Literature DB >> 35009682

Advanced Feature Extraction and Selection Approach Using Deep Learning and Aquila Optimizer for IoT Intrusion Detection System.

Abdulaziz Fatani1,2, Abdelghani Dahou3, Mohammed A A Al-Qaness4,5, Songfeng Lu6,7, Mohamed Abd Elaziz8,9,10.   

Abstract

Developing cyber security is very necessary and has attracted considerable attention from academy and industry organizations worldwide. It is also very necessary to provide sustainable computing for the the Internet of Things (IoT). Machine learning techniques play a vital role in the cybersecurity of the IoT for intrusion detection and malicious identification. Thus, in this study, we develop new feature extraction and selection methods and for the IDS system using the advantages of the swarm intelligence (SI) algorithms. We design a feature extraction mechanism depending on the conventional neural networks (CNN). After that, we present an alternative feature selection (FS) approach using the recently developed SI algorithm, Aquila optimizer (AQU). Moreover, to assess the quality of the developed IDS approach, four well-known public datasets, CIC2017, NSL-KDD, BoT-IoT, and KDD99, were used. We also considered extensive comparisons to other optimization methods to verify the competitive performance of the developed method. The results show the high performance of the developed approach using different evaluation indicators.

Entities:  

Keywords:  Aquila optimizer; cybersecurity; feature selection; internet of things (IoT); intrusion detection system; sustainable computing; swarm Intelligence

Mesh:

Year:  2021        PMID: 35009682      PMCID: PMC8749550          DOI: 10.3390/s22010140

Source DB:  PubMed          Journal:  Sensors (Basel)        ISSN: 1424-8220            Impact factor:   3.576


1. Introduction

Internet applications help people and society in many fields, including teaching, electronic commerce (EC), electronic learning, entertainment, electronic communication, and others [1]. Along with these applications, cybersecurity issues have been raised due to the vulnerability of the internet applications due to the wide expansion of the networks and the massive emergence of malicious intrusion [1]. Therefore, building security systems is very necessary, and many industrial and academic organizations have developed different systems and solutions. Intrusion detection systems (IDS) are very important for the cybersecurity of the internet of things (IoT) architecture, including also cloud and fog computing. Previously, different methods have been developed for intrusion detection systems (IDS) using traditional machine learning methods, such as k-means clustering [2,3], decision tree (DT) [4,5], k-nearest neighbor (kNN) [6,7], support vector machine (SVM) [8,9], and other traditional machine learning (ML) approaches. With the wide spread of the deep learning methods, in recent years thy are also adopted for IDS, such as multi-layered perceptron neural network [10], convolutional neural networks (CNN) [11], and deep recurrent neural network (RNN) [12]. However, deep leaning approaches required big size of features to achieve high classification accuracy rates. Feature selection (FS) is a necessary preprocessing step in ML applications [13]. In literature, there are different approaches proposed for IDS by improving new FS methods that boosted the efficiency of the IDS. For example, grey wolf optimizer (GWO) [14,15], crow search algorithm (CSA) [16], genetic algorithm (GA) [17,18,19], whale optimization algorithm [20], random harmony search (RHS) [21], and also the well-known, particle swarm optimization (PSO) [22]. Although these approaches showed significant performance, they suffer from certain limitations. For instance, some of them may be stuck at local optima, which degrades the convergence rate and finally on the quality of find decision. In the current study, we present an alternative FS approach for IDS using a recently proposed optimization algorithm called Aquila optimizer (AQU). The AQU was developed by Abualigah et al. [23], which mimics the behaviors of Aquila in nature. It was assessed with different engineering and optimization problems, and it illustrated competitive performance compared to traditional optimization algorithms. The AQU also received wide attention, as it was adopted to solve different problems, such as industrial engineering optimization problems [24], medical image processing [25], and others [26]. The traditional AQU suffers from slow convergence; thus, we use the binary version to boost its performance. In this study, we first apply a light feature extraction approach based on CNN to obtain features from the used datasets. Thereafter, the developed AQU algorithm is utilized to select a subset of the optimal features that reflect the characteristics of the datasets. We use four public benchmark datasets including BoT-IoT, NSL-KDD, CIC2017, and KDD99, to evaluate the developed approach, which showed significant performance. In short, the contribution presented in this paper can be summarized as follows: Using the combination of deep learning and Aquila optimizer (AQU) to enhance IoT security. A feature extractor technique based on CNN is applied to extract relevant features from the datasets, A binary version of the Aquila optimizer is adopted as an FS technique that is used to select optimal features and enhance the classification accuracy. Extensive evaluation is carried out with four public datasets and extensive comparisons to other methods to confirm the quality of the developed approach. The remaining parts of this paper are presented as: Section 2 summarizes several related studies presented in recent years. The basics of the used methods are described in Section 3, whereas the presented IoT approach is introduced in Section 4. Moreover, the evaluation experiments and results outcomes are described in Section 5. Section 6 presents the conclusion and future work.

