Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Evolving random weight neural networks based on oversampled-segmented examples for IoT intrusion detection

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The intrusion detection system is responsible for revealing different intrusion activities, including the denial of service, man-in-middle, Mirai, Scan, and other types of intrusion activities. It is used in many applications, including the smart home Internet of Things networks, where security risks threaten the privacy of individuals. In this context, many works were proposed for detecting and classifying the different types of attacks. However, many challenges are identified for this type of problem, such as the large amount of data available, the imbalanced nature of the data, and the quality of detection and classification outcomes. This paper aims to address these challenges by proposing an approach that considers a metaheuristic-based random weight neural network to detect intrusion activities and classify the different types and subtypes of activities. The following points summarize the contribution of this paper. First, the automatic tuning of the neural network parameters where the weights, biases, regularization value, the number of neurons, and the type of activation function are optimized by different metaheuristic algorithms to produce high-quality results. Second, the proposed approach adopts a clustering with reduction technique to tackle the challenge of processing large volumes of data. Third, oversampling the dataset is also embedded in the proposed approach to avoid a biased classification of the majority class. The experiments are conducted based on a large dataset with more than half a million instances. The results show that the proposed approach outperforms the other classification approaches in geometric mean (G-Mean) and has promising results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Data Availability

All data analyzed during this study are included in the article by [8] and are available at the repository: https://sites.google.com/view/iot-network-intrusion-dataset/home.

References

  1. Sisavath C, Yu L (2021) Design and implementation of security system for smart home based on iot technology. Procedia Comput Sci 183:4–13

    Article  Google Scholar 

  2. Touqeer H, Zaman S, Amin R, Hussain M, Al-Turjman F, Bilal M (2021) Smart home security: challenges, issues and solutions at different iot layers. J Supercomput 1–37

  3. Ray AK, Bagwari A (2020) Iot based smart home: security aspects and security architecture. In: 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). IEEE, pp 218–222

  4. Al Shorman A, Faris H, Aljarah I (2020) Unsupervised intelligent system based on one class support vector machine and grey wolf optimization for iot botnet detection. J Ambient Intell Human Comput 11(7):2809–2825

    Article  Google Scholar 

  5. Lee W, Stolfo SJ (2000) A framework for constructing features and models for intrusion detection systems. ACM Trans Inform Syst Secur (TiSSEC) 3(4):227–261

    Article  Google Scholar 

  6. Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the kdd cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. IEEE, pp 1–6

  7. Moustafa N, Slay J (2015) Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS). IEEE, pp 1–6

  8. Ullah I, Mahmoud QH (2020) A scheme for generating a dataset for anomalous activity detection in iot networks. In: Canadian Conference on AI, pp 508–520

  9. Ahanger TA, Tariq U, Ibrahim A, Ullah I, Bouteraa Y (2020) Iot-inspired framework of intruder detection for smart home security systems. Electronics 9(9):1361

    Article  Google Scholar 

  10. Pawar S, Kithani V, Ahuja S, Sahu S (2018) Smart home security using iot and face recognition. In: 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA). IEEE, pp 1–6

  11. Tsimenidis S, Lagkas T, Rantos K (2022) Deep learning in iot intrusion detection. J Netw Syst Manage 30(1):1–40

    Article  Google Scholar 

  12. Heidari A, Jabraeil Jamali MA (2022) Internet of things intrusion detection systems: A comprehensive review and future directions. Cluster Comput 1–28

  13. de Souza CA, Westphall CB, Machado RB, Loffi L, Westphall CM, Geronimo GA (2022) Intrusion detection and prevention in fog based iot environments: a systematic literature review. Comput Netw 109154

  14. Khan AR, Kashif M, Jhaveri RH, Raut R, Saba T, Bahaj SA (2022) Deep learning for intrusion detection and security of internet of things (iot): current analysis, challenges, and possible solutions. Secur Commun Netw 2022

  15. Nobakht M, Sivaraman V, Boreli R (2016) A host-based intrusion detection and mitigation framework for smart home iot using openflow. In: 2016 11th International Conference on Availability, Reliability and Security (ARES). IEEE, pp 147–156

  16. Alghayadh F, Debnath D (2020) A hybrid intrusion detection system for smart home security. In: 2020 IEEE International Conference on Electro Information Technology (EIT). IEEE, pp 319–323

  17. Facchini S, Giorgi G, Saracino A, Dini G (2020) Multi-level distributed intrusion detection system for an iot based smart home environment. In: ICISSP, pp 705–712

  18. Qaddoura R, Al-Zoubi A, Almomani I, Faris H (2021) A multi-stage classification approach for iot intrusion detection based on clustering with oversampling. Appl Sci 11(7):3022

