Integration of Convolutional Neural Networks and Grey Wolf Optimization for Advanced Cybersecurity in IoT Systems

Israa Ahmed Jaddoa

Abstract


The rapid integration and application of the Internet of Things in daily life have significantly improved connectivity and intelligent control to various devices. However, it has exposed such systems to increased susceptibility to cyber challenges, such as infiltration, data sovereignty, and cyber-attacks. There is a need for an efficient and secure solution to these apparent security concerns which require complex social structures to adapt to various learning lessons quickly. The purpose of this study is to provide an inventive evolutionary operation to enhance the security of IoT networks and by integrating Convolutional Neural Networks and items of Grey Wolf Optimization algorithms – Standard GWO, Modified GWO and Advanced modified GWO. The GWOs were used to include surveillance accuracy layout, hence boosting detection accuracy. The action Lloyd testing found that smaller OWG intelligence (which achieved initially) unlimited interpretations which increased the percentage and was 97.4 %. This approach was further increased with FGWE, achieving 97.7 percentage, and 97.8 2.02% errors. The performance of both was 98.4 and 97.5 for the two classes, respectively. The current study’s results reveal the effectiveness of computational development to enhancing secure IoT networks and offer a secure prototype for potential study to optimize the security structure. effet for keynote curricular scenarios due to the system cause and trusty security solutions.

Keywords


IoT Security; Convolutional Neural Networks; Intrusion Detection; Adaptive Algorithms; Cybersecurity; Network Security; Adaptive Algorithms; Grey Wolf Optimization; Cyber Threat Detection.

Full Text:

PDF

References


J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity,” Journal of Computer and System Sciences, vol. 80, pp. 973–993, 2014, doi: 10.1016/j.jcss.2014.02.005.

J. Drew, T. Moore, and M. Hahsler, “Polymorphic malware detection using sequence classi- fication methods,” in IEEE Security and Privacy Workshops (SPW), pp. 81–87, 2016, doi: 10.1109/SPW.2016.30.

G. Canfora, F. Mercaldo, C.A. Visaggio, and P. Di Notte, “Metamorphic malware detection using code metrics,” Information Security Journal: A Global Perspective, vol. 23, pp. 57–67, 2014, doi: 10.1080/19393555.2014.931487.

L. Nataraj, S. Karthikeyan, G. Jacob, and B. S. Manjunath, “Malware images: visualization and automatic classification,” in Proceedings of the 8th international symposium on visualization for cyber security, pp. 1-7, 2011.

H. Kang, J.-W. Jang, A. Mohaisen, and H. K. Kim, “Detecting and classifying android malware using static analysis along with creator information,” International Journal of Distributed Sensor Networks, vol. 11, p. 479174, 2015, doi: 10.1155/2015/479174.

W. Han, J. Xue, Y. Wang, L. Huang, Z. Kong, and L. Mao, “Maldae: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics,” Computers & Security, vol. 83, pp. 208–233, 2019.

W. Zhong and F. Gu, “A multi-level deep learning system for malware detection,” Expert Systems with Applications, vol. 133, pp. 151–162, 2019, doi: 10.1016/j.cose.2019.02.007.

R. H. Jhaveri, A. Revathi, K. Ramana, R. Raut, and R. K. Dhanaraj, “A review on machine learning strategies for real‐world engineering applications,” Mobile Information Systems, vol. 2022, no. 1, p. 1833507, 2022.

D. Gibert, C. Mateu, and J. Planes, “The rise of machine learning for detection and classification of malware: Research developments, trends and challenges,” Journal of Network and Computer Applications, vol. 153, p. 102526, 2020.

U. E. H. Tayyab, F. B. Khan, M. H. Durad, A. Khan, and Y. S. Lee, “A survey of the recent trends in deep learning based malware detection,” Journal of Cybersecurity and Privacy, vol. 2, no. 4, pp. 800-829, 2022.

R. Ali, A. Ali, F. Iqbal, M. Hussain, and F. Ullah, “Deep learning methods for malware and intrusion detection: A systematic literature review. Security and Communication Networks, vol. 2022, no. 1, p. 2959222, 2022.

S. K. Smmarwar, G. P. Gupta, and S. Kumar, “Android Malware Detection and Identification Frameworks by Leveraging the Machine and Deep Learning Techniques: A Comprehensive Review,” Telematics and Informatics Reports, p. 100130, 2024.

A. Bensaoud, J. Kalita, and M. Bensaoud, “A survey of malware detection using deep learning,” Machine Learning With Applications, vol. 16, p. 100546, 2024.