2. Related Works

In this section, we summarize a number of previous approaches proposed for IDS in IoT and cloud. Shafiq et al. [27] presented an efficient feature selection technique for IoT malicious traffic identification using the Bot-IoT dataset. They used the objective soft set for feature extraction, and they developed a new feature selection method called, CorrACC. Haddadpajouh et al. [28] applied gray wolves optimization (GWO) to improve the multi-kernel SVM for IoT cloud-edge gateway malware detection. GWO is utilized as an FS method which enhanced the classification accuracy. It was evaluated and compared to previous methods, and it reached good results. A  wrapper-based FS method called, CorrAUC was developed by [29] for malicious traffic detection for IoT environments, using Bot-IoT datasets. This method was tested with four machine learning algorithms, and it showed significant performance in reducing feature seize and boosting classification accuracy. Davahli et al. [30] presented a hybrid FS technique using GWO and GA algorithms. This method was employed with the SVM classifier to detect anomalies in wireless sensor networks (WSNs). Mafarja et al. [31] developed a new wrapper feature selection method using an augmented Whale Optimization Algorithm (WOA) for IoT attacks identification. The augmented WOA was employed to handle the high dimensionality of the datasets and to enhance the classification accuracy. They used two transfer functions, S-shaped and V-shaped, into the WOA to boost its performance. The enhanced WOA showed better performance compared to the traditional WOA. Sekhar et al. [32] developed an IDS approach based on Fruitfly optimization with deep Autoencoder. They used fuzzy C-Means rough parameters for data processing to deal with the missing data from the used datasets. After that, the robust features can be extracted from Autoencoder with multi-hidden layers. Then, the extracted features are fed to the BPN (Back Propagation Neural Network) for attacks classification. The Fruitfly optimization algorithm is used to optimize the neurons in the Deep Autoencoder hidden layers. This method was evaluated with UNSW-NB15 and NSL-KDD datasets, and it showed competitive performance. Dwivedi [33] presented an alternative FS approach depending on the grasshopper optimization algorithm (GOA) for IDS. The main goal of this approach is to integrate GOA with the integration of ensemble feature selection (EFS) and creating a new method called EFSGOA. The EFS is used to rank the features to select the relevant features, and then the GOA is used for identifying the significant features. This approach was tested with KDD Cup 99 and NSL-KDD datasets, and it obtained high accuracy rates. Kan et al. [34] used the adaptive PSO and CNN for IDS in the IoT network. In this method, APSO-CNN is working by optimizing one-dimensional CNN structure parameters using the PSO algorithm. It was tested with comparison to other CNN-based methods, and the outcomes showed that the application of PSO has a significant impact on the performance of the CNN. The PSO was also adopted in other IDS systems, such as [35,36,37,38].

3. Background

Aquila Optimizer (AQU)