    Article  Google Scholar 

  19. Anthi E, Williams L, Słowińska M, Theodorakopoulos G, Burnap P (2019) A supervised intrusion detection system for smart home iot devices. IEEE Internet Things J 6(5):9042–9053

    Article  Google Scholar 

  20. Qaddoura R, Al-Zoubi M, Faris H, Almomani I et al (2021) A multi-layer classification approach for intrusion detection in iot networks based on deep learning. Sensors 21(9):2987

    Article  Google Scholar 

  21. Ge M, Fu X, Syed N, Baig Z, Teo G, Robles-Kelly A (2019) Deep learning-based intrusion detection for iot networks. In: 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, pp 256–25609

  22. Han J, Pei J, Kamber M (2011) Data mining: concepts and techniques, 3rd edn. Elsevier, Massachusetts

    Google Scholar 

  23. Qaddoura R, Faris H, Aljarah I (2020) An efficient clustering algorithm based on the k-nearest neighbors with an indexing ratio. Int J Mach Learn Cybern 11(3):675–714

    Article  Google Scholar 

  24. Qaddoura R, Faris H, Aljarah I, Guervós JJM, Castillo PA (2020) Empirical evaluation of distance measures for nearest point with indexing ratio clustering algorithm. In: IJCCI, pp 430–438

  25. Syakur M, Khotimah B, Rochman E, Satoto BD (2018) Integration k-means clustering method and elbow method for identification of the best customer profile cluster. In: IOP Conference Series: Materials Science and Engineering, vol 336. IOP Publishing, p 012017

  26. Fernández A, Garcia S, Herrera F, Chawla NV (2018) Smote for learning from imbalanced data: progress and challenges, marking the 15-year anniversary. J Artif Intell Res 61:863–905

    Article  MathSciNet  Google Scholar 

  27. Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) Smote: synthetic minority over-sampling technique. J Artif Intell Res 16:321–357

    Article  Google Scholar 

  28. Chawla NV (2009) Data mining for imbalanced datasets: An overview. In: Data mining and knowledge discovery handbook. Springer, Boston, MA, pp 875–886

  29. Schmidt WF, Kraaijveld MA, Duin RP, et al. (1992) Feed forward neural networks with random weights. In: International Conference on Pattern Recognition. IEEE Computer Society Press, p 1

  30. Zhao X, Li D, Yang B, Liu S, Pan Z, Chen H (2016) An efficient and effective automatic recognition system for online recognition of foreign fibers in cotton. Ieee Access 4:8465–8475

    Article  Google Scholar 

  31. Ding B, Qian H, Zhou J (2018) Activation functions and their characteristics in deep neural networks. In: 2018 Chinese Control and Decision Conference (CCDC). IEEE, pp 1836–1841

  32. Dubey SR, Singh SK, Chaudhuri BB (2022) Activation functions in deep learning: a comprehensive survey and benchmark. Neurocomputing

  33. Eshtay M, Faris H, Heidari AA, Ala’M A-Z, Aljarah I (2021) Autorwn: automatic construction and training of random weight networks using competitive swarm of agents. Neural Comput Appl 33(11):5507–5524

    Article  Google Scholar 

  34. Qaddoura R, Faris H, Aljarah I, Castillo PA (2020) Evocluster: An open-source nature-inspired optimization clustering framework in python. In: International Conference on the Applications of Evolutionary Computation (Part of EvoStar). Springer, pp 20–36

  35. Qaddoura R, Faris H, Aljarah I, Castillo PA (2021) Evocluster: an open-source nature-inspired optimization clustering framework. SN Comput Sci 2(3):1–12

    Article  Google Scholar 

  36. Holland J (1992) Genetic algorithms. Scientific American 66–72

  37. Beyer H-G, Schwefel H-P (2002) Evolution strategies - a comprehensive introduction. Nat Comput 1(1):3–52. https://doi.org/10.1023/A:1015059928466

    Article  MathSciNet  Google Scholar 

  38. Kennedy J, Eberhart R (1995) Particle swarm optimization. In: Proceedings of IEEE International Conference on Neural Networks, vol 4, pp 1942–19484. https://doi.org/10.1109/ICNN.1995.488968

  39. Yang XS, Deb S (2009) Cuckoo search via levy flights. In: . World Congress On Nature Biologically Inspired Computing, 2009. NaBIC 2009, pp 210–214. https://doi.org/10.1109/NABIC.2009.5393690

  40. Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46–61. https://doi.org/10.1016/j.advengsoft.2013.12.007

    Article  Google Scholar 

  41. Yang X-S (2010) A new metaheuristic bat-inspired algorithm. In: Nature Inspired Cooperative Strategies for Optimization (NICSO 2010). Springer, Berlin, Heidelberg, pp 65–74

