Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Soft computing for anomaly detection and prediction to mitigate IoT-based real-time abuse

Published: 10 May 2021 Publication History

Abstract

Cyber-surveillance and connected devices can be misused to monitor, harass, isolate, and otherwise, harm individuals. In particular, these devices gather high volumes of personal data such as account details with shared passwords, person’s behavior and preferences, movements by GPS, and audio-video recordings which can be maneuvered. It is therefore imperative to define approaches that help mitigate the Internet of things (IoT)-based real-time abuse in a pro-active, reactive, or predictive manner. The key objective of this research is to outline and categorize such approaches. Further, to comprehend predictive analytics as a potential solution to mitigate technology abuse, we propose an anomaly detection methodology (MFEW_Bagging) to classify normal and abnormal use pattern categories in an Intrusion Detection System (IDS) for IoT system. A hybrid feature selection technique based on an ensemble of multiple filter–based techniques and a wrapper algorithm is firstly used as search method for finding an optimal feature subset. Further, ensemble learning technique, namely bagging, is used for final classification into normal and abnormal use pattern categories. The use of ensemble feature selection removes biasness of individual feature selection method during ensemble and identifies the optimal subset with non-redundant and relevant features. The proposed methodology is evaluated on publicly available real-time IDS dataset. The research persuades the need of designing robust and lightweight IDS for IoT-based smart environments which understand the cyber-security risks in a proactive predictive manner as it the best way to defend networks and systems with the growing IoT complexity.

References

[1]
Blum RW and Nelson-Mmari K The health of young people in a global context J Adolesc Health 2004 35 5 402-418
[2]
Mercy JA, Hillis SD, Butchart A, Bellis MA, Ward CL, Fang X, and Rosenberg ML Interpersonal violence: global impact and paths to prevention 2017
[3]
Pramod M, Bhaskar CVU, and Shikha K IOT wearable device for the safety and security of women and girl child Int J Mech Eng Technol 2018 9 1 83-88
[4]
Ye L, Ferdinando H, Seppänen T, Alasaarela E (2014) Physical violence detection for preventing school bullying. Adv Artif Intell 2014(2014):1–9
[5]
Vartak GG (2020) Smart security system for women and children using IoT. Adv Innov Res 131
[6]
Kumar A and Garg G Sentiment analysis of multimodal twitter data Multimed Tools Appl 2019 78 17 24103-24119
[7]
Kumar A, Sachdeva N (2021) Multimodal cyberbullying detection using capsule network with dynamic routing and deep convolutional neural network. Multimedia Systems.
[8]
Kumar A, Sachdeva N (2020) Multi-input integrative learning using deep neural networks and transfer learning for cyberbullying detection in real-time code-mix data. Multimedia Systems:1–15
[9]
Khan S, Gani A, Wahab AWA, Shiraz M, and Ahmad I Network forensics: review, taxonomy, and open challenges J Netw Comput Appl 2016 66 214-235
[10]
Visoottiviseth V, Akarasiriwong P, Chaiyasart S, & Chotivatunyu S (2017) PENTOS: penetration testing tool for Internet of thing devices. In TENCON 2017-2017 IEEE Region 10 Conference (pp. 2279-2284). IEEE.
[11]
Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, and Faruki P Network intrusion detection for IoT security based on learning techniques IEEE Commun Surv Tut 2019 21 3 2671-2701
[12]
Buczak AL and Guven E A survey of data mining and machine learning methods for cyber security intrusion detection IEEE Commun Surv Tut 2015 18 2 1153-1176
[13]
Sajith PJ and Nagarajan G Optimized Intrusion Detection System using computational intelligent algorithm 2021 Singapore Springer
[14]
Gendreau AA and Moorman M Survey of intrusion detection systems towards an end to end secure Internet of things 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud) 2016 Vienna IEEE 84-90
[15]
Sangwan SR and Bhatia MPS Denigration bullying resolution using wolf search optimized online reputation rumour detection Procedia Comput Sci 2020 173 305-314
[16]
Jain DK, Kumar A, Sangwan SR, Nguyen GN, and Tiwari P A particle swarm optimized learning model of fault classification in Web-Apps IEEE Access 2019 7 18480-18489
[17]
Ebrahimpour MK and Eftekhari M Ensemble of feature selection methods: a hesitant fuzzy sets approach Appl Soft Comput 2017 50 300-312
[18]
Kumar A and Jaiswal A Swarm intelligence based optimal feature selection for enhanced predictive sentiment accuracy on twitter Multimed Tools Appl 2019 78 20 29529-29553
[19]
Kumar A and Jaiswal A A deep swarm-optimized model for leveraging industrial data analytics in cognitive manufacturing IEEE Trans Ind Informat 2020 17 4 2938-2946
[20]
Yang Y, & Pedersen JO (1997). A comparative study on feature selection in text categorization. In Icml (Vol. 97, No. 412-420, p. 35).
[21]
Omar N, Jusoh F, Ibrahim R, and Othman MS Review of feature selection for solving classification problems J Inf Syst Res Innov 2013 3 64-70
[22]
Kononenko I (1994) Estimating attributes: analysis and extensions of RELIEF. In European conference on machine learning (pp. 171-182). Springer, Berlin, Heidelberg.
[23]
Sangwan SR, Bhatia MPS (2020) D-BullyRumbler: a safety rumble strip to resolve online denigration bullying using a hybrid filter-wrapper approach. Multimedia Systems:1–17
[24]
Dorigo M (1992) Optimization, learning and natural algorithms. PhD Thesis, Politecnico di Milano. Kononenko, I. (1994, April).
[25]
Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009, July). A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE symposium on computational intelligence for security and defense applications (pp. 1-6). IEEE.
[26]
Ahmim A, Derdour M, and Ferrag MA An intrusion detection system based on combining probability predictions of a tree of classifiers Int J Commun Syst 2018 31 9
[27]
Xiaofeng Z, & Xiaohong H (2017) Research on intrusion detection based on improved combination of K-means and multi-level SVM. In: 2017 IEEE 17th international conference on communication technology (ICCT) (pp. 2042-2045). IEEE.
[28]
Omar S, Ngadi A, and Jebur HH Machine learning techniques for anomaly detection: an overview Int J Comput Appl 2013 79 2 33-41
[29]
Chkirbene Z, Erbad A, Hamila R, Mohamed A, Guizani M, and Hamdi M TIDCS: a dynamic intrusion detection and classification system based feature selection IEEE Access 2020 8 95864-95877
[30]
Xiao Y, Xing C, Zhang T, and Zhao Z An intrusion detection model based on feature reduction and convolutional neural networks IEEE Access 2019 7 42210-42219
[31]
Kasongo SM and Sun Y A deep learning method with filter based feature engineering for wireless intrusion detection system IEEE Access 2019 7 38597-38607
[32]
Osanaiye O, Cai H, Choo KKR, Dehghantanha A, Xu Z, and Dlodlo M Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing EURASIP J Wirel Commun Netw 2016 2016 1 1-10
[33]
Zhou Y, Cheng G, Jiang S, and Dai M Building an efficient intrusion detection system based on feature selection and ensemble classifier Comput Netw 2020 174 107247
[34]
Breiman L Bagging predictors Mach Learn 1996 24 2 123-140

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Personal and Ubiquitous Computing
Personal and Ubiquitous Computing  Volume 28, Issue 1
Feb 2024
368 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 10 May 2021
Accepted: 15 April 2021
Received: 01 March 2021

Author Tags

  1. Security
  2. Soft computing
  3. Abuse
  4. IoT
  5. Anomaly
  6. Intrusion

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media