Distributed intrusion detection scheme using dual-axis dimensionality reduction for Internet of things (IoT)

被引:0
|
作者
Shashank Gavel
Ajay Singh Raghuvanshi
Sudarshan Tiwari
机构
[1] National Institute of Technology,Department of Electronics and Communication
[2] Motilal Nehru National Institute of Technology,Department of Electronics and Communication
来源
关键词
Intrusion detection; Security; Kalman filter; Salp swarm algorithm; Extreme learning machine; KELM; Internet of things; Fog networks;
D O I
暂无
中图分类号
学科分类号
摘要
The immense growth in the cyber world has given birth to various types of cybercrimes in the Internet of things (IoT). Cybercrimes have breached the multiple levels of cybersecurity that is one of the major issues in the IoT networks. Due to the rise in IoT applications, both devices and services are prone to security attacks and intrusions. The intrusion breaches the data packet extracted from different nodes deployed in the IoT network. Most of the intrusive attacks are very near variants of previously marked cyberattacks containing many repetitive data and features. And to detect the intrusion, the data packet needs to be analyzed. This article presents a novel scheme, i.e., dual-axis dimensionality reduction, that utilizes Kalman filter and salp swarm algorithm (coded as KF-SSA) for analyzing and minimizing the data packet. The proposed data reduction scheme is utilized with KELM-based multiclass classifier to efficiently detect intrusion in the IoT network (KF-SSA with KELM). The proposed method’s overall results are evaluated using standard intrusion detection datasets, i.e., NSL-KDD, KYOTO 2006+ (2015), CICIDS2017, and CICIDS2018 (AWS). The result from the proposed data reduction technique obtains highly reduced data, i.e., 70.% for NSL-KDD and 86.43% for CICIDS2017. The analyzed result shows high detection accuracy of 99.9% for NSL-KDD and 95.68% for CICIDS2017 with decreased computational time.
引用
收藏
页码:10488 / 10511
页数:23
相关论文
共 50 条
  • [41] A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks
    Kumar, Prabhat
    Gupta, Govind P.
    Tripathi, Rakesh
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (10) : 9555 - 9572
  • [42] Advancements in Intrusion Detection Systems for Internet of Things Using Machine Learning
    Ul Haq, Shahid
    Abbas, Ash Mohammad
    2022 5TH INTERNATIONAL CONFERENCE ON MULTIMEDIA, SIGNAL PROCESSING AND COMMUNICATION TECHNOLOGIES (IMPACT), 2022,
  • [43] Intrusion Detection Using CTGAN and Lightweight Neural Network for Internet of Things
    Das, Sudeshna
    Majumder, Abhishek
    Namasudra, Suyel
    Singh, Ashish
    EXPERT SYSTEMS, 2025, 42 (02)
  • [44] Intrusion Detection using Support Vector Machine on Internet of Things Dataset
    Aditya, Rifky
    Nuha, Hilal H.
    Prabowo, Sidik
    Proceeding - IEEE International Conference on Communication, Networks and Satellite, COMNETSAT 2022, 2022, : 62 - 66
  • [45] Intelligent Intrusion Detection for Industrial Internet of Things Using Clustering Techniques
    Alenezi N.
    Aljuhani A.
    Computer Systems Science and Engineering, 2023, 46 (03): : 2899 - 2915
  • [46] Internet of Things (IoTs) Security: Intrusion Detection using Deep Learning
    Sahingoz, Ozgur Koray
    Cekmez, Ugur
    Buldu, Ali
    JOURNAL OF WEB ENGINEERING, 2021, 20 (06): : 1721 - 1760
  • [47] Advanced intrusion detection in internet of things using graph attention networks
    Ahanger, Aamir S.
    Khan, Sajad M.
    Masoodi, Faheem
    Salau, Ayodeji Olalekan
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [48] DSHMP-IOT: A distributed self healing movement prediction scheme for internet of things applications
    Azadeh Zamanifar
    Eslam Nazemi
    Mojtaba Vahidi-Asl
    Applied Intelligence, 2017, 46 : 569 - 589
  • [49] DSHMP-IOT: A distributed self healing movement prediction scheme for internet of things applications
    Zamanifar, Azadeh
    Nazemi, Eslam
    Vahidi-Asl, Mojtaba
    APPLIED INTELLIGENCE, 2017, 46 (03) : 569 - 589
  • [50] Distributed scheduling using belief propagation for internet-of-things (IoT) networks
    Sohn, Illsoo
    Yoon, Sang Won
    Lee, Sang Hyun
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (01) : 152 - 161