Affiliation:
1. SoIT UTD, RGPV, BHOPAL
2. SoIT UTD RGPV BHOPAL, M.P.
Abstract
Abstract
The rapid evolution of technology and the proliferation of interconnected systems have given rise to an alarming increase in cyber threats. In this context, Intrusion Detection Systems (IDS) have emerged as crucial tools for detecting and mitigating unauthorized access and malicious activities within computer networks. This paper introduces a novel deep learning architecture inspired by the working principle of a funnel for detecting intrusions in IoT networks. The proposed architecture incorporates a feature selection model that leverages the hunting behavior of the yellow saddle goatfish and the swarm behavior of birds. This nature-inspired optimization algorithm enhances the deep learning model's ability to learn high-quality features, thereby improving the intrusion detection rate. Additionally, the proposed approach addresses the challenge of working with diverse environmental datasets by analyzing the identification capabilities for modern attacks separately. The simulation of the proposed framework is conducted using MATLAB software, and performance evaluation is carried out using various performance metrics. The proposed architecture demonstrates improvements of 1.51% for the KDD-CUP99 dataset, 2.87% for the NSL-KDD dataset, and 22.29% for the UNSW-NB15 dataset. These enhancements highlight the efficacy of the proposed architecture in advancing intrusion detection capabilities in IoT networks. The promising results obtained from this study open up several exciting avenues for future research.
Publisher
Research Square Platform LLC
Reference51 articles.
1. Al-Bahri, M., Yankovsky, A., Borodin, A., & Kirichek, R. (2018). Testbed for identify IoT-devices based on digital object architecture. Internet of Things, Smart Spaces, and Next Generation Networks and Systems; Springer: Cham, Switzerland, pp. 129–137. https://doi.org/10.1007/978-3-030-01168-0_12.
2. Hejazi, H., Rajab, H., Cinkler, T., & Lengyel, L. (2018). Survey of platforms for massive IoT. In Proceedings of the 2018 IEEE International Conference on Future IoT Technologies (Future IoT), Eger, Hungary, pp. 1–8. Doi.10.1109/FIOT.2018.8325598.
3. Convergence of blockchain and edge computing for secure and scalable IIoT critical infrastructures in industry 4.0;Wu Y;IEEE Internet Things J,2020
4. Hassan, W. H., & Noor, M. B. M. (2019). Current research on Internet of Things (IoT) security: A survey. ComputNetw. 148, 283–294. https://doi.org/10.1016/j.comnet.2018.11.025.
5. Rough Set Discretize Classification of Intrusion Detection System;Sulaiman NS;Journal of Engineering and Applied Sciences,2016