This section introduces the basic formulation of the Aquila Optimizer (AQU) [23]. In general, the AQU algorithm mimics Aquila’s social behavior in order to catch its prey. AQU is a population-based optimization technique, similar to other metaheuristic (MH) techniques, that begins by forming an initial population X with N agents. The following equation was used to carry out this procedure. In Equation (1), and represent limits of the search space. denotes a random value and is the dimension of agent. The AQU technique’s next step is to do either exploration or exploitation until the best solution is found. There are two ways for exploration and exploitation, according to [23]. The best agent and the average of agents () are employed in the exploration, and its mathematical formulation is given as: The search during the exploration phase is controlled by in Equation (2). The maximum number of generations is denoted by T. The exploration phase employs the Levy flight ( distribution and to update the solutions, and this is represented as: In Equation (5), and . u and denotes the random values. stands for randomly chosen agent. In addition, y and x stands for two parameters used to simulate the spiral shape: In Equation (7), and . refers to a random value. The first technique used in [23] to enhance the agents in the exploitation phase depends on and , similar to exploration, and it is formulated as: In Equation (8), , and stands for the exploitation adjustment parameters. is random value. The agent can be updated using , , and the quality function in the second exploitation strategy. This strategy’s mathematical definition is as follows: In addition, stands for the motions used to track the optimal individual solution, as seen in the following equation: In Equation (11), is a random value. Moreover, stands for parameter which decreasing from 2 to 0, and it is updated as:

4. Proposed Model

Figure 1 depicts the structure of an IDS security scheme for IoT systems. The suggested system is divided into two phases: a feature extraction phase using an efficient CNN based method and a feature selection phase based on the developed AQU algorithm. The presented AQU is based on improving the behavior of classical AQU to make it suitable for the FS problem by implementing its binary version. In the following sections, a description of each stage of the developed IoT security model is given.
Figure 1

Structure of presented IoT security model.

4.1. Representation of Collect IoT Dataset

The fundamental representation of IoT traffic data that will be employed as input to the next stage of the proposed approach is presented in this section. Consider , which is a sample of IoT traffic and is written as: In Equation (15), denotes the ith set of features of traffic (i.e., ). d and n are the number of features and samples respectively. Thereafter, the dataset is normalized based on the min − max approach that defined: where stands for the jth feature of sample i. Therefore, the normalization of TS is formulated as: The next step is to extract the feature using DL model from . The following process of extracting the feature using DL is given in the following section.

4.2. Convolutional Neural Network for Feature Extraction

Convolutional neural networks are well-known deep learning (DL) models applied to solve different problems in image classification, text classification, speech recognition, and object detection. CNN’s are commonly used in computer vision problems. However, CNN’s can be extended and employed in research fields tackling natural language processing [39,40,41], image processing [42,43], green computing [44,45], remote sensing [46,47], and others [48]. Unlike traditional machine learning algorithms that rely on handcrafted feature extraction, CNNs can automatically learn and represent complex features. Meanwhile, CNN’s based models can vary in terms of the type and number of convolution layers, kernel size and its initialization technique, pooling operation, and the fully connected layers. At this stage, the main objective is to learn meaningful representations from the raw data, which helps maximize the overall framework’s recognition accuracy. After the learning phase using the CNN model, the feature selection algorithm is used to filter the extracted features by selecting the most important features only that maximize the classification accuracy. The CNNs are characterized by a core ability that shares weights between multiple layers to minimize the model complexity [49]. The proposed CNN architecture is illustrated in Figure 2, and it is composed of the following layers: (2) Convolutional layers (Conv), (2) Pooling layers, and (4) Fully connected layers (FC). The full network can be summarized as where: (1) Conv1 is the first convolutional layer with 64 filters, kernel of size 3, stride of size 1. Conv1 uses the rectified linear unit (ReLU) [50] as a non-linear function followed by a dropout regularization with a rate equal to 0.5 and a max-pooling operation of size 2, (2) Conv2 is the second convolutional layer similar to Conv1 with the only difference is the usage of an adaptive average pooling layer [51] instead of max-pooling, (3) FC1, FC2, and FC3 are fully connected layer having 128, 128 and 64 neurons, respectively. FC1, FC2, and FC3 are used as feature extraction layers to output the learned features from the raw input, (4) BN stands for batch normalization operation, and (4) FC4 is the final FC layer to output the classification predictions.
Figure 2

The feature extraction module based on a proposed CNN architecture.

