Adaptive Intrusion Detection for IoT Networks using Artificial Immune System Techniques: A Comparative Study

Authors

  • Amaal Rateb Shorman Al-Balqa Applied University
  • Maen Alzubi Jadara University
  • Mohammad Almseidin Tafila Technical University
  • Roqia Rateb Al-Ahliyya Amman University

DOI:

https://doi.org/10.18196/jrc.v6i2.23645

Keywords:

IoT Security, Artificial Immune Systems, Negative Selection Algorithm, Clonal Selection Algorithm, Danger Theory

Abstract

The rapid proliferation of IoT devices has led to a significant increase in security vulnerabilities, rendering them susceptible to more sophisticated assaults. Conventional security methods often encounter difficulties in the changing surroundings and resource limitations of IoT, requiring flexible, low-resource alternatives. This research proposes the use of three distinct Artificial Immune System (AIS) methodologies to enhance the security of the Internet of Things (IoT). The concepts include clonal selection, negative selection, and risk theory. Each algorithm fulfills essential security requirements: Negative selection helps find new dangers, clonal selection finds things that aren't normal in real-time, and risk theory uses context-aware responses to reduce false positives. When tested on several IoT-specific datasets, the AIS framework had an average detection accuracy of 94%. It also had a 20% reduction in false-positive rates and made better use of resources than traditional machine learning models like SVM, RF, and KNN. The findings indicate that the framework is effective for resource-constrained IoT devices. They enhance IoT security by using adaptive, immune-inspired countermeasures tailored to the unique problems of IoT. The suggested approach guarantees that networked devices remain adequately protected against new threats. The conclusions indicated that integrating comprehensive security management into IoT frameworks might markedly diminish total risk, therefore facilitating safer and more dependable IoT applications.

References

F. A. Alaba, M. Othman, I. A. T. Hashem, and F. Alotaibi, "Internet of Things security: A survey," Journal of Network and Computer Applications, vol. 88, pp. 10-28, 2017.

S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, "Security, privacy and trust in Internet of Things: The road ahead," Computer networks, vol. 76, pp. 146-164, 2015.

R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of security and privacy in distributed internet of things," Computer networks, vol. 57, no. 10, pp. 2266-2279, 2013.

D. Dasgupta, Artificial immune systems and their applications. Springer Science & Business Media, 2012.

L. N. De Castro and J. Timmis. Artificial immune systems: a new computational intelligence approach. Springer Science & Business Media, 2002.

W. K. Wong and C. I. Ming, "A review on metaheuristic algorithms: recent trends, benchmarking and applications," 2019 7th International Conference on Smart Computing & Communications (ICSCC), pp. 1-5, 2019.

S. Aldhaheri, D. Alghazzawi, L. Cheng, A. Barnawi, and B. A. Alzahrani, "Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research," Journal of Network and Computer Applications, vol. 157, p. 102537, 2020.

C. Liu, J. Yang, R. Chen, Y. Zhang, and J. Zeng, "Research on immunity-based intrusion detection technology for the Internet of Things," 2011 Seventh International conference on natural computation, vol. 1, pp. 212-216, 2011.

M. Almseidin, M. Alzubi, M. Alkasassbeh, and S. Kovacs, “Applying intrusion detection algorithms on the kdd-99 dataset,” Production Systems and Information Engineering, vol. 8, pp. 51-67, 2019.

M. Almseidin, M. Alzubi, S. Kovacs, and M. Alkasassbeh, “Evaluation of machine learning algorithms for intrusion detection system,” 2017 IEEE 15th international symposium on intelligent systems and informatics (SISY), pp. 000277-000282, 2017.

M. Almseidin, M. Alkasassbeh, M. Alzubi, and J. Al-Sawwa, “Cyber-phishing website detection using fuzzy rule interpolation,” Cryptography, vol. 6, no. 2, p. 24, 2022.

J. Greensmith, U. Aickelin, and S. Cayzer, "Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection," Artificial Immune Systems: 4th International Conference, ICARIS 2005, pp. 153-167, 2005.

R. T. Alves, M. R. Delgado, H. S. Lopes, and A. A. Freitas, “An artificial immune system for fuzzy-rule induction in data mining,” International Conference on Parallel Problem Solving from Nature, pp. 1011-1020, 2004.

