Hybrid Deep-GAN Model for Intrusion Detection in IoT Through Enhanced Whale Optimization
Keywords:Intrusion Detection, Distributed-GAN, Generative Adversarial Network, Improved Whale Optimization (IWO), Hybrid Deep Learning, Artificial Neural Network, MPCA, Feature selection, Redundant features, K-mean clustering
IoT networks emerging as a significant growth in modern communication technological applications. The network formed with sensor nodes with resource restrictions in complexity, open wireless transmission features lead them prone to security threats. An efficient Intrusion Detection System aids in detecting attacks and performs crucial counter act to promise secure and reliable function. However, for the reason of the widespread nature of IoT, the intrusion detection system is supposed to carry out in discrete form with fewer fascination on common manager. In order to conquer these issues, Distributed – Generative Adversarial Network (D-GAN) with Enhanced Whale Optimization – Distributed deep learning based on Artificial Neural Network (EWO-HDL+ANN) is proposed. Here the GAN can detect internal attacks and the D-GAN is capable of detecting both internal and external attacks effectively. Transfer By Subspace Similarity is engaged to carry out. After that the preprocessed data is fed into feature extraction stage. Modified Principal Component Analysis (MPCA) is applied to feature extraction, which is used to extract new features that are enlightened. Then, feature selection is executed by Enhanced Whale Optimization Algorithm, which is used to choose significant and superfluous features from the dataset. It gets better the classification accuracy through the greatest fitness value. Then the intrusion detection is evaluated by applying HDL+ANN algorithm used to detect the attacks powerfully. The experimental conclusion proves that the introduced EWO-DDL+ANN method provides enhanced intrusion detection system in the view of greater accuracy, precision, recall, f-measure and low False Positive Rate.
M. A. Al-Garadi, A. Mohamed, A. K. Al-Ali, X. Du, I. Ali, and M. Guizani, “A survey of machine and deep learning methods for Internet of Things (IoT) Security,” IEEE Communications Surveys Tutorials, vol. 22, issue 3, pp. 1646–1685, 2020. https://doi.org/10.1109/COMST.2020.2988293.
M A. Rahman, Md H. Shahriar and R. Masum, “False data injection attacks against contingency analysis in power grids: poster,” Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019, pp. 343–344. https://doi.org/10.1145/3317549.3326323.
S. Smys, A. Basar, and H. Wang, “Hybrid intrusion detection system for Internet of Things (IoT),” Journal of ISMAC, vol. 2, issue 4, pp. 190-199, 2020. https://doi.org/10.36548/jismac.2020.4.002.
B. A. Tama, M. Comuzzi, K.-H. Rhee, “TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system,” IEEE Access, vol. 7, pp. 94497, 2019. https://doi.org/10.1109/ACCESS.2019.2928048.
A. Ferdowsi, W. Saad, “Deep learning for signal authentication and security in massive internet-of-things systems,” IEEE Transactions on Communications, vol. 67, issue 2, pp. 1371-1387, 2018. https://doi.org/10.1109/TCOMM.2018.2878025.
Y. Dai, H. Li, Y. Qian,Y. Guo, M. Zheng, “Anticoncept drift method for malware detector based on generative adversarial network,” Security and Communication Networks, vol. 10, no. 1155, pp.1-12, 2021. https://doi.org/10.1155/2021/6644107.
M. Ahmad, Q. Riaz, M. Zeeshan et al., “Intrusion detection in internet of things using supervised machine learning based on application and transport layer features using UNSW-NB15 data-set,” J Wireless Com Network, vol. 10, issue 2021, 2021. https://doi.org/10.1186/s13638-021-01893-8.
D. Li, et al., “IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning,” International Journal of Information Management, vol. 49, pp. 533-545, 2019. https://doi.org/10.1016/j.ijinfomgt.2019.04.006.
G. Sun, J. Li, J. Dai, Z. Song, F. Lang, Fei, “MIC-based feature selection method for IoT data processing,” Future Generation Computer Systems, vol. 89, 2018. https://doi.org/10.1016/j.future.2018.05.060.
A. Abubakar, B. Pranggono, “Machine learning based intrusion detection system for software defined networks,” Proceedings of the IEEE International Conference on Emerging Security Technologies (EST), 2017. https://doi.org/10.1109/EST.2017.8090413.
M. Ge, X. Fu, N. Syed, Z. Baig, G. Teo, A. Robles-Kelly, “Deep learning-based intrusion detection for IoT networks,” International Symposium on Dependable Computing (PRDC), 2019. https://doi.org/10.1109/PRDC47002.2019.00056.
Y. Peng, G. Fu, Y. Luo, J. Hu, B. Li and Q. Yan, “Detecting adversarial examples for network intrusion detection system with GAN,” Proceedings of the 2020 IEEE 11th International Conference on Software Engineering and Service Science (ICSESS), 2020, pp. 6-10. https://doi.org/10.1109/ICSESS49938.2020.9237728.
M. H. Aysa, A. A. Ibrahim and A. H. Mohammed, “IoT Ddos attack detection using machine learning,” Proceedings of the 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), 2020, pp. 1-7. https://doi.org/10.1109/ISMSIT50672.2020.9254703.