The network uses a 1D convolution operation in each convolution layer to learn the raw data activation maps after applying a fixed kernel of size and then uses a max-pooling operation to extract the most relevant features. The convolution operation can be represented as: where is the output activation map of the previous layer . represents the kernel weights while represents the bias value. To learn complex feature representations from the input data, a non-linear function is applied in the convolution operation, which can be defined as in the following equation: where the l and j stands for the l layer and the j channel, respectively. The  is the activation map extracted from the l layer. The ReLU function is introduced in Equation (18). The final feature representation of each input sample is obtained after pooling together the generated activation maps. Two types of pooling operations have been employed in this architecture to extract the most relevant features and down-sampling the features space and learning parameters which helps the model train faster. The final output from Conv2 is fed to a series of fully connected layers where FC3 is used to extract the features (input samples embeddings). The final output from FC3 is fed to FC4 which output the classification results. FC4 applies a Softmax function to generate the probabilities of an input sample to belong to a specific class. Batch normalization (BN) and dropout regularization techniques are used to overcome the network over-fitting and improve the training speed and convergence.

4.3. Feature Selection

The steps of the presented FS model (as in Figure 3) that are used to enhance the security in IoT environment are discussed in this section. In general, the main objective of these steps is to determine the important features that are chosen based on their quality. This is accomplished by the usage of a binary version of AQU. The presented FS approach, named AQU, begins by creating X initial population of N agents; after that, reducing the training data by selecting only the features that correspond to ones in the Boolean version of the current solution. The efficiency of the determined feature is then calculated using the KNN classifier’s error classification. Following that, the best agent with the smallest fitness value is assigned. The agents in the current population are updated based on this best agent and the AQU until they find the best solution.
Figure 3

The FS approach using AQU algorithm.

4.3.1. Generation Initial Population

The presented AQU begins by splitting the tested benchmark data into 80% and 20% training and testing sets, respectively. The beginning population X that consists of N solutions is formed using Equation (19). In Equation (19), D stands for the number of features. represents a random vector with D values. and stand for the boundaries of the search space.

4.3.2. Updating Population

This stage starts with Equation (20) turning into its Boolean value . Based on the output of Equation (20), the number of feature selection is reduced by ignoring the irrelevant features that corresponding zeros value in . Then the fitness value is computed using Equation (21). where stands for the weights applied to control the balancing between the ratio of relevant features and error of classification . In this study, the  is computed based on the KNN classifier using the training set. Thereafter, the best and its corresponding agent (i.e., the best one) are determined. Then update the current agents with operators of AQU as discussed in Section 4.

4.3.3. Terminal Criteria

The stopping conditions are reviewed at this stage, and the updated stage is conducted again when these conditions are not met. Otherwise, the learning process is terminated, and  using as the output that is utilized to minimize the testing set in the next stage.

4.3.4. Validation Stage

To evaluate the presented AQU’s efficiency as an FS approach, the features of the testing set are reduced based on the binary of . Then several performance measures based on the decreased features are employed to compute the quality of the classification process. Algorithm 1 presents the whole description of the presented IoT technique to identify the intrusion. Input: total number of generations (T), and  number of agents (N). Use Equation (14) to normalize the collected IoT data. Using proposed CNN technique to extract the features (as in Section 4.2). After extracting the features, divide the data into training and testing sets. Use Equation (19) to generate population X. Put . while  do Apply Equation (20) to generate the Binary version of . Use Equation (21) to calculate the fitness value for . Find the best agent . Enhance as in Equations (2)–(9) . end while Remove irrelevant features from testing set that corresponding to zeros in . Output: Consider as output and the evaluate the performance.

5. Experiment Results and Discussion

In this section, the quality of the developed IoT security technique is evaluated using a set of different datasets.

5.1. Performance Measures

In this study, we used a set of performance metrics to compute the efficiency of the developed IoT security method. These measures defined using the concept of confusion matrix (as in Table 1). These measure are given in the following.
Table 1

The basic formulation of the confusion matrix, where TP represents true positive, FN indicates false negative, false positive is represented by FP, and TN represents true negative.

Predicted Label
Actual Label Positive Negative
Postive TPFN
Negative FPTN
Average accuracy : The accuracy metric represents the rate of correct detection of the intrusion, and it is formulated as: in which refers to the iteration number(number of runs). Average Recall : or true positive rate (TPR), represents the percentage of predicting positive intrusion. It can be computed as: Average Precision : this illustrates the percentage of true positive cases among all the the positive cases. The can be calculated as: Performance Improvement Rate (PIR): This measure is applied to estimate the improvement rates obtained by the proposed technique. it can be computed as: where and refer to the value of measure (i.e., Precision, Accuracy, Recall, and F1-measure) of the proposed AQU and other algorithms, respectively.