A. A. Freitas and J. Timmis, "Revisiting the Foundations of Artificial Immune Systems for Data Mining," in IEEE Transactions on Evolutionary Computation, vol. 11, no. 4, pp. 521-540, Aug. 2007.

L. N. de Castro and J. Timmis, "Artificial immune systems: a novel approach to pattern recognition," Artificial Neural Networks in Pattern Recognition, pp. 67-84, 2002.

Z. A. Khan, I. U. Haq, S. Khan, and M. T. Khan, "Artificial Immune-Inspired Disruption Handling in Manufacturing Process," Integration of Heterogeneous Manufacturing Machinery in Cells and Systems, pp. 126-150, 2024.

S. Aldhaheri, D. Alghazzawi, L. Cheng, B. Alzahrani, and A. Al-Barakati, "DeepDCA: novel network-based detection of IoT attacks using artificial immune system," Applied Sciences, vol. 10, no. 6, p. 1909, 2020.

O. Engin and A. Döyen, "A new approach to solve hybrid flow shop scheduling problems by artificial immune system," Future generation computer systems, vol. 20, no. 6, pp. 1083-1095, 2004.

C. A. C. Coello and N. C. Cortés, "Solving multiobjective optimization problems using an artificial immune system," Genetic programming and evolvable machines, vol. 6, pp. 163-190, 2005.

F. R. Alonso, D. Q. Oliveira, and A. C. Zambroni de Souza, "Artificial Immune Systems Optimization Approach for Multiobjective Distribution System Reconfiguration," in IEEE Transactions on Power Systems, vol. 30, no. 2, pp. 840-847, March 2015.

X. Huang, Y. Tan, and X. He, "An Intelligent Multifeature Statistical Approach for the Discrimination of Driving Conditions of a Hybrid Electric Vehicle," in IEEE Transactions on Intelligent Transportation Systems, vol. 12, no. 2, pp. 453-465, June 2011.

S. Gu, Y. Tan, and X. He, "Recentness biased learning for time series forecasting," Information Sciences, vol. 237, pp. 29-38, 2013.

G-. C. Luh and W. W. Liu, "An immunological approach to mobile robot reactive navigation," Applied Soft Computing, vol. 8, no. 1, pp. 30-45, 2008.

M. Alzubi, M. Almseidin, M. A. Lone, and S. Kovacs, "Fuzzy Rule Interpolation Toolbox for the GNU Open-Source OCTAVE," 2019 17th International Conference on Emerging eLearning Technologies and Applications (ICETA), pp. 16-22, 2019.

M. Alzubi, Z. C. Johanyák, and S. Kovács, “Fuzzy rule interpolation methods and FRI toolbox,” arXiv preprint arXiv:1904.12178, 2019.

M. Alzubiand S. Kovacs, “Interpolative fuzzy reasoning method based on the incircle of a generalized triangular fuzzy number,” Journal of Intelligent & Fuzzy Systems, vol. 39, no. 1, pp. 709-729, 2020.

M. Alzubi and S. Kovács, “Investigating the piece-wise linearity and benchmark related to koczy-hirota fuzzy linear interpolation,” arXiv preprint arXiv:1907.01047, 2019.

M. Alzubi, M. Almseidin, S. Kovacs, J. Al-Sawwa, and M. Alkasassbeh, “EI-FRI: Extended incircle fuzzy rule interpolation for multidimensional antecedents, multiple fuzzy rules, and extrapolation using total weight measurement and shift ratio,” Journal of Robotics and Control (JRC), vol. 5, no. 1, pp. 217-227, 2024.

M. Alzubi, M. Almseidin, M. Alkasassbeh, J. Al-Sawwa, and A. Aldweesh, "Comparative Analysis of Fuzzy Rule Interpolation Techniques Across Various Scenarios Using a Set of Benchmarks," in IEEE Access, vol. 12, pp. 33140-33153, 2024.

M. Alzubi and S. Kovacs, “Some considerations and a benchmark related to the CNF property of the koczy-hirota fuzzy rule interpolation,” arXiv preprint arXiv:1911.05041, 2019.

M. E. Pamukov, "Application of artificial immune systems for the creation of IoT intrusion detection systems," 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), pp. 564-568, 2017.

D. A. Fernandes, M. M. Freire, P. A. Fazendeiro, and P. R. Inácio, “Applications of artificial immune systems to computer security: A survey,” Journal of Information Security and Applications, vol. 35, pp. 138-159, 2017.

