| Literature DB >> 36015878 |
Hassan A Alterazi1, Pravin R Kshirsagar2, Hariprasath Manoharan3, Shitharth Selvarajan4, Nawaf Alhebaishi5, Gautam Srivastava6,7, Jerry Chun-Wei Lin8.
Abstract
High security for physical items such as intelligent machinery and residential appliances is provided via the Internet of Things (IoT). The physical objects are given a distinct online address known as the Internet Protocol to communicate with the network's external foreign entities through the Internet (IP). IoT devices are in danger of security issues due to the surge in hacker attacks during Internet data exchange. If such strong attacks are to create a reliable security system, attack detection is essential. Attacks and abnormalities such as user-to-root (U2R), denial-of-service, and data-type probing could have an impact on an IoT system. This article examines various performance-based AI models to predict attacks and problems with IoT devices with accuracy. Particle Swarm Optimization (PSO), genetic algorithms, and ant colony optimization were used to demonstrate the effectiveness of the suggested technique concerning four different parameters. The results of the proposed method employing PSO outperformed those of the existing systems by roughly 73 percent.Entities:
Keywords: ant colony optimization; artificial intelligence; cyber security threats; genetic algorithm; optimization techniques; particle swarm optimization
Mesh:
Year: 2022 PMID: 36015878 PMCID: PMC9413110 DOI: 10.3390/s22166117
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Figure 1IoT environment threat dimensions.
Figure 2Block diagram for optimized hybrid artificial intelligence-based IoT-enabled cyber security system for a smart home.
Comparison of the proposed technique with previous works.
| Reference | Data Technique Used | Type of Algorithm | Objectives |
|---|---|---|---|
| [ | Internet of Things | Artificial Intelligence | Cyber security operations with high network gateways |
| [ | Layering procedure using Internet of Things | Artificial Intelligence | Compatibility of transportation applications with cyber security |
| [ | - | Artificial Intelligence | Intelligent interactive devices for smart home applications with cyber security |
| [ | Intrusion detection | Artificial Intelligence | Better service for cyber security operation and intelligent management |
| [ | Pathway management | Artificial Intelligence | Increasing the secured operations for industrial applications |
| [ | Deep generative model | Deep learning | Face recognition with a clone detection mechanism |
| Proposed | Internet of Things and cloud management | Artificial Intelligence | Building smart homes with enhanced cyber security features |
Figure 3Flowchart of PSO algorithm.
Statistical information about the NSL-KDD dataset.
| KDD Dataset | Abnormal | Normal | Total | ||
|---|---|---|---|---|---|
| DOS | Probing | U2R | |||
| Training data | 55,967 | 12,378 | 75 | 70,656 | 139,076 |
| Test data | 7590 | 3021 | 220 | 9823 | 20,654 |
Performance metrics for different optimization techniques based on the attack detected.
| Algorithm | Attacks | Accuracy (%) | Precision (%) | Recall (%) | F-Measure (%) |
|---|---|---|---|---|---|
| GA | DOS | 98.90 | 98.90 | 94.90 | 96.89 |
| Probe | 84.78 | 91.89 | 68.12 | 70.01 | |
| U2R | 99.90 | 99.78 | 99.67 | 99.21 | |
| ACO | DOS | 98.89 | 97.95 | 95.87 | 98.45 |
| Probe | 86.23 | 88.92 | 84.54 | 83.67 | |
| U2R | 99.87 | 99.05 | 82.76 | 88.94 | |
| PSO | DOS | 99.50 | 99.93 | 99.54 | 99.65 |
| Probe | 86.78 | 88.90 | 86.98 | 84.81 | |
| U2R | 99.98 | 99.67 | 99.01 | 98.34 |
Figure 4Performance metrics for GA with different attacks: (a) existing; (b) proposed.
Figure 5Performance metrics for ACO with different attacks: (a) existing; (b) proposed.
Figure 6Performance metrics for PSO with different attacks: (a) existing; (b) proposed.
Figure 7Parametric values (a) F1, F2, and (b) F-measure.
Algorithm parameters for the PSO using empirical data.
| F1 | F2 | h | Accuracy |
|---|---|---|---|
| 0.8 | 0.6 | 1.0 | 98.45 |
| 0.8 | 0.6 | 0.9 | 97.73 |
| 0.8 | 0.6 | 1.0 | 98.12 |
| 0.7 | 0.6 | 1.0 | 98.09 |
| 0.6 | 0.5 | 1.0 | 99.46 |
PSO method results in utilizing a constant number of particles and increasing the number of iterations.
| Particles | Iterations | Accuracy | Precision | F-Measure |
|---|---|---|---|---|
| 2500 | 25 | 97.90 | 97.89 | 97.12 |
| 2500 | 26 | 98.06 | 97.03 | 97.56 |
| 2500 | 27 | 98.45 | 96.43 | 96.49 |
| 2500 | 28 | 98.23 | 97.63 | 98.62 |
| 2500 | 29 | 99.56 | 99.54 | 99.32 |
| 2500 | 30 | 97.96 | 97.87 | 97.51 |
Figure 8PSO algorithm using a fixed number of particles with increased iterations.
Figure 9PSO algorithm with different feature sizes.
Observations of the PSO algorithm with different feature sizes.
| Features | Accuracy | Precision | F-Measure |
|---|---|---|---|
| 10 | 99.45 | 99.03 | 99.89 |
| 12 | 98.09 | 97.46 | 97.43 |
| 15 | 98.83 | 98.03 | 98.69 |
| 18 | 98.23 | 98.67 | 97.52 |
| 20 | 97.12 | 97.23 | 98.86 |