Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3660853.3660856acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaicconfConference Proceedingsconference-collections
research-article

Bio-inspired Intrusion Detection System for Internet of Things Networks Security

Published: 23 June 2024 Publication History

Abstract

The contemporary era has witnessed substantial growth in the Internet of Things (IoT), accompanied by an escalation in data volume due to the proliferation of Internet-connected devices. Unfortunately, this surge has attracted the attention of cybercriminals, who are now targeting IoT networks for malicious activities. Consequently, security and privacy concerns have emerged as the primary obstacles impeding the widespread adoption of IoT. While complete prevention of attacks on any system is not feasible, real-time detection of such attacks is crucial for effectively safeguarding IoT systems. This paper introduces a novel Intrusion Detection System (IDS) that employs supervised machine learning and bio-inspired algorithms to identify security anomalies in IoT networks. The IDS scrutinizes all dataset features to detect intrusive data and trains itself to predict potential network intrusions. However, some features may be extraneous or unrelated to the detection process, resulting in computational complexities and increased detection time. To tackle this issue, we implemented a feature selection process using a modified firefly algorithm to eliminate irrelevant features from the dataset and choose the optimal subset of features (reducing from 74 to 39). This optimization enhances the performance of the IDS by decreasing detection time and improving prediction accuracy. The obtained results affirm that the proposed intrusion detection system is capable of identifying real-world intrusions and can serve as an effective security solution for IoT systems.

References

[1]
Omar Almomani. 2020. A feature selection model for network intrusion detection system based on PSO, GWO, FFA and GA algorithms. Symmetry 12, 6 (2020), 1046.
[2]
Abdullah Alzaqebah, Ibrahim Aljarah, Omar Al-Kadi, and Robertas Damaševičius. 2022. A modified grey wolf optimization algorithm for an intrusion detection system. Mathematics 10, 6 (2022), 999.
[3]
Lucija Brezočnik, Iztok Fister Jr, and Vili Podgorelec. 2018. Swarm intelligence algorithms for feature selection: a review. Applied Sciences 8, 9 (2018), 1521.
[4]
Mohamed Amine Ferrag, Othmane Friha, Djallel Hamouda, Leandros Maglaras, and Helge Janicke. 2022. Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access 10 (2022), 40281–40306.
[5]
Iztok Fister, Iztok Fister Jr, Xin-She Yang, and Janez Brest. 2013. A comprehensive review of firefly algorithms. Swarm and evolutionary computation 13 (2013), 34–46.
[6]
Kathleen Goeschel. 2016. Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, decision trees, and naive Bayes for off-line analysis. In SoutheastCon 2016. IEEE, 1–6.
[7]
Isabelle Guyon and André Elisseeff. 2003. An introduction to variable and feature selection. Journal of machine learning research 3, Mar (2003), 1157–1182.
[8]
Yasmine Harbi, Zibouda Aliouat, Allaoua Refoufi, and Saad Harous. 2019. Efficient end-to-end security scheme for privacy-preserving in iot. In 2019 International Conference on Networking and Advanced Systems (ICNAS). IEEE, 1–6.
[9]
Yasmine Harbi, Zibouda Aliouat, Allaoua Refoufi, and Saad Harous. 2021. Recent security trends in internet of things: A comprehensive survey. IEEE Access 9 (2021), 113292–113314.
[10]
Nirmal Kumar Katiyar, Gaurav Goel, Sara Hawi, and Saurav Goel. 2021. Nature-inspired materials: Emerging trends and prospects. NPG Asia Materials 13, 1 (2021), 56.
[11]
Neelu Khare, Preethi Devan, Chiranji Lal Chowdhary, Sweta Bhattacharya, Geeta Singh, Saurabh Singh, and Byungun Yoon. 2020. Smo-dnn: Spider monkey optimization and deep neural network hybrid classifier model for intrusion detection. Electronics 9, 4 (2020), 692.
[12]
Rana F Najeeb and Ban N Dhannoon. 2018. A feature selection approach using binary firefly algorithm for network intrusion detection system. ARPN Journal of Engineering and Applied Sciences 13, 6 (2018), 2347–2352.
[13]
Yakub Kayode Saheed. 2022. A Binary Firefly Algorithm Based Feature Selection Method on High Dimensional Intrusion Detection Data. In Illumination of Artificial Intelligence in Cybersecurity and Forensics. Springer, 273–288.
[14]
Richa Singh and RL Ujjwal. 2023. Hybridized bio-inspired intrusion detection system for Internet of Things. Frontiers in Big Data 6 (2023), 1081466.
[15]
Xin-She Yang. 2009. Firefly algorithms for multimodal optimization. In International symposium on stochastic algorithms. Springer, 169–178.

Index Terms

  1. Bio-inspired Intrusion Detection System for Internet of Things Networks Security

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    AICCONF '24: Proceedings of the Cognitive Models and Artificial Intelligence Conference
    May 2024
    367 pages
    ISBN:9798400716928
    DOI:10.1145/3660853
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 23 June 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Decision Tree
    2. Edge-IIoTset.
    3. Feature selection
    4. Firefly algorithm
    5. IDS
    6. Machine Learning

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    AICCONF '24

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 22
      Total Downloads
    • Downloads (Last 12 months)22
    • Downloads (Last 6 weeks)7
    Reflects downloads up to 15 Oct 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media