M. Weiser, “The computer for the 21st century,” IEEE pervasive computing, vol. 1, no. 1, pp. 19-25, 2002.

K. Rose, S. Eldridge, and L. Chapin, “The internet of things: An overview. The internet society (ISOC), vol. 80, no. 15, pp. 1-53, 2015.

I. Andrea, C. Chrysostomou, and G. Hadjichristofi, "Internet of Things: Security vulnerabilities and challenges," 2015 IEEE symposium on computers and communication (ISCC), pp. 180-187, 2015.

D. Chasaki and C. Mansour, "Security challenges in the internet of things," International Journal of Space-Based and Situated Computing, vol. 5, no. 3, pp. 141-149, 2015.

D. Hanes, G. Salgueiro, P. Grossetete, R. Barton, and J. Henry. IoT fundamentals: Networking technologies, protocols, and use cases for the internet of things. Cisco Press, 2017.

M. Almseidin, J. Al-Sawwa, M. Alkasassbeh, M. Alzubi, K. Alrfou, “DT-ARO: Decision tree-based artificial rabbit’s optimization to mitigate IoT Botnet exploitation,” Journal of Network and Systems Management, vol. 32, no. 1, p. 14, 2024.

I. Proofpoint. Proofpoint uncovers internet of things (iot) cyberattack. Proofpoint Release, 2014.

C. Miller. Remote exploitation of an unaltered passenger vehicle. Black Hat USA, 2015.

J. Scott Sr and W. Summit. Rise of the machines: The dyn attack was just a practice run december 2016. Institute for Critical Infrastructure Technology, Washington, DC, USA, 2016.

M. Banerjee, J. Lee, Q. Chen, and K.-K. R. Choo, "Blockchain-based security layer for identification and isolation of malicious things in IoT: A conceptual design," 2018 27th International Conference on Computer Communication and Networks (ICCCN), pp. 1-6, 2018.

S. Khanam, I. B. Ahmedy, M. Y. I. Idris, M. H. Jaward, and A. Q. B. M. Sabri, "A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things," IEEE access, vol. 8, pp. 219709-219743, 2020.

M. Abomhara and G. M. Køien, "Security and privacy in the Internet of Things: Current status and open issues," 2014 international conference on privacy and security in mobile systems (PRISMS), pp. 1-8, 2014.

C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan, "A survey of intrusion detection techniques in cloud," Journal of network and computer applications, vol. 36, no. 1, pp. 42-57, 2013.

G. C. Silva and D. Dasgupta, "A survey of recent works in artificial immune systems," Handbook on Computational Intelligence: Volume 2: Evolutionary Computation, Hybrid Systems, and Applications, pp. 547-586, 2016.

U. Aickelin, D. Dasgupta, and F. Gu, "Artificial immune systems," In Search Methodologies: Introductory Tutorials in Optimization and Decision Support Techniques, pp. 187-211, 2013.

J. Zheng, Y. Chen, and W. Zhang, "A survey of artificial immune applications," Artificial Intelligence Review, vol. 34, no. 1, pp. 19-34, 2010.

Y. Tan. Artificial immune system: applications in computer security. John Wiley & Sons, 2016.

H. Alrubayyi, G. Goteng, M. Jaber, and J. Kelly, "Challenges of malware detection in the IoT and a review of artificial immune system approaches," Journal of Sensor and Actuator Networks, 10, no. 4, p. 61, 2021.

H. Yang, T. Li, X. Hu, F. Wang, and Y. Zou, "A survey of artificial immune system-based intrusion detection," The Scientific World Journal 2014, no. 1, p. 156790, 2014.

J. Kim, P. J. Bentley, U. Aickelin, J. Greensmith, G. Tedesco, and J. Twycross, "Immune system approaches to intrusion detection–a review," Natural computing, vol. 6, pp. 413-466, 2007.

B. Naik, A. Mehta, H. Yagnik, and M. Shah, "The impacts of artificial intelligence techniques in augmentation of cybersecurity: a comprehensive review," Complex & Intelligent Systems, vol. 8, no. 2, pp. 1763-1780, 2022.

A. S. Muhamad and S. Deris, "An artificial immune system for solving production scheduling problems: a review," Artificial Intelligence Review, vol. 39, pp. 97-108, 2013.

