ryalat MH, Almi’ani M, Hammouri AI (2020) Water evaporation algorithm with probabilistic neural network for solving classification problems. Jordanian J Comput Info Technol (JJCIT) 6:1–15
Alweshah M, Qadoura MA, Hammouri AI, Azmi MS, AlKhalaileh S (2020) Flower pollination algorithm for solving classification problems. Int J Adv Soft Compu Appl, p 12
Alweshah M, Al-Daradkeh A, Al-Betar MA, Almomani A, Oqeili S (2019) β β-hill climbing algorithm with probabilistic neural network for classification problems. J Ambient Intell Human Comput 11:1–12
Elmasry W, Akbulut A, Zaim AH (2020) Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Comput Netw 168:107042
Li J, Kang H, Sun G, Feng T, Li W, Zhang W, Ji B (2020) IBDA: improved binary dragonfly algorithm with evolutionary population dynamics and adaptive crossover for feature selection. IEEE Access 8:108032–108051
Mafarja M, Heidari AA, Faris H, Mirjalili S, Aljarah I (2020) Dragonfly algorithm: theory, literature review, and application in feature selection. In: Mirjalili S, SongDong J, Lewis A (eds) Nature-inspired optimizers. Springer, Cham, pp 47–67
Salami M, Sobhani FM, Ghazizadeh MS (2020) A hybrid short-term load forecasting model developed by factor and feature selection algorithms using improved grasshopper optimization algorithm and principal component analysis. Electr Eng 102:437–460
Marie-Sainte SL, Alalyani N (2020) Firefly algorithm based feature selection for Arabic text classification. J King Saud Univ-Comput Inf Sci 32:320–328
Wang X-H, Zhang Y, Sun X-Y, Wang Y-L, Du C-H (2020) Multi-objective feature selection based on artificial bee colony: an acceleration approach with variable sample size. Appl Soft Comput 88:106041
Durgut R, Baydilli YY, Aydin ME (2020) Feature selection with artificial bee colony algorithms for classifying parkinson’s diseases. In: Illadis L, Angelov PP, Jayne C, Pimenidis E (eds) International conference on engineering applications of neural networks. Springer, Cham, pp 338–351
Bekhouche S, Mohamed Ben Ali Y (2020) Feature selection in GPCR classification using BAT using algorithm. Inter J Comput Intell Appl 19:2050006
Bansal P, Kumar S, Pasrija S, Singh S (2020) A hybrid grasshopper and new cat swarm optimization algorithm for feature selection and optimization of multi-layer perceptron. Soft computing 24:1–27
Anter AM, Ali M (2020) Feature selection strategy based on hybrid crow search optimization algorithm integrated with chaos theory and fuzzy c-means algorithm for medical diagnosis problems. Soft Comput 24:1565–1584
Zhang Y, Gong D-W, Gao X-Z, Tian T, Sun X-Y (2020) Binary differential evolution with self-learning for multi-objective feature selection. Inf Sci 507:67–85
Rivera-López R, Mezura-Montes E, Canul-Reich J, Cruz-Chávez MA (2020) A permutational-based differential evolution algorithm for feature subset selection. Pattern Recogn Lett 133:86–93
Aghdam MH, Kabiri P (2016) Feature selection for intrusion detection system using ant colony optimization. IJ Netw Secur 18:420–432
Alazzam H, Sharieh A, Sabri KE (2020) A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer. Expert Syst Appl 148:113249s
Lopez-Martin M, Sanchez-Esguevillas A, Arribas JI, Carro B (2022) Supervised contrastive learning over prototype-label embeddings for network intrusion detection. Inf Fus 79:200–228
Lopez-Martin M, Carro B, Arribas JI, Sanchez-Esguevillas A (2021) Network intrusion detection with a novel hierarchy of distances between embeddings of hash IP addresses. Knowl-Based Syst 219:106887
Almomani O (2020) A feature selection model for network intrusion detection system based on PSO, GWO, FFA and GA algorithms. Symmetry 12:1046
Mafarja M, Heidari AA, Habib M, Faris H, Thaher T, Aljarah I (2020) Augmented whale feature selection for IoT attacks: structure, analysis and applications. Future Gener Comput Syst 112:18–40
Habib M, Aljarah I, Faris H, Mirjalili S (2020) Multi-objective particle swarm optimization for botnet detection in internet of things. In: Mirijalili S, Faris H, Aljarah I (eds) Evolutionary machine learning techniques. Springer, Singapore, pp 203–229
Kaveh A, Hamedani KB, Zaerreza A (2002) A set theoretical shuffled shepherd optimization algorithm for optimal design of cantilever retaining wall structures. Eng Comput 34:1–18
Kaveh A, Zaerreza A (2020) Size/layout optimization of truss structures using shuffled shepherd optimization method. Period Polytech Civil Eng 64:408–421
Kaveh A, Zaerreza A, Hosseini SM (2021) Shuffled shepherd optimization method simplified for reducing the parameter dependency Iranian. J Sci Technol Trans of Civil Eng 45:1397–1411s
Zhan Z-H, Shi L, Tan KC, Zhang J (2021) A survey on evolutionary computation for complex continuous optimization. Artif Intell Rev 55:1–52
Alweshah M, Alkhalaileh S, Al-Betar MA, Bakar AA (2020) Coronavirus herd immunity optimizer with greedy crossover for feature selection in medical diagnosis. Knowl-Based Syst 235:107629
Kaveh A, Zaerreza A (2020) Shuffled shepherd optimization method: a new meta-heuristic algorithm. Eng Comput 21:1087–1092
Metropolis N, Rosenbluth AW, Rosenbluth MN, Teller AH, Teller E (1953) Equation of state calculations by fast computing machines. J Chem Phys 21:1087–1092
Kirkpatrick S, Gelatt CD, Vecchi MP (1983) “Optimization by simulated annealing.” Sci New Series 220(4598):671–680
Hansen P, Mladenović N (2009) Variable neighborhood search methods. Springer, US City
Salhi S (2017) Not necessary improving heuristics. In: Salhi S (ed) Heuristic search. Springer, Cham, pp 49–76
Wright M (2010) Automating parameter choice for simulated annealing
Fan J, Upadhye S, Worster A (2006) Understanding receiver operating characteristic (ROC) curves. Canadian J Emerg Med 8:19–20
Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The WEKA data mining software: an update. ACM SIGKDD Explor Newsl 11:10–18
Acknowledgements
The research reported in this publication was supported by the Deanship of Scientific Research and Innovation et al.-Balqa Applied University in Jordan. Grant Number: DSR-2020#295
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
All authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Alweshah, M., Alkhalaileh, S., Beseiso, M. et al. Intrusion detection for IoT based on a hybrid shuffled shepherd optimization algorithm. J Supercomput 78, 12278–12309 (2022). https://doi.org/10.1007/s11227-022-04357-y
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-022-04357-y