利用深度自动编码器进行塔斯马尼亚魔鬼优化,用于物联网辅助无人机网络的入侵检测

IF 6 2区 工程技术 Q1 ENGINEERING, MULTIDISCIPLINARY
Noha Negm , Hayam Alamro , Randa Allafi , Majdi Khalid , Amal M. Nouri , Radwa Marzouk , Aladdin Yahya Othman , Noura Abdelaziz Ahmed
{"title":"利用深度自动编码器进行塔斯马尼亚魔鬼优化,用于物联网辅助无人机网络的入侵检测","authors":"Noha Negm ,&nbsp;Hayam Alamro ,&nbsp;Randa Allafi ,&nbsp;Majdi Khalid ,&nbsp;Amal M. Nouri ,&nbsp;Radwa Marzouk ,&nbsp;Aladdin Yahya Othman ,&nbsp;Noura Abdelaziz Ahmed","doi":"10.1016/j.asej.2024.102943","DOIUrl":null,"url":null,"abstract":"<div><h3>Background</h3><div>Recently, a developing count of physical objects is linked to the Internet at an unprecedented rate, calcifying the knowledge of the Internet of Things (IoT). In several paradigms of IoT applications, unmanned aerial vehicles (UAVs) and satellites for IoT have concerned much attention and are experiencing quick progress. As for UAVs, because of their superiority in maneuverability and cost, it is established an increasingly extensive consumption in several IoT scenarios like disaster relief, rapid transportation, and environment monitoring. Security remains a main problem in the IoT supported UAV networks that are solved by the employ of intrusion detection system (IDS) methods.</div></div><div><h3>Objective</h3><div>This article aims to present a Tasmanian Devil Optimization with Deep Autoencoder for Intrusion Detection System (TDODAE-IDS) technique in IoT assisted Unmanned Aerial Vehicle Networks.</div></div><div><h3>Methods</h3><div>The presented TDODAE-IDS technique majorly concentrates on the effectual identification of the intrusions in the IoT based UAV networks. To accomplish this, the presented TDODAE-IDS system designs a new TDO algorithm for the feature subset selection process. Moreover, the DAE model classifies the existence of intrusion in the UAV network and the hyperparameter tuning of the DAE model takes place using the dragonfly algorithm (DFA).</div></div><div><h3>Results</h3><div>The simulation results of the TDODAE-IDS approach were tested on a benchmark IDS dataset and the results are assessed under several measures.</div></div><div><h3>Conclusion</h3><div>The comprehensive comparative analysis highlighted the enhanced outcomes of the TDODAE-IDS algorithm over other recent approaches with maximum accuracy of 99.36%. Therefore, the proposed model can be employed to accomplish security in the IoT assisted UAV networks.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 102943"},"PeriodicalIF":6.0000,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Tasmanian devil optimization with deep autoencoder for intrusion detection in IoT assisted unmanned aerial vehicle networks\",\"authors\":\"Noha Negm ,&nbsp;Hayam Alamro ,&nbsp;Randa Allafi ,&nbsp;Majdi Khalid ,&nbsp;Amal M. Nouri ,&nbsp;Radwa Marzouk ,&nbsp;Aladdin Yahya Othman ,&nbsp;Noura Abdelaziz Ahmed\",\"doi\":\"10.1016/j.asej.2024.102943\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><h3>Background</h3><div>Recently, a developing count of physical objects is linked to the Internet at an unprecedented rate, calcifying the knowledge of the Internet of Things (IoT). In several paradigms of IoT applications, unmanned aerial vehicles (UAVs) and satellites for IoT have concerned much attention and are experiencing quick progress. As for UAVs, because of their superiority in maneuverability and cost, it is established an increasingly extensive consumption in several IoT scenarios like disaster relief, rapid transportation, and environment monitoring. Security remains a main problem in the IoT supported UAV networks that are solved by the employ of intrusion detection system (IDS) methods.</div></div><div><h3>Objective</h3><div>This article aims to present a Tasmanian Devil Optimization with Deep Autoencoder for Intrusion Detection System (TDODAE-IDS) technique in IoT assisted Unmanned Aerial Vehicle Networks.</div></div><div><h3>Methods</h3><div>The presented TDODAE-IDS technique majorly concentrates on the effectual identification of the intrusions in the IoT based UAV networks. To accomplish this, the presented TDODAE-IDS system designs a new TDO algorithm for the feature subset selection process. Moreover, the DAE model classifies the existence of intrusion in the UAV network and the hyperparameter tuning of the DAE model takes place using the dragonfly algorithm (DFA).</div></div><div><h3>Results</h3><div>The simulation results of the TDODAE-IDS approach were tested on a benchmark IDS dataset and the results are assessed under several measures.</div></div><div><h3>Conclusion</h3><div>The comprehensive comparative analysis highlighted the enhanced outcomes of the TDODAE-IDS algorithm over other recent approaches with maximum accuracy of 99.36%. Therefore, the proposed model can be employed to accomplish security in the IoT assisted UAV networks.</div></div>\",\"PeriodicalId\":48648,\"journal\":{\"name\":\"Ain Shams Engineering Journal\",\"volume\":\"15 11\",\"pages\":\"Article 102943\"},\"PeriodicalIF\":6.0000,\"publicationDate\":\"2024-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Ain Shams Engineering Journal\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2090447924003186\",\"RegionNum\":2,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"ENGINEERING, MULTIDISCIPLINARY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ain Shams Engineering Journal","FirstCategoryId":"5","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2090447924003186","RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0