A. F. Agarap, “Towards building an intelligent anti-malware system: a deep learning approach using support vector machine (SVM) for malware classification,” arXiv preprint arXiv:1801.00318, 2017.

J. Zhang, Z. Qin, H. Yin, L. Ou, and K. Zhang, “A feature-hybrid malware variants detection using cnn based opcode embedding and bpnn based api embedding,” Computers & Security, vol. 84, pp. 376–392, 2019, doi: 10.1016/j.cose.2019.04.005.

K. A. Da Costa, J. P. Papa, C. O. Lisboa, R. Munoz, and V. H. C. de Albuquerque, “Internet of things: A survey on machine learning-based intrusion detection approaches,” Computer Networks, vol. 151, pp. 147–157, 2019, doi: 10.1016/j.comnet.2019.01.023.

N. Islam et al., “Towards machine learning based intrusion detection in iot networks,” Computers, Materials & Continua, vol. 69, pp. 1801–1821, 2021, doi: 10.32604/cmc.2021.018466.

P. Nimbalkar and D. Kshirsagar, “Feature selection for intrusion detection system in internet-of- things (iot),” ICT Express, vol. 7, pp. 177–181, 2021, doi: 10.1016/j.icte.2021.04.012.

H. Hindy, E. Bayne, M. Bures, R. Atkinson, C. Tachtatzis, and X. Bellekens, “Machine learning based iot intrusion detection system: An mqtt case study (mqtt-iot-ids2020 dataset),” in International Networking Conference, pp. 73–84, 2020, doi: 10.1007/978-3-030-64758-2_6.

A. Alsaedi, N. Moustafa, Z. Tari, A. Mahmood, and A. Anwar, "TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems," in IEEE Access, vol. 8, pp. 165130-165150, 2020, doi: 10.1109/ACCESS.2020.3022862.

X. Zhou, W. Liang, W. Li, K. Yan, S. Shimizu, I. Kevin, and K. Wang, “Hierarchical adversarial attacks against graph-neural-network-based iot network intrusion detection system,” IEEE Internet of Things Journal, vol. 9, pp. 9310–9319, 2021, doi: 10.1109/JIOT.2021.3130434.

O. A. Wahab, “Intrusion detection in the iot under data and concept drifts: Online deep learning approach,” IEEE Internet of Things Journal, vol. 9, pp. 19706–19716, 2022, doi: 10.1109/JIOT.2022.3167005.

X. Kan et al., “A novel iot network intrusion detection approach based on adaptive particle swarm optimization convolutional neural network,” Information Sciences, vol. 568, pp. 147–162, 2021, doi: 10.1016/j.ins.2021.03.060.

N. Abdalgawad, A. Sajun, Y. Kaddoura, I. A. Zualkernan, and F. Aloul, “Generative deep learning to detect cyberattacks for the iot-23 dataset,” IEEE Access, vol. 10, pp. 6430–6441, 2021, doi: 10.1109/ACCESS.2021.3140015.

R. Kumar, P. Kumar, R. Tripathi, G. P. Gupta, S. Garg, and M. M. Hassan, “A distributed intrusion detection system to detect ddos attacks in blockchain-enabled iot network,” Journal of Parallel and Distributed Computing, vol. 164, pp. 55–68, 2022, doi: 10.1016/j.jpdc.2022.01.030.

A. Shukla, S. Ahamad, G. N. Rao, A. J. Al-Asadi, A. Gupta, and M. Kumbhkar, “Artificial intelligence assisted iot data intrusion detection,” in 2021 4th International Conference on Computing and Communications Technologies (ICCCT), pp. 330–335, 2021, doi: 10.1109/ICCCT53315.2021.9711795.

O. D. Okey et al., “Boostedenml: Efficient technique for detecting cyberattacks in iot systems using boosted ensemble machine learning,” Sensors, vol. 22, p. 7409, 2022, doi: 10.3390/s22197409.

M. M. Alani, “An explainable efficient flow-based industrial iot intrusion detection system,” Computers & Electrical Engineering, vol. 108, p. 108732, 2023, doi: 10.1016/j.compeleceng.2023.108732.

S. Shruti, S. Rani, and G. Srivastava, “Secure hierarchical fog computing-based architecture for industry 5.0 using an attribute-based encryption scheme,” Expert Systems with Applications, vol. 235, p. 121180, 2023, doi: 10.1016/j.eswa.2023.121180.

H. Albasheer et al., “Cyber-attack prediction based on network intrusion detection systems for alert correlation techniques: A survey,” Sensors, vol. 22, p. 1494, 2022, doi: 10.3390/s22041494.