5.2. Experimental Setup

In our experiments, Adam [52] optimizer is used to update the CNN model weights using a 0.005 learning rate. The CNN model was trained for 100 epochs using a 2024 batch size. Concerning the feature selection phase, we compared the proposed FS algorithm named AQU with existing MH techniques in the literature. The MH algorithms selected for comparison including Firefly algorithm (FFA) [53], particle swarm optimization (PSO) [54], whale optimization algorithm (WOA) [55], moth flame optimization (MFO) [56], traditional TSO, multiverse optimization algorithm (MVO) [57], Bat algorithm [58], and Grey wolf optimizer (GWO) [59]. Furthermore, we used the above mentioned MH algorithms with their default parameters based on the original implementation.

5.3. Dataset Description

In this section, we will illustrate in details the source and statistics of the datasets used to validate the proposed framework for the network intrusion detection task. We used four datasets, including KDDCup-99, and its refined version named NSL-KDD, Industrial IoT (IIoT) traffic data named BoT-IoT, and CICIDS-2017. The task is to detect network intrusions based on the extracted features using the CNN model as either intrusion, normal, or the attack type. The datasets are described in the following paragraphs. KDDCup-99 and NSL-KDD: The two datasets are described in Figure 4 with their detailed statistics. The first dataset is KDDCup-99, collected from the DARPA intrusion detection challenge (1998), incorporating 100’s users after monitoring the network traffic on 1000’s machines using UNIX operating system. The challenge period lasts for ten weeks by the MIT Lincon laboratory to store the collected traffic data in TCP dump format. Our experiments used 10% of the collected traffic data to build the KDDCup-99 dataset, which contains five attack types and 41 features. The KDDCup-99 dataset features are classified into three categories, including basic, content, and time-based traffic features. The second dataset is NSL-KDD, a derived copy from the full KDDCup-99 dataset after performing deduplication of the duplicated traffic records.
Figure 4

The KDDCup-99 and NSL-KDD datasets training and testing sets distribution.

BoT-IoT: the Bot-IoT dataset [60] was collected in The center of UNSW Canberra Cyber using smart home appliances in a laboratory environment (the Cyber Range Lab). The dataset contains Industrial IoT (IIoT) traffic samples collected for IIoT experiments. The smart home appliances include weather monitoring systems, thermostats, kitchen appliances, and freezers and motion-controlled lights to record the traffic data. In our experiments, we used the 5% of the full Bot-IoT dataset, which consists of 3.6 million records, where the full dataset contains over 72 million records. The 5% of the entire dataset contains the best ten features extracted from the raw data and categorized into five main classes as described in Figure 5.
Figure 5

The Bot-IoT dataset training and testing sets distribution.

CICIDS-2017: The CICIDS-2017 [61] dataset is a collection of network traffic samples collected in CIC (The Canadian Institute for Cybersecurity at the University of New Brunswick.) for the intrusion detection task. The dataset consists of more than 1.5M PCAPs data simulating traffic data transferred in real-world using the CICFlowMeter software after analyzing 25 user behaviors covering various network protocols such as HTTP and SSH protocols. The collected data were categorized into eight main attack classes as described in Figure 6. Our experiments used the following collected CSV files: Tuesday-working hours, Friday-WorkingHours-Afternoon-PortScan, Friday-WorkingHours-Afternoon-DDos, and Thursday-WorkingHours-Morning-WebAttacks.
Figure 6

The CICIDS-2017 dataset training and testing sets distribution.

5.4. Results and Discussion

The findings of the comparison between the proposed AQU and the other MH approaches are discussed in this section. The average of the employed measures for all compared algorithms are shown in Table 2 and Table 3. For the multi-classification of the BoT-IoT, as shown in Table 2, the performance of most optimization approaches is practically similar during the training period. On the other hand, AQU, delivers excellent performance metrics. Furthermore, the developed AQU has the highest accuracy, specificity, and sensitivity, as well as the best F1-measure.
Table 2

Results of developed AQUa for the datasets in case of multi-classification.

