Addressing Internet of Things security by enhanced sine cosine metaheuristics tuned hybrid machine learning model and results interpretation based on SHAP approach

Author:

Dobrojevic Milos1,Zivkovic Miodrag1,Chhabra Amit2,Sani Nor Samsiah3,Bacanin Nebojsa1ORCID,Mohd Amin Maifuza3

Affiliation:

1. Informatics and Computing, Singidunum University, Belgrade, Serbia

2. Department of Computer Engineering & Technology, Guru Nanak Dev University, Amritsar, India

3. Center for Artificial Intelligence Technology, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia

Abstract

An ever increasing number of electronic devices integrated into the Internet of Things (IoT) generates vast amounts of data, which gets transported via network and stored for further analysis. However, besides the undisputed advantages of this technology, it also brings risks of unauthorized access and data compromise, situations where machine learning (ML) and artificial intelligence (AI) can help with detection of potential threats, intrusions and automation of the diagnostic process. The effectiveness of the applied algorithms largely depends on the previously performed optimization, i.e., predetermined values of hyperparameters and training conducted to achieve the desired result. Therefore, to address very important issue of IoT security, this article proposes an AI framework based on the simple convolutional neural network (CNN) and extreme machine learning machine (ELM) tuned by modified sine cosine algorithm (SCA). Not withstanding that many methods for addressing security issues have been developed, there is always a possibility for further improvements and proposed research tried to fill in this gap. The introduced framework was evaluated on two ToN IoT intrusion detection datasets, that consist of the network traffic data generated in Windows 7 and Windows 10 environments. The analysis of the results suggests that the proposed model achieved superior level of classification performance for the observed datasets. Additionally, besides conducting rigid statistical tests, best derived model is interpreted by SHapley Additive exPlanations (SHAP) analysis and results findings can be used by security experts to further enhance security of IoT systems.

Funder

Universiti Kebangsaan Malaysia

Publisher

PeerJ

Subject

General Computer Science

Reference127 articles.

1. Aerial swarms: recent applications and challenges;Abdelkader;Current Robotics Reports,2021

2. A clustering approach to identify multidimensional poverty indicators for the bottom 40 percent group;Abdul Rahman;PLOS ONE,2021

3. IoT botnet detection using salp swarm and ant lion hybrid optimization model;Abu Khurma;Symmetry,2021

4. Reptile search algorithm (RSA): a nature-inspired meta-heuristic optimizer;Abualigah;Expert Systems with Applications,2022

5. The arithmetic optimization algorithm;Abualigah;Computer Methods in Applied Mechanics and Engineering,2021

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3