Y. Zhong, S. Fong, S. Hu, R. Wong, W. Lin, “A novel sensor data pre-processing methodology for the Internet of Things using anomaly detection and transfer-by-subspace-similarity transformation,” Sensors, vol. 19, issue 20, 4536, 2019. https://doi.org/10.3390/s19204536. PMID: 31635371; PMCID: PMC6832605.
K. K. Vasan, and B. Surendiran, “Dimensionality reduction using principal component analysis for network intrusion detection,” Perspectives in Science, vol. 8, pp. 510-512, 2016. https://doi.org/10.1016/j.pisc.2016.05.010.
Y. N. Kunang, et al., “Automatic features extraction using autoencoder in intrusion detection system,” Proceedings of the International Conference on Electrical Engineering and Computer Science (ICECOS), 2018, pp. 219-224. https://doi.org/10.1109/ICECOS.2018.8605181.
D. Li, L. Deng, M. Lee, H. Wang, “IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning,” International Journal of Information Management, vol. 49, pp. 533-545, 2019. https://doi.org/10.1016/j.ijinfomgt.2019.04.006.
H. Xu, et al., “An improved binary whale optimization algorithm for feature selection of network intrusion detection,” Proceedings of the 2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), 2018, pp. 10-15. https://doi.org/10.1109/IDAACS-SWS.2018.8525539.
P. V. Huong, L. D. Thuan, L. T. Hong Van and D. V. Hung, “Intrusion detection in IoT systems based on deep learning using convolutional neural network,” Proceedings of the 2019 6th NAFOSTED Conference on Information and Computer Science (NICS), 2019, pp. 448-453. https://doi.org/10.1109/NICS48868.2019.9023871.
S. Hanif, T. Ilyas, and M. Zeeshan, “Intrusion detection in IoT using artificial neural networks on UNSW-15 dataset,” Proceedings of the IEEE International Conference on Smart Cities: Improving Quality of Life Using ICT & IoT and AI (HONET-ICT), 2019, pp. 152-156. https://doi.org/10.1109/HONET.2019.8908122.
Md H. Shahriar, et al., “G-ids: Generative adversarial networks assisted intrusion detection system,” Proceedings of the 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), 2020. arXiv:2006.00676v1. https://doi.org/10.1109/COMPSAC48688.2020.0-218.
C. Yin, et al., “An enhancing framework for botnet detection using generative adversarial networks,” Proceedings of the International Conference on Artificial Intelligence and Big Data (ICAIBD), 2018, pp. 228-234. https://doi.org/10.1109/ICAIBD.2018.8396200.
Y. Zhong, S. Fong, S. Hu, R. Wong, W. Lin, “A novel sensor data pre-processing methodology for the Internet of Things using anomaly detection and transfer-by-subspace-similarity transformation,” Sensors, vol. 19, 4536, 2019. https://doi.org/10.3390/s19204536.
Y. H. Taguchi, and Y. Murakami, “Principal component analysis based feature extraction approach to identify circulating microRNA biomarkers,” PloS one, vol. 8, issue 6, e66714, 2013. https://doi.org/10.1371/journal.pone.0066714.
G. J. Xiong, J. Zhang, D. Y. Shi, Y. He, “Parameter extraction of solar photovoltaic models using an improved whale optimization algorithm,” Energy Convers. Manage, vol. 174, pp. 388–405, 2018. https://doi.org/10.1016/j.enconman.2018.08.053.
Q. Jin, Z. Xu, and W. Cai, “An improved whale optimization algorithm with random evolution and special reinforcement dual-operation strategy collaboration,” Symmetry, vol. 13, issue 2, pp. 1-25, 2021. https://doi.org/10.3390/sym13020238.
Q. Fan, Z. Chen, W. Zhang, X. Fang, “ESSAWOA: Enhanced whale optimization algorithm integrated with salp swarm algorithm for global optimization”, Engineering with Computers, 2020, pp. 1–18. https://doi.org/10.1007/s00366-020-01189-3.
G. I. Sayed, A. Darwish, A. E. Hassanien, “A new chaotic whale optimization algorithm for features selection,” Journal of Classification, vol. 35, issue 2, pp. 300–344, 2018. https://doi.org/10.1007/s00357-018-9261-2.
A. Singh, “Laplacian whale optimization algorithm,” International Journal of System Assurance Engineering and Management, vol. 10, pp. 713–730, 2019. https://doi.org/10.1007/s13198-019-00801-0.
N. El-Khamisy Mohamed, and A. S. M. El-Bhrawy, “Artificial neural networks in data mining,” IOSR Journal of Computer Engineering, vol. 18, pp. 55-59, 2016.
Md A. Parwez, and M. Abulaish, “Multi-label classification of microblogging texts using convolution neural network,” IEEE Access, vol. 7, issue 4, pp. 68678-68691, 2019. https://doi.org/10.1109/ACCESS.2019.2919494.
J.-L. Reyes-Ortiz, et al., “Transition-aware human activity recognition using smart phones,” Neurocomputing, vol. 171, pp. 754-767, 2016. https://doi.org/10.1016/j.neucom.2015.07.085.
How to Cite
LicenseInternational Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:
• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.