A. Massaro, M. Gargaro, G. Dipierro, A. M. Galiano, and S. Buonopane, “Prototype cross platform oriented on cybersecurity, virtual connectivity, big data and artificial intelligence control,” IEEE Access, vol. 8, pp. 197939–197954, 2020, doi: 10.1109/ACCESS.2020.3034399.

H.-C. Lin, P. Wang, K.-M. Chao, W.-H. Lin, and J.-H. Chen, “Using deep learning networks to identify cyber attacks on intrusion detection for in-vehicle networks,” Electronics, vol. 11, p. 2180, 2022, doi: 10.1109/ACCESS.2020.3034399.

I. H. Sarker, Y. B. Abushark, F. Alsolami, and A. I. Khan, “Intrudtree: A machine learning based cyber security intrusion detection model,” Symmetry, vol. 12, p. 754, 2020, doi: 10.3390/sym12050754.

A. F. Almutairi and A. A. Alshargabi, “Using deep learning technique to protect internet network from intrusion in iot environment,” in Proc. 2nd Int. Conf. Emerging Smart Technol. Appl. (eSmarTA), pp. 1–6, 2022, doi: 10.1109/eSmarTA56775.2022.9935467.

J. P. J. Shareena, A. Ramdas, and A. P. Haripriya, “Intrusion detection system for iot botnet attacks using deep learning,” Social Netw. Comput. Sci., vol. 2, no. 3, p. 205, 2021, doi: 10.1007/s42979-021-00516-9.

H. Han, H. Kim, and Y. Kim, “Correlation between deep neural network hidden layer and intrusion detection performance in iot intrusion detection system,” Symmetry, vol. 14, no. 10, p. 2077, 2022, doi: 10.3390/sym14102077.

S. Muruganandam, R. Joshi, P. Suresh, N. Balakrishna, K. H. Kishore, and S. V. Manikanthan, “A deep learning based feed forward artificial neural network to predict the k-barriers for intrusion detection using a wireless sensor network,” Meas. Sensors, vol. 25, p. 100613, 2023, doi: 10.1016/j.measen.2022.100613.

R. Qaddoura, A. M. Al-Zoubi, H. Faris, and I. Almomani, “A multi layer classification approach for intrusion detection in iot networks based on deep learning,” Sensors, vol. 21, no. 9, p. 2987, 2021, doi: 10.3390/s21092987.

D. Srilatha and N. Thillaiarasu, “Ddosnet: A deep learning model for detecting network attacks in cloud computing,” in Proc. 4th Int. Conf. Inventive Res. Comput. Appl. (ICIRCA), pp. 576–581, 2022, doi: 10.1109/ICIRCA54612.2022.9985524.

P. C. Ravoor, T. S. B. Sudarshan, and K. Rangarajan, “Digital borders: Design of an animal intrusion detection system based on deep learning,” in Proc. Int. Conf. Comput. Vis. Image Process., pp. 186–200, 2020, doi: 10.1007/978-981-16-1103-2_17.

A Mughaid, S AlZu’bi, A Hnaif, S Taamneh, A Alnajjar, and EA Elsoud, “An intelligent cyber security phishing detection system using deep learning techniques,” Clust. Comput., vol. 25, pp. 3819–3828, 2022, doi: 10.1007/s10586-022-03604-4.

M. D. Abdulrahman, J. K. Alhassan, O. S. Adebayo, J. A. Ojeniyi, and M. Olalere, “Phishing attack detection based on random forest with wrapper feature selection method,” Int. J. Inf. Process. Commun., vol. 7, pp. 209–224, 2019.

A. K. Jain and B. B. Gupta, “Phish-safe: Url features-based phishing detection system using machine learning,” in Cyber Security: Proceedings of CSI 2015, pp. 467–474, 2018, doi: 10.1007/978-981-10-8536-9_44.

Y. Huang, J. Qin, and W. Wen, “Phishing url detection via capsule-based neural network,” in Proceedings of the 2019 IEEE 13th International Conference on Anti-Counterfeiting, Security, and Identification (ASID), pp. 22–26, 2019, doi: 10.1109/ICASID.2019.8925000.

M. Zabihimayvan and D. Doran, “Fuzzy rough set feature selection to enhance phishing attack detection,” in Proceedings of the 2019 IEEE International Conference on Fuzzy Systems (FUZZ- IEEE), pp. 1–6, 2019, doi: 10.1109/FUZZ-IEEE.2019.8858884.

A. K. Jain and B. B. Gupta, “Detection of phishing attacks in financial and e-banking websites using link and visual similarity relation,” Int. J. Inf. Comput. Secur., vol. 10, pp. 398–417, 2018, doi: 10.1504/IJICS.2018.095303.

