An IoT Intrusion Detection Approach Based on Salp Swarm and Artificial Neural Network

IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS
Omar A. Alzubi, Jafar A. Alzubi, Issa Qiqieh, Ala' M. Al‐Zoubi
{"title":"An IoT Intrusion Detection Approach Based on Salp Swarm and Artificial Neural Network","authors":"Omar A. Alzubi, Jafar A. Alzubi, Issa Qiqieh, Ala' M. Al‐Zoubi","doi":"10.1002/nem.2296","DOIUrl":null,"url":null,"abstract":"The Internet of Things has emerged as a significant and influential technology in modern times. IoT presents solutions to reduce the need for human intervention and emphasizes task automation. According to a Cisco report, there were over 14.7 billion IoT devices in 2023. However, as the number of devices and users utilizing this technology grows, so does the potential for security breaches and intrusions. For instance, insecure IoT devices, such as smart home appliances or industrial sensors, can be vulnerable to hacking attempts. Hackers might exploit these vulnerabilities to gain unauthorized access to sensitive data or even control the devices remotely. To address and prevent this issue, this work proposes integrating intrusion detection systems (IDSs) with an artificial neural network (ANN) and a salp swarm algorithm (SSA) to enhance intrusion detection in an IoT environment. The SSA functions as an optimization algorithm that selects optimal networks for the multilayer perceptron (MLP). The proposed approach has been evaluated using three novel benchmarks: Edge‐IIoTset, WUSTL‐IIOT‐2021, and IoTID20. Additionally, various experiments have been conducted to assess the effectiveness of the proposed approach. Additionally, a comparison is made between the proposed approach and several approaches from the literature, particularly SVM combined with various metaheuristic algorithms. Then, identify the most crucial features for each dataset to improve detection performance. The SSA‐MLP outperforms the other algorithms with 88.241%, 93.610%, and 97.698% for Edge‐IIoTset, IoTID20, and WUSTL, respectively.","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"9 1","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2024-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Network Management","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1002/nem.2296","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

The Internet of Things has emerged as a significant and influential technology in modern times. IoT presents solutions to reduce the need for human intervention and emphasizes task automation. According to a Cisco report, there were over 14.7 billion IoT devices in 2023. However, as the number of devices and users utilizing this technology grows, so does the potential for security breaches and intrusions. For instance, insecure IoT devices, such as smart home appliances or industrial sensors, can be vulnerable to hacking attempts. Hackers might exploit these vulnerabilities to gain unauthorized access to sensitive data or even control the devices remotely. To address and prevent this issue, this work proposes integrating intrusion detection systems (IDSs) with an artificial neural network (ANN) and a salp swarm algorithm (SSA) to enhance intrusion detection in an IoT environment. The SSA functions as an optimization algorithm that selects optimal networks for the multilayer perceptron (MLP). The proposed approach has been evaluated using three novel benchmarks: Edge‐IIoTset, WUSTL‐IIOT‐2021, and IoTID20. Additionally, various experiments have been conducted to assess the effectiveness of the proposed approach. Additionally, a comparison is made between the proposed approach and several approaches from the literature, particularly SVM combined with various metaheuristic algorithms. Then, identify the most crucial features for each dataset to improve detection performance. The SSA‐MLP outperforms the other algorithms with 88.241%, 93.610%, and 97.698% for Edge‐IIoTset, IoTID20, and WUSTL, respectively.
基于 Salp Swarm 和人工神经网络的物联网入侵检测方法
物联网已成为当代一项重要而有影响力的技术。物联网提出了减少人工干预需求的解决方案,并强调任务自动化。根据思科的一份报告,到 2023 年,物联网设备将超过 147 亿台。然而,随着使用这项技术的设备和用户数量的增加,安全漏洞和入侵的可能性也在增加。例如,智能家电或工业传感器等不安全的物联网设备很容易受到黑客攻击。黑客可能会利用这些漏洞未经授权访问敏感数据,甚至远程控制设备。为解决和防止这一问题,本研究提出将入侵检测系统(IDS)与人工神经网络(ANN)和沙蜂算法(SSA)相结合,以加强物联网环境中的入侵检测。SSA 作为一种优化算法,可为多层感知器(MLP)选择最佳网络。已使用三种新基准对所提出的方法进行了评估:Edge-IIoTset、WUSTL-IIOT-2021 和 IoTID20。此外,还进行了各种实验来评估所提出方法的有效性。此外,还对提出的方法和文献中的几种方法进行了比较,特别是 SVM 与各种元启发式算法的结合。然后,确定每个数据集最关键的特征,以提高检测性能。在 Edge-IIoTset、IoTID20 和 WUSTL 数据集上,SSA-MLP 的检测率分别为 88.241%、93.610% 和 97.698%,优于其他算法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
International Journal of Network Management
International Journal of Network Management COMPUTER SCIENCE, INFORMATION SYSTEMS-TELECOMMUNICATIONS
CiteScore
5.10
自引率
6.70%
发文量
25
审稿时长
>12 weeks
期刊介绍: Modern computer networks and communication systems are increasing in size, scope, and heterogeneity. The promise of a single end-to-end technology has not been realized and likely never will occur. The decreasing cost of bandwidth is increasing the possible applications of computer networks and communication systems to entirely new domains. Problems in integrating heterogeneous wired and wireless technologies, ensuring security and quality of service, and reliably operating large-scale systems including the inclusion of cloud computing have all emerged as important topics. The one constant is the need for network management. Challenges in network management have never been greater than they are today. The International Journal of Network Management is the forum for researchers, developers, and practitioners in network management to present their work to an international audience. The journal is dedicated to the dissemination of information, which will enable improved management, operation, and maintenance of computer networks and communication systems. The journal is peer reviewed and publishes original papers (both theoretical and experimental) by leading researchers, practitioners, and consultants from universities, research laboratories, and companies around the world. Issues with thematic or guest-edited special topics typically occur several times per year. Topic areas for the journal are largely defined by the taxonomy for network and service management developed by IFIP WG6.6, together with IEEE-CNOM, the IRTF-NMRG and the Emanics Network of Excellence.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信