Paper 2
Paper 2
Paper 2
Research Article
Artificial Intelligence-Based Security Protocols to Resist
Attacks in Internet of Things
Copyright © 2022 Rashmita Khilar et al. This is an open access article distributed under the Creative Commons Attribution License,
which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
IoT (Internet of Things) usage in industrial and scientific domains is progressively increasing. Currently, IoTs are utilized in
numerous applications in different domains, similar to communication technology, environmental monitoring, agriculture,
medical services, and manufacturing purposes. But, the IoT systems are vulnerable against various intrusions and attacks in the
perspective on the security view. It is essential to create an intrusion detection model to detect and secure the network from
different attacks and anomalies that continually happen in the network. In this paper, the anomaly detection model for an IoT
network using deep neural networks (DNN) with chicken swarm optimization (CSO) algorithm was proposed. Presently, the
DNN has demonstrated its efficiency in different fields that are applicable to its usage. Deep learning is the type of algorithm
based on machine learning which used many layers to gradually extricate more significant features of level from the raw
inputs. The UNSW-NB15 dataset was utilized to evaluate the anomaly detection model. The proposed model obtained 94.85%
accuracy and 96.53% detection rate which is better than other compared techniques like GA-NB, GSO, and PSO for validation.
The DNN-CSO model has performed well in detecting most of the attacks, and it is appropriate for detecting anomalies in the
IoT network.
change in the condition of a system beyond its global or local In Figure 2, the first process is to understand the type of the
norm. This description contains a number of significant dataset collected. The next process is to distinguish the type of
observations about the existence of IoT data: anomaly (i.e., point, contextual, and collective anomalies) from
a predefined collection. The last process was to understand the
(i) Most of the data collected by an IoT system could be training data availability for developing the anomaly detection
taken as “normal” since it reflects the typical operat- model [10]. The novel contributions of this paper are struc-
ing qualities for that particular system tured as follows:
(ii) The definition of a system’s “normal” operation can (i) Presented the anomaly detection model for security
change for a number of reasons over time attack detection by means of DNN with the CSO
(iii) The data produced by an IoT deployment shows algorithms. In this work, the optimization algorithm
only the actual processes that control the monitor- is proposed for optimizing the performance of the
ing system [4] CSO algorithm
In Figure 1, IoT networks consist of less cost sensors that (ii) Deep learning is the class of machine learning algo-
were placed in three types of formats over a wide region, (1) rithms which gradually extracted high-level feature
centralized networks consisting of several, (2) decentralized from raw inputs using many layers. The UNSW-
networks, and (3) block-chain technology-based distributed NB15 dataset was utilized for assessment of the
networks. The sensors in these IoT networks perform the anomaly detection model. This introduction part
important roles in assuring the total efficiency of the IoT discusses the anomaly detection process in IoT and
network [5]. the concept of the proposed model
There are instances in real-world datasets that are differ- The remaining sections will be as follows: Section 2 dis-
ent from every other instance and called as anomalies. The cusses the relevant works on IoT anomaly detection, Section
identification of anomaly was to identify certain standards 3 discusses the proposed methodology, Section 4 presents
whose activity was deemed as abnormally correlated to nor- the performance analysis of the proposed model, and Sec-
mal nodes. The data leakage, fraud detection, and intrusion tion 5 represents the conclusion of the work.
detection system are separate causes of anomalies. Detection
of anomalies is used in a number of IoT domain regions, as
presented in Table 1 [6–8]. 2. Related Works
1.1. Intrusion Detection. IoT devices are linked to the Internet Bagaa et al. proposed a security system for IoT based on
and remain susceptible to attacks related to security. Incidents machine learning model. This system leverages both Net-
such as Denial-of-Service (DoS) and distributed DoS (DDoS) work Function Virtualization (NFV) and Software-Defined
attacks create significant damage to the network. The major Networking (SDN) enablers for reducing various threats.
problem in IoT applications is identification and protection This security system copes automatically with the expanding
from such attacks that are mentioned in Table 1. aspects of security associated with IoT domain. The system
used the distributed data mining system, supervised learn-
1.2. Fraud Detection. IoT networks are still vulnerable dur- ing, and neural network for developing this intrusion detec-
ing logins or online purchases which can result in credit card tion model. The NSL-KDD dataset used for evaluation and
details, bank data, or various sensitive details’ theft. one class SVM technique was used to detect the attacks
and obtained better detection accuracy. Overall, the perfor-
1.3. Data Leakage. Sensitive data from file servers, databases, mance was good and the results obtained were appropriate
and various sources of data could leak to any external agency for this intrusion detection model [1].
