Distributed intrusion detection scheme using dual-axis dimensionality reduction for Internet of things (IoT)

被引:0
|
作者
Shashank Gavel
Ajay Singh Raghuvanshi
Sudarshan Tiwari
机构
[1] National Institute of Technology,Department of Electronics and Communication
[2] Motilal Nehru National Institute of Technology,Department of Electronics and Communication
来源
关键词
Intrusion detection; Security; Kalman filter; Salp swarm algorithm; Extreme learning machine; KELM; Internet of things; Fog networks;
D O I
暂无
中图分类号
学科分类号
摘要
The immense growth in the cyber world has given birth to various types of cybercrimes in the Internet of things (IoT). Cybercrimes have breached the multiple levels of cybersecurity that is one of the major issues in the IoT networks. Due to the rise in IoT applications, both devices and services are prone to security attacks and intrusions. The intrusion breaches the data packet extracted from different nodes deployed in the IoT network. Most of the intrusive attacks are very near variants of previously marked cyberattacks containing many repetitive data and features. And to detect the intrusion, the data packet needs to be analyzed. This article presents a novel scheme, i.e., dual-axis dimensionality reduction, that utilizes Kalman filter and salp swarm algorithm (coded as KF-SSA) for analyzing and minimizing the data packet. The proposed data reduction scheme is utilized with KELM-based multiclass classifier to efficiently detect intrusion in the IoT network (KF-SSA with KELM). The proposed method’s overall results are evaluated using standard intrusion detection datasets, i.e., NSL-KDD, KYOTO 2006+ (2015), CICIDS2017, and CICIDS2018 (AWS). The result from the proposed data reduction technique obtains highly reduced data, i.e., 70.% for NSL-KDD and 86.43% for CICIDS2017. The analyzed result shows high detection accuracy of 99.9% for NSL-KDD and 95.68% for CICIDS2017 with decreased computational time.
引用
收藏
页码:10488 / 10511
页数:23
相关论文
共 50 条
  • [1] Distributed intrusion detection scheme using dual-axis dimensionality reduction for Internet of things (IoT)
    Gavel, Shashank
    Raghuvanshi, Ajay Singh
    Tiwari, Sudarshan
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (09): : 10488 - 10511
  • [2] BCIDS-IoT: A Binary Classification Intrusion Detection Scheme for Internet of Things Communication
    Agarwal, Pralabh
    Wazid, Mohammad
    Singh, Vishal Kumar
    Srivastava, Anindya
    Singh, Arshal Raj
    Mittal, Saksham
    Das, Ashok Kumar
    SECURITY AND PRIVACY, 2025, 8 (02):
  • [3] Overview on Intrusion Detection Schemes for Internet of Things (IoT)
    Ghayyad, Saher
    Du, Shengzhi
    2018 INTERNATIONAL CONFERENCE ON INTELLIGENT AND INNOVATIVE COMPUTING APPLICATIONS (ICONIC), 2018, : 614 - 619
  • [4] A novel dimensionality reduction and optimal deep learning based intrusion detection system for internet of things
    Ponniah, Krishna Kumar
    Retnaswamy, Bharathi
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 45 (03) : 4737 - 4751
  • [5] The robust scheme for intrusion detection system in Internet of Things
    Nguyen, Dat-Thinh
    Le, Kim-Hung
    INTERNET OF THINGS, 2023, 24
  • [6] The flaws of Internet of Things (IoT) intrusion detection and prevention schemes
    Ghayyad, Saher
    Du, Shengzhi
    Kurien, Anish
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2022, 38 (01) : 25 - 36
  • [7] IoT Bonet and Network Intrusion Detection using Dimensionality Reduction and Supervised Machine Learning
    Desai, Madhuri Gurunathrao
    Shi, Yong
    Suo, Kun
    2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 316 - 322
  • [8] SIDS: A federated learning approach for intrusion detection in IoT using Social Internet of Things
    Amiri-Zarandi, Mohammad
    Dara, Rozita A.
    Lin, Xiaodong
    COMPUTER NETWORKS, 2023, 236
  • [9] Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks
    Sood, Keshav
    Nosouhi, Mohammad Reza
    Nguyen, Dinh Duc Nha
    Jiang, Frank
    Chowdhury, Morshed
    Doss, Robin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 965 - 979
  • [10] An Intrusion Detection Scheme Based on Anomaly Mining in Internet of Things
    Fu, Rongrong
    Zheng, Kangfeng
    Zhang, Dongmei
    Yang, Yixian
    2011 IET 4TH INTERNATIONAL CONFERENCE ON WIRELESS, MOBILE & MULTIMEDIA NETWORKS (ICWMMN 2011), 2011, : 315 - 320