TrainingTesting
AVAcc AVSens AVPrec F1 AVAcc AVSens AVPrec F1
KDD99PSO90.44793.45890.35890.35882.78385.79384.64083.109
WOA92.27593.12692.41497.30484.37585.22582.50187.351
BAT98.00798.24794.84797.33790.34790.58789.134 90.093
TSO95.43994.91991.02797.43787.53687.01680.79187.479
GWO95.51392.38394.06298.48287.61884.48884.13188.533
FFA91.98893.36897.32891.53884.31885.698 91.609 84.285
MVO99.51592.83596.48394.43391.61584.93586.64984.480
MFO96.07397.123 97.631 98.37188.17589.22587.76388.420
AQU 99.920 99.917 97.542 99.920 99.919 92.042 89.82489.987
BIoTPSO 99.483 99.483 99.483 99.48398.94298.97298.94198.940
WOA99.47299.47299.47299.47298.95698.96498.95799.005
BAT99.47599.47599.47599.47499.019 99.021 98.98799.012
TSO99.46099.46099.45999.45998.98698.98198.94199.005
GWO99.47799.47799.47699.47698.99098.95998.97599.019
FFA99.47999.47999.47899.47898.95498.96899.00798.949
MVO99.46899.46899.46899.468 99.031 98.96499.00098.980
MFO99.48099.48099.48099.48098.99899.009 99.013 99.020
AQU98.92598.92598.90498.92598.92698.90498.90598.904
NSL-KDDPSO90.11893.12890.02090.01966.09269.10268.91361.940
WOA91.94792.79792.08096.96867.95168.80171.13168.907
BAT97.66997.90994.50196.98973.67173.91173.50168.905
TSO95.07894.55890.65797.06771.33070.81071.29869.697
GWO95.18292.05293.72498.14371.06667.93672.15169.948
FFA91.66093.04096.99191.20167.43768.81775.87362.944
MVO99.18292.50296.14594.09375.22468.54475.20066.098
MFO95.74596.79597.29798.03571.62672.67676.12269.844
AQU 99.344 99.344 99.298 99.315 76.002 76.002 81.719 71.602
CIC2017PSO99.65099.37099.59099.75099.38099.10099.32099.480
WOA99.69099.69099.49099.45099.43099.43099.24099.190
BAT99.49099.64099.63099.44099.23099.38099.36099.180
TSO99.68099.71099.75099.68099.42099.45099.48099.420
GWO99.37099.56099.43099.38099.11099.30099.18099.120
FFA99.45099.74099.48099.60099.20099.49099.22099.350
MVO99.53099.37099.39099.41099.27099.11099.12099.150
MFO99.36099.43099.37099.48099.10099.17099.12099.220
AQU 99.911 99.909 99.889 99.910 99.911 99.910 99.910 99.888
Table 3

Results of developed AQUa for the datasets in case of Binary.