that not only contributes to data loss but further generates a Lawal et al. used different classification techniques like k-
threat which could compromise confidential system data. NN, J-48, and Naïve Bayes for classifying different attacks in
Suitable mechanisms of encryption will avoid such leaks. the IoT intrusion detection model. For training and testing,
Anomalies may be identified based on the point-wise, the UNSW-NB15 dataset was utilized. Performance analysis
collective, or contextual forms. Point-wise anomalies tend of J48, k-NN, and NB classifiers utilizing the WEKA applica-
to identify points that essentially deviate from the remaining tion was experimented on this dataset. Outcomes from the
data points and are utilized when series evolutions are not analysis demonstrated that k-NN achieved better accuracy
linear. Typically, it was utilized for detecting fraud. and low FP rate in detecting abnormal and normal traffics,
Typical patterns of the time series like repeated pattern where J48 performed better in classification than NB and
or forms from several IoT devices were identified collective k-NN based on the attack classes [2].
anomalies. Shipping delay in the supply chain is very normal Hoang and Nguyen proposed an anomaly detection
but if there are multiple delays, then it may take investiga- model for IoT network traffic using PCA method. The
tion and also collective study. Contextual anomalies are PCA method was used for reducing higher data dimension.
observed by taking into account the preceding type of infor- A new distance formula was proposed and implemented to
mation or context, like day of the week. Contexts are always derive formulas from past works. Based on those derivations,
very unique to a particular domain [9]. a new technique for anomaly detection in network traffic
Wireless Communications and Mobile Computing 3
Network in IoT
Decentralized Distributed
network network User
Analytics Big data Distributed
blockchain Central server
was implemented and obtained appropriate results using data acquired from the clustering stage was used for training
new distance formula by reducing the computational over- the CART and for classifying future unseen data. The model
head [3]. was able to automate the data labeling, which was an advan-
Sharmat et al. developed an anomaly detection model for tage to reduce human intervention [12].
IoT network using machine learning method. Artificial Deep learning methods have been utilized by some
neural network and logistic regression techniques were used researchers to detect network anomalies. The classification
for classification. The Kaggle dataset was used for perfor- results and deep learning methods were compared in the study
mance evaluation in this work. It was concluded that ANN of [13], and the findings show that the deep learning technique
was better than LR in case 1, and both have performed performed better. However, they only looked at the categoriza-
similar in case 2 [11]. tion study on PortScan and regular network traffic. The actual
Fahim and Sillitti proposed a hybrid learning anomaly network environment has many more network traffic kinds
detection using clustering and classification techniques. For than two, making identification more challenging.
clustering, Hierarchical Affinity Propagation (HAP) was used, The signature-based techniques have a high detection
and for classification, decision tree classifier CART technique accuracy and a fast detection speed; they are ineffective for
was used. The model combines the data into anomaly and detecting unknown network traffic. In comparison, anomaly-
normal clusters by using HAP clustering. Then, the labeled based methods are more adaptable and generalizable, and they
4 Wireless Communications and Mobile Computing
Start
where input sum U j was multiplied by its relative weights,
V ij . The activation is just based on the weights and the
inputs. If the identity will be the output function, hence,
Collected dataset the neuron will be considered as linear. The used output
function was sigmoid.
Identify anomaly
1
type Ri ðu, vÞ = −B
: ð2Þ
1+f ðu, vÞ
Availability of data
for training The error is weight dependent and recommended for
modifying to reduce the errors. The error functions for each
Detection learning neuron’s outputs could be set to
model
F i ðu, v, d Þ = ðRi ðu, vÞ − d i Þ2 : ð3Þ
Anomaly
detection/prediction/analysis The result would be positive, and required targets would
be bigger while the differences were bigger and smaller if the
Normal/abnormal differences were smaller. The network errors would be
behaviour simply a sum of all neuron errors in the output layer:
Figure 2: Anomaly detection flow chart.
F ðu, v, dÞ = 〠 ðRi ðu, vÞ − di Þ2 , ð4Þ
i
perform well even when faced with classification tasks on where Ri and d i were the target output; the weight modified
unknown network traffics. Deep learning approaches, as com- using the gradient descent method after finding this is the
pared to standard machine learning algorithms, have a quicker equation as follows:
processing speed when dealing with large amounts of data and
can learn the deep hidden representation of features with ∂F
greater accuracy. So, in this research, a deep learning-based Δvij = −η : ð5Þ
∂vij
model with optimization algorithm is proposed.
