Development of novel intrusion detection in Internet of Things using improved dart game optimizer-derived optimal cascaded ensemble learning

IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS
A. Shali, Dr. A. Chinnasamy, P. Selvakumari
{"title":"Development of novel intrusion detection in Internet of Things using improved dart game optimizer-derived optimal cascaded ensemble learning","authors":"A. Shali,&nbsp;Dr. A. Chinnasamy,&nbsp;P. Selvakumari","doi":"10.1002/ett.5018","DOIUrl":null,"url":null,"abstract":"<div>\n \n \n <section>\n \n <h3> Background of the Study</h3>\n \n <p>Internet of things (IoT) industry has accelerated its development with the support of advanced information technology and economic expansion. A complete industrial foundation includes software, chips, electronic components, IoT services, integrated systems, machinery, and telecom operators, which the gradual improvement in the IoT industry system has formulated. As the exponential growth of IoT devices increases, the attack surface available to cybercriminals enables them to carry out potentially more damaging operations. As a result, the security sector has witnessed a rise in cyberattacks. Hackers use several methods to copy and modify the information in the IoT environment. Machine learning techniques are used by the intrusion detection (ID) model to determine and categorize attacks in IoT networks.</p>\n </section>\n \n <section>\n \n <h3> Objectives</h3>\n \n <p>Thus, this study explores the ID system with the heuristic-assisted deep learning approaches for effectively detect the attacks in the IoT. At first, the IoT data are garnered in benchmark resources. Then, the gathered data is preprocessed to perform data cleaning. Next, the data is transformed and fed to the feature extraction stage. The feature extraction is performed with the help of one-dimensional convolutional neural network (1D-CNN), where the features are extracted from the target-based pooling layer. Then, these attained deep features are fed to the ID phase, where the cascaded ensemble learning (CEL) approach is adopted for detecting the intrusions. Here, the hyperparameter tuning is done with a new suggested improved darts game optimizer (IDGO) algorithm. Here, the main objective of the developed algorithm helps to maximize accuracy in ID.</p>\n </section>\n \n <section>\n \n <h3> Findings</h3>\n \n <p>Throughout the experimental findings, the developed model provides 86% of accuracy. Thus, the finding of the developed model shows less detecting time and higher detection efficiency.</p>\n </section>\n </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 7","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Emerging Telecommunications Technologies","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ett.5018","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

Background of the Study

Internet of things (IoT) industry has accelerated its development with the support of advanced information technology and economic expansion. A complete industrial foundation includes software, chips, electronic components, IoT services, integrated systems, machinery, and telecom operators, which the gradual improvement in the IoT industry system has formulated. As the exponential growth of IoT devices increases, the attack surface available to cybercriminals enables them to carry out potentially more damaging operations. As a result, the security sector has witnessed a rise in cyberattacks. Hackers use several methods to copy and modify the information in the IoT environment. Machine learning techniques are used by the intrusion detection (ID) model to determine and categorize attacks in IoT networks.

Objectives

Thus, this study explores the ID system with the heuristic-assisted deep learning approaches for effectively detect the attacks in the IoT. At first, the IoT data are garnered in benchmark resources. Then, the gathered data is preprocessed to perform data cleaning. Next, the data is transformed and fed to the feature extraction stage. The feature extraction is performed with the help of one-dimensional convolutional neural network (1D-CNN), where the features are extracted from the target-based pooling layer. Then, these attained deep features are fed to the ID phase, where the cascaded ensemble learning (CEL) approach is adopted for detecting the intrusions. Here, the hyperparameter tuning is done with a new suggested improved darts game optimizer (IDGO) algorithm. Here, the main objective of the developed algorithm helps to maximize accuracy in ID.

Findings

Throughout the experimental findings, the developed model provides 86% of accuracy. Thus, the finding of the developed model shows less detecting time and higher detection efficiency.

Abstract Image

利用改进的飞镖游戏优化器衍生的优化级联集合学习,开发物联网中的新型入侵检测系统
研究背景 物联网(IoT)产业在先进信息技术和经济扩张的支撑下加速发展。一个完整的产业基础包括软件、芯片、电子元器件、物联网服务、集成系统、机械、电信运营商等,物联网产业体系的逐步完善使之形成。随着物联网设备的指数级增长,网络犯罪分子可利用的攻击面也随之增加,使他们有可能实施更具破坏性的行动。因此,安全领域的网络攻击也随之增加。黑客使用多种方法复制和修改物联网环境中的信息。入侵检测(ID)模型使用机器学习技术对物联网网络中的攻击进行判断和分类。 因此,本研究利用启发式辅助深度学习方法探索 ID 系统,以有效检测物联网中的攻击。首先,在基准资源中收集物联网数据。然后,对收集到的数据进行预处理,以执行数据清理。然后,对数据进行转换并送入特征提取阶段。特征提取是在一维卷积神经网络(1D-CNN)的帮助下进行的,其中的特征是从基于目标的池化层中提取的。然后,这些获得的深度特征被送入 ID 阶段,在该阶段采用级联集合学习(CEL)方法来检测入侵。在这里,超参数调整是通过一种新建议的改进飞镖游戏优化器(IDGO)算法完成的。在这里,所开发算法的主要目标是帮助最大限度地提高 ID 的准确性。 实验结果 纵观实验结果,所开发的模型提供了 86% 的准确率。因此,所开发模型的检测时间更短,检测效率更高。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
8.90
自引率
13.90%
发文量
249
期刊介绍: ransactions on Emerging Telecommunications Technologies (ETT), formerly known as European Transactions on Telecommunications (ETT), has the following aims: - to attract cutting-edge publications from leading researchers and research groups around the world - to become a highly cited source of timely research findings in emerging fields of telecommunications - to limit revision and publication cycles to a few months and thus significantly increase attractiveness to publish - to become the leading journal for publishing the latest developments in telecommunications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信