TrainingTesting
AVAcc AVSens AVPrec F1 AVAcc AVSens AVPrec F1
KDD99PSO90.44993.45990.35990.35982.77585.78584.63892.702
WOA92.27893.12892.41897.30884.60885.45886.69992.705
BAT94.99298.66292.92291.78287.38491.05587.280 92.751
TSO95.29894.59290.82597.33287.59387.09085.28092.541
GWO95.51892.38894.06898.48887.86084.73088.35792.716
FFA91.98793.36797.32791.53784.32785.70791.61492.713
MVO99.51992.83996.48994.43991.84485.16490.76592.701
MFO96.07997.129 97.639 98.37988.41389.46391.92292.710
AQU 99.922 99.922 92.256 99.922 99.922 92.256 94.283 92.683
BIoTPSO99.89999.92999.89899.89899.89899.92899.89699.896
WOA99.91899.92699.91999.96799.91699.92499.91699.965
BAT99.97599.97799.94399.96899.97399.97599.94199.966
TSO99.94999.94499.90599.96999.94799.94299.90399.967
GWO99.95099.91999.93599.97999.94899.91799.93399.977
FFA99.91599.92899.96899.91099.91399.92799.96699.908
MVO99.99099.92399.95999.93999.98999.92299.95899.937
MFO99.95699.96699.97199.97899.95499.96499.96999.976
AQU 99.995 99.994 99.993 99.995 99.994 99.993 99.992 99.992
NSL-KDDPSO90.13393.14390.04390.04367.57570.58573.88267.163
WOA91.95992.80992.09996.98969.40970.25975.97274.115
BAT97.69397.93394.53397.02375.19275.43278.47374.197
TSO95.09194.57190.68197.09172.07871.55873.65673.786
GWO95.20292.07293.75398.17272.94469.81477.80175.609
FFA91.67393.05397.01391.22369.21870.59880.94468.451
MVO99.19792.51796.16794.11776.46669.78679.83571.059
MFO95.76096.81097.32098.06073.18774.23781.17675.162
AQU 99.348 99.348 99.350 99.348 77.382 77.382 83.692 77.077
CIC2017PSO99.68799.40799.62799.38799.68799.40799.62799.787
WOA99.73099.53199.53799.47099.73799.73799.53799.497
BAT99.53799.64799.66799.47299.53799.68799.66799.487
TSO99.72499.65499.74499.43699.72599.75599.78599.725
GWO99.41799.60799.47799.42799.41799.60799.47799.427
FFA99.49799.60199.51799.47099.49799.78799.51799.647
MVO99.57799.41799.42799.45799.57799.41799.42799.457
MFO99.40799.47799.41799.42799.40799.47799.41799.527
AQU 99.996 99.996 99.996 99.996 99.997 99.997 99.997 99.997
For the binary case of Bot-IoT, the AQU has better results in both the training and testing sets. Moreover, the of the proposed AQU method and other optimization approaches is depicted in Figure 7a,b. For multi-classification variants, PIR ranges from 2.56 to 7.354 based on the value of accuracy, where it ranges from 1.080 to 4.410 based on the values of recall. Precision and F-measure range from 1.255 to 5.359 and 0.886 to 4.693, respectively. In binary classification case, the ranges are 2.496 to 0.0946, 0.941 to 4.210, 1.450 to 5.271, and 0.546 to 2.759, respectively.
Figure 7

PIR for multi-classification of (a) Bot-IoT, (c) NSL-KDD, (e) KDDCup-99, and (g) CICIDS-2017 and binary classification of (b) Bot-IoT, (d) NSL-KDD, (f) KDDCup-99, (h) CICIDS-2017.

Also, Table 2 and Figure 7c,d show the comparison results between the AQU and the compared algorithms using the NSL-KDD dataset; These results demonstrate the high performance of the proposed AQU over all compared approaches for both multi and binary classifications. As can be shown from performance measurements and the testing set results, the developed AQU behaves better in the learning phase than compared approaches. Furthermore, the developed AQU outperforms MVO with a difference of about 1.024%, and outperforms PSO with a difference of approximately 13.039%. The developed AQU outperforms existing models according to the value of recall, precision, and F-measure, with differences ranging from 2.75%, 6.85%, and 2.310% to 10.61%, 15.67%, 13.49% respectively. For KDDCup-99, the results of the proposed AQU and all compared algorithms are shown in Table 2 (Figure 7e) and Table 3 (Figure 7f), respectively. We can see that for the multi-classification, the proposed AQU outperforms other approaches in the training stage. However, the BAT and FFA produce higher F1-measure and Precision values than other models. While AQU still outperforms MVO according to the value of accuracy, and there is only a 0.4 difference between the two. Furthermore, the advantage of AQU over binary KDDCup-99 can be seen in the comparison findings for all evaluation indicators. It achieved the best results using both training and testing datasets. Figure 8 shows the average of outcomes of all testing datasets for each algorithm. It can be seen that the AQU has a great ability to improve intrusion detection in both multi and binary classification instances.
Figure 8

The average among the four datasets for (a) Training Binary, (b) Testing Binary, (c) Training Multi-classification, and (d) Testing Multi-classification.

In addition, the results of the competitive algorithms in case of CICIDS-2017 dataset are given in Table 2 and Table 3. It can be observed that the proposed AQU obtained the best results, especially in the multi-classification. Moreover, by comparing the results of AQU with the other model in FS case, it can be noticed that its PIR of accuracy variant from 0.260 to 0.590. However, the PIR of recall, Precision, and F1-Measure is 0.210 to 0.590, 0.212 to 0.580, and 0.210 to 0.570. The same observation can be reached from Figure 7g,h that illustrate the PIR for each algorithm using CICIDS-2017 dataset. Figure 9 depicts the confusion matrix of developed method over the tested datasets.
Figure 9

Confusion Matrix of developed method. (a) KDDCup99, (b) NSL-KDD, (c) BoT-IoT, (d) CICIDS-2017.