Output Layer
∂F ∂F ∂Ri (3) The hierarchical structure, the close bond, and the
= = 2ðRi − di ÞRi ð1 − Ri Þu j : ð8Þ bond between the mother and child within the group
∂vij ∂Ri ∂vij
will remain constant. These conditions update many
The adjustment will begin from Equations (5) and (8) (G) timely steps
for each weight: (4) Chicken tracks the rooster of their groups’ mate to
look for foods, although they may avoid eating their
Δvij = −2ηðRi − di ÞRi ð1 − Ri Þu j : ð9Þ own food. Consider chickens poaching the best food
found by others, accidentally. The chicks search
In Equation (9), in order to train the networks with an around their mother (a hen) for food. A strong indi-
additional layer, some factors were required specifically on vidual has an upper hand in a food competition
the training period that may be impacted with network
Chickens and chicken activities with the better fitness
architectures [13].
value may look for food across a wide range of distances.
3.2. Chicken Swarm Optimization. CSO was an algorithm of The chicken’s movement ability is given in the following
bioinspired optimization. In the chicken swarm, it imitates condition:
the hierarchical orders and the chicken swarm behaviors.
The chicken swarm could be categorized as several groups, 2
ΔAc+1
i, j = Ai, j ∗ 1 + Randn 0, σ
c
, ð10Þ
containing a rooster and various chicks and hens. Various
chickens followed various laws of movement. Under a par-
ticular hierarchical order, there are competitions between 8
different chickens. Activities of chickens are by the values >
< 1, if f i ≤ f k ,
that follow the principles. σ =
2
ð f k − f iÞ , otherwise, k ∈ ½1, N , k ≠ i,
>
: exp
j f ij + ε
(1) Several groups are present in the chicken swarm. All
groups have a predominant rooster, a few hens, and ð11Þ
chickens
where Randnð0, σ2 Þ was the Gaussian distribution with
(2) How the chicken swarm can be divided into several
mean zero and standard deviations; σ2 was utilized to pre-
classes and identification of chickens according to
vent zero-division-errors. Kis the index of rooster which
fitness value of chicken itself. The chicken with a
was selected at random from the rooster groups, and f was
higher fitness value will be carried out as rooster;
the fitness values of related A. This phenomenon is formu-
each of that would be the group’s head chicken.
lated according to the following:
The chicken with low fitness value will be marked
as chicks. The remainder is to be the hens. The hens
choose randomly the party they want to live in. The i, j = Ai, j + S1 ∗ Rand ∗ Ai, j − Ai, j + S2 ∗ Rand ∗ Ai, j − Ai, j ,
Ac+1 c c+1 c c+1 c
Initialize
repeat
Employ and order the fitness values of chicken using Equations ((10)) and ((11))
Isolate groups and select relations among chickens and hen using Equations ((12)), ((13)), and ((14))
Updating the chicken’s solution till chicken’s swarm find the better solutions using Equation ((15))
Memorizing the better solutions obtained so far
Until (Cycle = Max Cycle Numbers), Save best solutions
Assigning all networks input and outputs to DNN backpropagations
Initializing each weight from step 7
repeat
Presenting the patterns to the networks
Propagating the inputs forward through the networks
for all layers in the networks
for all nodes in the layers
Compute the weighted sum of the input to the nodes
Add threshold to the sum
Compute activation for the nodes
end
end
Propagating the error backwards through the networks
for all nodes in the output layers
Compute error signals
end
for all hidden layers
for all nodes in the layers
Compute node’s signal errors
Updating every node’s weighted in the networks
end
end
Compute Global Errors
Compute the Errors Function
end
While ((max numbers of iteration < than specified))
Algorithm 1
exp ð f i − f r1 Þ chicks, and the mother hens; then, set determined identities
S1 = + ε, ð13Þ for every chick; thirdly, set up the mathematical model by
ðabsð f i Þ
the identities of the chickens and their foraging laws; and
ΔS1 = exp ð ð f r2 − f i ÞÞ: ð14Þ finally, set a specific interval to update the relationship of
chickens frequently. In the group, the number of roosters
The greater the difference between the fitness values of and chicks is smaller than that of hens, and their structures
the two chicken, the lesser the S2 and the greater the dis- are generally simple. The number of hens is the largest,
tance between the positions of the two chickens. So the hens and the hens’ structure is the most difficult in the group.
will not eat the food provided by other chickens quickly. The In this way, the hen model will directly impact the perfor-
formula structure of S1 was different from S2 where there mance of the CSO [15].
are competitions in a group. The chicks travel to search for
food around their mother’ it is expressed as
3.3. DNN-Based CSO Algorithm. Steps 3–5 develop the CSO
algorithm and satisfy Equations (10)–(15) to enhance the
i, j = Ai, j + FL ∗ Am, j = Ai, j ,
Ac+1 ð15Þ
c c c
weights in DNN.