N. A. Azeez, S. Misra, I. A. Margaret, and L. Fernandez-Sanz, “Adopting automated whitelist approach for detecting phishing attacks,” Comput. Secur., vol. 108, p. 102328, 2021, doi: 10.1016/j.cose.2021.102328.

R. Alotaibi, I. Al-Turaiki, and F. Alakeel, “Mitigating email phishing attacks using convolutional neural networks,” in Proceedings of the 2020 3rd International Conference on Computer Applications & Information Security (ICCAIS), pp. 1–6, 2020, doi: 10.1109/ICCAIS48893.2020.9096821.

S. Ruiz-Villafranca, J. Carrillo-Mondéjar, J. M. Castelo Gómez, and J. Roldán-Gómez, “Mecinot: A multi-access edge computing and industrial internet of things emulator for the modelling and study of cybersecurity threats,” J. Supercomput., vol. 79, pp. 11895–11933, 2023, doi: 10.1007/s11227-023-05098-2.

C. Rookard and A. Khojandi, “Applying deep reinforcement learning for detection of internet-of-things cyber attacks,” in Proceedings of the 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC), pp. 389–395, 2023, doi: 10.1109/CCWC57344.2023.10099349.

A. Sharma, H. Babbar, and A. Sharma, “Ton-iot: Detection of attacks on internet of things in vehicular networks,” in 2022 6th International Conference on Electronics, Communi- cation and Aerospace Technology, pp. 539–545, 2022, doi: 10.1109/ICECA55336.2022.10009070.

S. Subasree, N. K. Sakthivel, K. Tripathi, D. Agarwal, and A. K. Tyagi, “Combining the advantages of radiomic features based feature extraction and hyper parameters tuned rernn using loa for breast cancer classification,” Biomedical Signal Processing and Control, vol. 72, p. 103354, 2022.

S. S. Devi, A. Roy, J. Singha, S. A. Sheikh, and R. H. Laskar, “Malaria infected erythrocyte classification based on a hybrid classifier using microscopic images of thin blood smear,” Multimedia Tools and Applications, vol. 77, pp. 631–660, 2018 DOI: 10.1007/s11042-016-4264-7.

B. Bojarajulu, S. Tanwar, and T. P. Singh, “Intelligent iot-botnet attack detection model with optimized hybrid classification model,” Computers & Security, vol. 126, p. 103064, 2023, doi: 10.1016/j.cose.2022.103064.

U. G. Ketenci, T. Kurt, S. Önal, C. Erbil, S. Aktürkoˇglu, and H. Ş. İlhan, “A time-frequency based suspicious activity detection for anti-money laundering,” IEEE Access, vol. 9, pp. 59957–59967, 2021, doi: 10.1109/ACCESS.2021.3072114.

M. Sabokrou, M. Fayyaz, M. Fathy, and R. Klette, “Deep-cascade: Cascading 3d deep neural networks for fast anomaly detection and localization in crowded scenes,” IEEE Transactions on Image Processing, vol. 26, no. 4, pp. 1992–2004, 2017, doi: 10.1109/TIP.2017.2670780.

C. Lee and S. Lee, “Softmax output approximation for activation memory-efficient training of attention-based networks,” Advances in Neural Information Processing Systems, vol. 36, 2024.

D. Kumar et al., “Grey wolf optimization based hyper-parameter optimized convolution neural network for kidney image classification,” International Journal of Intelligent Engineering & Systems, vol. 15. No. 3, 2022, doi: 10.22266/ijies2022.0630.27.

A. Alzaqebah, I. Aljarah, O. Al-Kadi, and R. Damaševičiu, “A modified grey wolf optimization algorithm for an intrusion detection system,” Mathematics, vol. 10, no. 6, p. 999, 2022, doi: 10.3390/math10060999.

B. Ahmadi, S. Younesi, O. Ceylan, and A. Ozdemir, “An advanced grey wolf optimization algorithm and its application to planning problem in smart grids,” Soft Computing, vol. 26, no. 8, pp. 3789–3808, 2022.




DOI: https://doi.org/10.18196/jrc.v5i4.22178

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Israa Ahmed Jaddoa

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

 


Journal of Robotics and Control (JRC)

P-ISSN: 2715-5056 || E-ISSN: 2715-5072
Organized by Peneliti Teknologi Teknik Indonesia
Published by Universitas Muhammadiyah Yogyakarta in collaboration with Peneliti Teknologi Teknik Indonesia, Indonesia and the Department of Electrical Engineering
Website: http://journal.umy.ac.id/index.php/jrc
Email: jrcofumy@gmail.com


Kuliah Teknik Elektro Terbaik