N. Bayar, S. Darmoul, S. Hajri-Gabouj, and H. Pierreval, "Fault detection, diagnosis and recovery using Artificial Immune Systems: A review," Engineering Applications of Artificial Intelligence, vol. 46, pp. 43-57, 2015.

A. A. Haidar, A. Six, J.-G. Ganascia, and V. Thomas-Vaslin, "The artificial immune systems domain: Identifying progress and main contributors using publication and co-authorship analyses," Artificial Life Conference Proceedings, pp. 1206-1217, 2013.

E. Fernandes, J. Jung, and A. Prakash, "Security analysis of emerging smart home applications," 2016 IEEE symposium on security and privacy (SP), pp. 636-654, 2016.

A. A. Gendreau and M. Moorman, "Survey of intrusion detection systems towards an end to end secure internet of things," 2016 IEEE 4th international conference on future internet of things and cloud (FiCloud), pp. 84-90, 2016.

S. Latif, F. D. Faria, M. M. Afsar, I. J. Esha, and D. Nandi, "Investigation of machine learning algorithms for network intrusion detection," International Journal of Information Engineering and Electronic Business, vol. 15, no. 2, 2022.

M. A. F. Pimentel, D. A. Clifton, L. Clifton, and L. Tarassenko, "A review of novelty detection," Signal processing, vol. 99, pp. 215-249, 2014.

L. N. Castro and F. J. V. Zuben, "Learning and optimization using the clonal selection principle," IEEE transactions on evolutionary computation, vol. 6, no. 3, pp. 239-251, 2002.

U. Aickelin, P. Bentley, S. Cayzer, J. Kim, and J. McLeod, "Danger theory: The link between AIS and IDS?," Artificial Immune Systems: Second International Conference, ICARIS 2003, Edinburgh, UK, September 1-3, 2003. Proceedings 2, pp. 147-155, 2003.

J. Twycross and U. Aickelin, "Information fusion in the immune system," Information Fusion, vol. 11, no. 1, pp. 35-44, 2010.

P. Saurabh and B. Verma, "Negative selection in anomaly detection—A survey," Computer Science Review, vol. 48, p. 100557, 2023.

B. H. Ulutas and S. Kulturel-Konak, "A review of clonal selection algorithm and its applications," Artificial Intelligence Review, vol. 36, pp. 117-138, 2011.

P. Matzinger, "The danger model: a renewed sense of self," science, vol. 296, no. 5566, pp. 301-305, 2002.

M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, "A detailed analysis of the KDD CUP 99 data set," 2009 IEEE symposium on computational intelligence for security and defense applications, pp. 1-6, 2009.

R. Moustafa and J. Slay, "UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set),” In 2015 military communications and information systems conference (MilCIS), pp. 1-6, 2015.

I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, "Toward generating a new intrusion detection dataset and intrusion traffic characterization," ICISSp, vol. 1, pp. 108-116, 2018.

Y. Meidan, M. Bohadana, Y. Mathov, Y. Mirsky, A. Shabtai, D. Breitenbacher, and Y. Elovici, "N-baiot—network-based detection of iot botnet attacks using deep autoencoders," IEEE Pervasive Computing, vol. 17, no. 3, pp. 12-22, 2018.

M. A. Ferrag and L. Maglaras, "DeepCoin: A novel deep learning and blockchain-based energy exchange framework for smart grids," IEEE Transactions on Engineering Management, vol. 67, no. 4, pp. 1285-1297, 2019.

M. A. Ferrag, L. Maglaras, S. Moschoyiannis, and H. Janicke, "Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study," Journal of Information Security and Applications, vol. 50, p. 102419, 2020.

W. I. D. Mining, "Data mining: Concepts and techniques," Morgan Kaufinann, vol. 10, no. 4, pp. 559-569, 2006.

I. Guyon and A. Elisseeff, "An introduction to variable and feature selection," Journal of machine learning research, vol. 3, pp. 1157-1182, 2003.

I. Guyon, J. Weston, S. Barnhill, and V. Vapnik, "Gene selection for cancer classification using support vector machines," Machine learning, vol. 46, pp. 389-422, 2002.

J. M. Zhang, M. Harman, L. Ma, and Y. Liu, "Machine learning testing: Survey, landscapes and horizons," IEEE Transactions on Software Engineering, vol. 48, no. 1, pp. 1-36, 2020.

Downloads

Published

2025-03-13

Issue

Section

Articles