Training Testing
Traffic label Description/characteristic
record record
Worm Intruder replicates itself to spread to other computers 130 44
Shellcodes A small part of the code utilized as the payload in the exploitation of software vulnerability 1133 378
Backdoors A method in which a system security is bypassed stealthily to access a computer or its data. 1746 583
Analyses It includes various attacks of port scan, spam, and html file penetrations 2000 677
Reconnaissance Contains all strikes that can simulate attacks that collect data 10491 3496
A malicious effort to make a network or server resource unavailable to users, usually by
DoS 12264 4089
temporarily suspending or interrupting the host’s services connected to the Internet
Fuzzer Attempting to cause a network or program suspended by feeding it the randomly generated data 18184 6062
The attacker knows of a security issue within an OS or a part of software and leverages that
Exploit 33393 11132
knowledge by exploiting the vulnerability
Generics A method works against each block cipher, without considering about the block-cipher structure 40000 18871
Normal Natural transaction data 56000 37000
Total 175341 82322
the proposed DNN-CSO approach will be compared with 175341 instances, and testing sets include 82332 instances
the other techniques such as GA-NB, GSO, and PSO. from various attack types and normal. In this analysis, just
12 attributes were chosen for performing the analysis from
49 attributes. The attributes chosen were cts-srv-dsst, scrips,
4.1. Description of Dataset. The IXIA PerfectStorm applica- cts-dsst-ltsm, cts-ssrc-dsport-ltsm, cts-ssrc-ltsm, dur, cts-
tion creates the raw network packet of the UNSW-NB15 dsst-ssrc-ltsm, dssport, dsbytes, dsstip, protos, and iss-ftps-
dataset in the Cyber Range Labs of Australian Centre for logins as seen in Table 2. The traffic distributions of the
Cyber Security (ACCS) to create the integration of true dataset are represented in Table 3.
modern general operation and synthetic modern attack
behaviors. Tcp_dump application was utilized to collect 4.2. Performance Metrics. The accuracy was simply a subset
raw traffics over 100 GB (i.e., Pcap file). This dataset of the model’s performances. It is one of the performance
included nine attack types like Backdoor, Analysis, Exploits, indicators used to assess classification approaches. The
Fuzzer, Shellcodes, DoS, Generics, Worm, and Reconnais- following expression was used to compute the accuracy:
sance. Bro-IDS and Argus were utilized, and 12 approaches
were generated for producing 49 attributes overall [21]. The TPV + TNV
dataset was accessible from https://www.unsw.adfa.edu.au/
Accuracy = : ð16Þ
TPV + TNV + FPV + FNV
unsw-canberra-cyber/cyb-ersecurity/ADFA-NB15-Datasets/.
For training and testing, the dataset is divided into 70% Precision was defined as the positive prediction rates. It
for training and 30% for testing. The training sets contain was described as proportions of correctly predicted positive
8 Wireless Communications and Mobile Computing
Accuracy
Backdoors 48.29 52.84 54.27 59.47
50
Analysis 41.40 39.12 55.08 68.14
40
Reconnaissance 56.90 85.36 88.71 90.01
30
DoS 66.10 83.94 85.51 89.82
20
Fuzzers 50.57 66.23 54.18 70.36
10
Exploits 45.85 50.63 48.20 69.15
0
Generic 89.53 90.08 93.46 96.52 GA-NB GSO PSO DNN-CSO
Normal 70.32 82.27 85.86 90.79
Worms ShellCode
Backdoors Analysis
observation to totally predicted positive values. The follow- Figure 4: Accuracy comparison of attacks classified.
ing expression is used to compute precision:
60
50
TPV
DR = : ð19Þ 40
TPV + FNV
30
F1-score was the harmonic mean estimation of precision 20
and recall. This metric, which was connected to accuracy, 10
was ideal for measuring the performance detection of unbal- 0
anced data. GA-NB GSO PSO DNN-CSO