Intrusion Detection System in IoT Based on GA-ELM Hybrid Method

IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS
Elijah M. Maseno, Z. Wang, Fangzhou Liu
{"title":"Intrusion Detection System in IoT Based on GA-ELM Hybrid Method","authors":"Elijah M. Maseno, Z. Wang, Fangzhou Liu","doi":"10.12720/jait.14.4.625-629","DOIUrl":null,"url":null,"abstract":"—In recent years, we have witnessed rapid growth in the application of IoT globally. IoT has found its applications in governmental and non-governmental institutions. The integration of a large number of electronic devices exposes IoT technologies to various forms of cyber-attacks. Cybercriminals have shifted their focus to the IoT as it provides a broad network intrusion surface area. To better protect IoT devices, we need intelligent intrusion detection systems. This work proposes a hybrid detection system based on Genetic Algorithm (GA) and Extreme Learning Method (ELM). The main limitation of ELM is that the initial parameters (weights and biases) are chosen randomly affecting the algorithm’s performance. To overcome this challenge, GA is used for the selection of the input weights. In addition, the choice of activation function is key for the optimal performance of a model. In this work, we have used different activation functions to demonstrate the importance of activation functions in the construction of GA-ELM. The proposed model was evaluated using the TON_IoT network data set. This data set is an up-to-date heterogeneous data set that captures the sophisticated cyber threats in the IoT environment. The results show that the GA-ELM model has a high accuracy compared to single ELM. In addition, Relu outperformed other activation functions, and this can be attributed to the fact that it is known to have fast learning capabilities and solves the challenge of vanishing gradient witnessed in the sigmoid activation function.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":"1 1","pages":""},"PeriodicalIF":0.9000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Advances in Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12720/jait.14.4.625-629","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 1

Abstract

—In recent years, we have witnessed rapid growth in the application of IoT globally. IoT has found its applications in governmental and non-governmental institutions. The integration of a large number of electronic devices exposes IoT technologies to various forms of cyber-attacks. Cybercriminals have shifted their focus to the IoT as it provides a broad network intrusion surface area. To better protect IoT devices, we need intelligent intrusion detection systems. This work proposes a hybrid detection system based on Genetic Algorithm (GA) and Extreme Learning Method (ELM). The main limitation of ELM is that the initial parameters (weights and biases) are chosen randomly affecting the algorithm’s performance. To overcome this challenge, GA is used for the selection of the input weights. In addition, the choice of activation function is key for the optimal performance of a model. In this work, we have used different activation functions to demonstrate the importance of activation functions in the construction of GA-ELM. The proposed model was evaluated using the TON_IoT network data set. This data set is an up-to-date heterogeneous data set that captures the sophisticated cyber threats in the IoT environment. The results show that the GA-ELM model has a high accuracy compared to single ELM. In addition, Relu outperformed other activation functions, and this can be attributed to the fact that it is known to have fast learning capabilities and solves the challenge of vanishing gradient witnessed in the sigmoid activation function.
基于GA-ELM混合方法的物联网入侵检测系统
-近年来,我们见证了物联网在全球范围内的应用快速增长。物联网已经在政府和非政府机构中得到了应用。大量电子设备的集成使物联网技术面临各种形式的网络攻击。网络犯罪分子已经将注意力转移到物联网上,因为它提供了广泛的网络入侵表面积。为了更好地保护物联网设备,我们需要智能入侵检测系统。本文提出了一种基于遗传算法(GA)和极限学习方法(ELM)的混合检测系统。ELM的主要限制是初始参数(权重和偏差)是随机选择的,影响算法的性能。为了克服这一挑战,遗传算法被用于选择输入权重。此外,激活函数的选择是模型实现最佳性能的关键。在这项工作中,我们使用了不同的激活函数来证明激活函数在GA-ELM构建中的重要性。利用TON_IoT网络数据集对所提出的模型进行了评估。该数据集是最新的异构数据集,可捕获物联网环境中复杂的网络威胁。结果表明,GA-ELM模型与单一ELM模型相比具有较高的精度。此外,Relu优于其他激活函数,这可以归因于它具有快速学习能力,并解决了sigmoid激活函数中出现的梯度消失的挑战。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Journal of Advances in Information Technology
Journal of Advances in Information Technology Computer Science-Information Systems
CiteScore
4.20
自引率
20.00%
发文量
46
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信