摘要

背景最近,越来越多的物理对象以前所未有的速度与互联网相连接,钙化了人们对物联网(IoT)的认识。在物联网的几种应用模式中,用于物联网的无人机(UAV)和卫星备受关注,并取得了快速发展。无人机因其机动性和成本优势,在救灾、快速运输和环境监测等多个物联网场景中的应用日益广泛。在物联网支持的无人机网络中,安全仍然是一个主要问题,而入侵检测系统(IDS)方法可以解决这一问题。本文旨在介绍一种塔斯马尼亚魔鬼优化与深度自动编码器入侵检测系统(TDODAE-IDS)技术,用于物联网辅助无人机网络。为此,TDODAE-IDS 系统为特征子集选择过程设计了一种新的 TDO 算法。结果在基准 IDS 数据集上测试了 TDODAE-IDS 方法的仿真结果,并根据多个指标对结果进行了评估。结论综合比较分析突出表明,与其他最新方法相比,TDODAE-IDS 算法的结果更佳,准确率最高可达 99.36%。因此,建议的模型可用于实现物联网辅助无人机网络的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Tasmanian devil optimization with deep autoencoder for intrusion detection in IoT assisted unmanned aerial vehicle networks

Background

Recently, a developing count of physical objects is linked to the Internet at an unprecedented rate, calcifying the knowledge of the Internet of Things (IoT). In several paradigms of IoT applications, unmanned aerial vehicles (UAVs) and satellites for IoT have concerned much attention and are experiencing quick progress. As for UAVs, because of their superiority in maneuverability and cost, it is established an increasingly extensive consumption in several IoT scenarios like disaster relief, rapid transportation, and environment monitoring. Security remains a main problem in the IoT supported UAV networks that are solved by the employ of intrusion detection system (IDS) methods.

Objective

This article aims to present a Tasmanian Devil Optimization with Deep Autoencoder for Intrusion Detection System (TDODAE-IDS) technique in IoT assisted Unmanned Aerial Vehicle Networks.

Methods

The presented TDODAE-IDS technique majorly concentrates on the effectual identification of the intrusions in the IoT based UAV networks. To accomplish this, the presented TDODAE-IDS system designs a new TDO algorithm for the feature subset selection process. Moreover, the DAE model classifies the existence of intrusion in the UAV network and the hyperparameter tuning of the DAE model takes place using the dragonfly algorithm (DFA).

Results

The simulation results of the TDODAE-IDS approach were tested on a benchmark IDS dataset and the results are assessed under several measures.

Conclusion

The comprehensive comparative analysis highlighted the enhanced outcomes of the TDODAE-IDS algorithm over other recent approaches with maximum accuracy of 99.36%. Therefore, the proposed model can be employed to accomplish security in the IoT assisted UAV networks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Ain Shams Engineering Journal
Ain Shams Engineering Journal Engineering-General Engineering
CiteScore
10.80
自引率
13.30%
发文量
441
审稿时长
49 weeks
期刊介绍: in Shams Engineering Journal is an international journal devoted to publication of peer reviewed original high-quality research papers and review papers in both traditional topics and those of emerging science and technology. Areas of both theoretical and fundamental interest as well as those concerning industrial applications, emerging instrumental techniques and those which have some practical application to an aspect of human endeavor, such as the preservation of the environment, health, waste disposal are welcome. The overall focus is on original and rigorous scientific research results which have generic significance. Ain Shams Engineering Journal focuses upon aspects of mechanical engineering, electrical engineering, civil engineering, chemical engineering, petroleum engineering, environmental engineering, architectural and urban planning engineering. Papers in which knowledge from other disciplines is integrated with engineering are especially welcome like nanotechnology, material sciences, and computational methods as well as applied basic sciences: engineering mathematics, physics and chemistry.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信