The Friedman test [62] is used to assess if there are significant differences between the presented technique and others to further analyze the results. There are two hypotheses in this test: the first, known as the null hypothesis, supposes that there are no differences between the compared algorithms and is accepted the case of the p-value ≥ 0.05. Otherwise, the alternative hypothesis (second one) is adopted which assume a considerable difference in techniques. In the two cases, Table 4 displays the mean rank of each algorithm for the four datasets (i.e., binary and multi-classifications). The proposed AQU obtained the highest mean rank for all applied performance indicators in both scenarios of multi-classification, as can be seen from the results. There is also a substantial distinction between AQU and other approaches.
Table 4

Results of algorithms using Friedman test.

PSOMVOGWOMFOWOAFFABATAQUTSO
Binary classification
Accuracy185.336.3332694.33
Recall4.661.661.33734.33896
Precision1.3364.338374.6691.66
F1-Measure1.662.667.666.334.333.336.3393.66
Multi classification
Accuracy184.66632794.33
Recall52.16172.834896
Precision2.165.663.667.332.337.665.668.661.83
F1-Measure137.3374.3326.58.665.16

6. Conclusions

In this paper, a new approach was proposed for the internet of things (IoT) intrusion detection system (IDS). We leveraged the advances of swarm intelligence (SI) and deep learning techniques. The proposed approach works as follows. First, a designed conventional neural network (CNN) based feature extraction method was applied to obtain the related features from the input datasets. Second, a new variant of the recently developed Aquila optimizer (AQU) was used to select appropriate features and to reduce data dimensionality. The main idea of the developed AQU is to use its binary version to overcome the limitations of the traditional AQU algorithm. To evaluate the developed approach, we used four well-known public datasets, namely, CIC2017, NSL-KDD, BoT-IoT, and KDD99. Moreover, extensive comparisons were carried out with several optimization algorithms, such as WOA, BAT, TSO, GWO, FFA, MVO, and MFO, using several evaluation measures, such as precision, recall, and F1-Measure. The outcomes have confirmed the superiority of the developed AQU against all compared methods. There are still some limitations in the developed method, such as AQU, which can be addressed in future work. Moreover, different swarm intelligence methods will be considered with different deep learning architectures for IDS in the IoT environment.
  3 in total

1.  An Intrusion Detection Mechanism for Secured IoMT Framework Based on Swarm-Neural Network.

Authors:  Sudarshan Nandy; Mainak Adhikari; Mohammad Ayoub Khan; Varun G Menon; Sandeep Verma
Journal:  IEEE J Biomed Health Inform       Date:  2022-05-05       Impact factor: 5.772

2.  COVID-19 image classification using deep features and fractional-order marine predators algorithm.

Authors:  Ahmed T Sahlol; Dalia Yousri; Ahmed A Ewees; Mohammed A A Al-Qaness; Robertas Damasevicius; Mohamed Abd Elaziz
Journal:  Sci Rep       Date:  2020-09-21       Impact factor: 4.379

  3 in total
  3 in total

1.  A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering.

Authors:  Safi Ullah; Jawad Ahmad; Muazzam A Khan; Eman H Alkhammash; Myriam Hadjouni; Yazeed Yasin Ghadi; Faisal Saeed; Nikolaos Pitropakis
Journal:  Sensors (Basel)       Date:  2022-05-10       Impact factor: 3.847

2.  Towards an Explainable Universal Feature Set for IoT Intrusion Detection.

Authors:  Mohammed M Alani; Ali Miri
Journal:  Sensors (Basel)       Date:  2022-07-29       Impact factor: 3.847

3.  Application of Heuristic Algorithms in the Tomography Problem for Pre-Mining Anomaly Detection in Coal Seams.

Authors:  Rafał Brociek; Mariusz Pleszczyński; Adam Zielonka; Agata Wajda; Salvatore Coco; Grazia Lo Sciuto; Christian Napoli
Journal:  Sensors (Basel)       Date:  2022-09-26       Impact factor: 3.847

  3 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.