  42. Yang X-S (2010) Firefly algorithm, stochastic test functions and design optimisation. Int J Bio-Inspired Comput 2(2):78–84. https://doi.org/10.1504/IJBIC.2010.032124

    Article  Google Scholar 

  43. Mirjalili S, Mirjalili SM, Hatamlou A (2016) Multi-verse optimizer: a nature-inspired algorithm for global optimization. Neural Comput Appl 27(2):495–513. https://doi.org/10.1007/s00521-015-1870-7

    Article  Google Scholar 

  44. Shukri S, Faris H, Aljarah I, Mirjalili S, Abraham A (2018) Evolutionary static and dynamic clustering algorithms based on multi-verse optimizer. Eng Appl Artif Intell 72:54–66

    Article  Google Scholar 

  45. Mirjalili S (2015) Moth-flame optimization algorithm: a novel nature-inspired heuristic paradigm. Knowl-Based Syst 89:228–249. https://doi.org/10.1016/j.knosys.2015.07.006

    Article  Google Scholar 

  46. Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67. https://doi.org/10.1016/j.advengsoft.2016.01.008

    Article  Google Scholar 

  47. Qaddoura R, Manaseer WA, Abushariah MA, Alshraideh MA (2020) Dental radiography segmentation using expectation-maximization clustering and grasshopper optimizer. Multim Tools Appl 79(29):22027–22045

    Article  Google Scholar 

  48. Topaz CM, Bernoff AJ, Logan S, Toolson W (2008) A model for rolling swarms of locusts. Eur Phys J Spec Top 157(1):93–109

    Article  Google Scholar 

  49. Korošec P, Šilc J (2009) A distributed ant-based algorithm for numerical optimization. In: Proceedings of the 2009 Workshop on Bio-inspired Algorithms for Distributed Systems, pp 37–44. https://doi.org/10.1145/1555284.1555291

  50. Kennedy R (1995) J. and eberhart, particle swarm optimization. In: Proceedings of IEEE International Conference on Neural Networks IV, Pages, vol 1000

  51. Shi Y, Eberhart R (1998) A modified particle swarm optimizer. In: 1998 IEEE International Conference on Evolutionary Computation Proceedings. IEEE World Congress on Computational Intelligence (Cat. No. 98TH8360). IEEE, pp 69–73

  52. Qaddoura R, Ala’M A-Z, Almomani I, Faris H (2021) Predicting different types of imbalanced intrusion activities based on a multi-stage deep learning approach. In: 2021 International Conference on Information Technology (ICIT). IEEE, pp 858–863

  53. Chawla NV (2010) Data mining for imbalanced datasets: an overview. Data mining and knowledge discovery handbook, pp 875–886

  54. Lemaître G, Nogueira F, Aridas CK (2017) Imbalanced-learn: A python toolbox to tackle the curse of imbalanced datasets in machine learning. J Mach Learn Res 18(17):1–5

    Google Scholar 

  55. Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, Vanderplas J, Passos A, Cournapeau D, Brucher M, Perrot M, Duchesnay E (2011) Scikit-learn: machine learning in python. J Mach Learn Res 12:2825–2830

    MathSciNet  Google Scholar 

  56. Obiedat R, Qaddoura R, Ala’M A-Z, Al-Qaisi L, Harfoushi O, Alrefai M, Faris H (2022) Sentiment analysis of customers’ reviews using a hybrid evolutionary svm based approach in an imbalanced data distribution. IEEE Access

  57. Sharma S, Sharma S, Athaiya A (2017) Activation functions in neural networks. Towards Data Sci 6(12):310–316

    Google Scholar 

  58. Hush DR (1989) Classification with neural networks: a performance analysis. In: Proceedings of the IEEE International Conference on Systems Engineering, vol 8. Dayton, pp 277–280

Download references

Funding

The authors declare that no funds, grants, or other support were received during the preparation of this manuscript.

Author information

Authors and Affiliations

Authors

Contributions

Conceptualization, H.F. and R.Q.; methodology, H.F. and R.Q.; validation, R.Q.; data curation, R.Q.; writing---original draft preparation, R.Q.; writing---review and editing, R.Q. and H.F.; supervision H.F.; project administration, H.F and R.Q.

Corresponding author

Correspondence to Raneem Qaddoura.

Ethics declarations

Conflict of interest

The authors have no conflict of interest to declare that are relevant to the content of this article.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed Consent

This study does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Qaddoura, R., Faris, H. Evolving random weight neural networks based on oversampled-segmented examples for IoT intrusion detection. J Supercomput 80, 16393–16427 (2024). https://doi.org/10.1007/s11227-024-06071-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-024-06071-3

Keywords

Navigation