Network security is one of the key components of cybersecurity anomaly intrusion detection, which is responsible for identifying unusual behaviours or activities within a network that might indicate possible security breaches or threats. In this suggested intrusion detection system (IDS), network traffic data is continuously monitored via anomaly detection. The study makes utilising one of the most recent datasets to spot unusual behaviour in networks connected to the Internet of Things, the IoTID20 dataset, to facilitate this process. The preprocessing stage involves painstaking steps for smoothing, filtering, and cleaning the data. The Pine Cone Optimisation algorithm (PCOA), a novel optimizer inspired by nature, is introduced in this study for the feature selection process. PCOA seeks to increase the effectiveness of feature selection while drawing inspiration from the various ways that pine trees reproduce, such as pollination and the movement of pine cones by animals and gravity. Moreover, IDS is classified using Bidirectional Gated Recurrent Unit–Additive Attention Mechanism Based on Convolutional Neural Networks (CNN-BiGRU-AAM), which makes use of deep learning's capabilities for efficient classification tasks. In addition, this work presents the Botox Optimisation Algorithm (BOA) for hyperparameter tuning, which is modelled after the way Botox functions in human anatomy. BOA uses a human-based method to adjust the hyperparameters of the model to attain the best accuracy. The results of the experiments show that the suggested methodologies are effective in improving network anomaly intrusion detection systems, with a maximum accuracy of 99.45%.
Keywords
Intrusion Detection System, Pine Cone Optimization Algorithm, Botox Optimization Algorithm, Long Short-Term Memory, Transformer.
Y. Otoum, D. Liu, and A. Nayak, “DL‐IDS: a deep learning–based intrusion detection framework for securing IoT,” Transactions on Emerging Telecommunications Technologies, vol. 33, no. 3, Nov. 2019, doi: 10.1002/ett.3803.
A. DURAISAMY, M. SUBRAMANIAM, and C. R. RENE ROBIN, “An Optimized Deep Learning Based Security Enhancement and Attack Detection on IoT Using IDS and KH-AES for Smart Cities,” Studies in Informatics and Control, vol. 30, no. 2, pp. 121–131, Jun. 2021, doi: 10.24846/v30i2y202111.
L. Aversano, M. L. Bernardi, M. Cimitile, R. Pecori, and L. Veltri, “Effective Anomaly Detection Using Deep Learning in IoT Systems,” Wireless Communications and Mobile Computing, vol. 2021, pp. 1–14, Oct. 2021, doi: 10.1155/2021/9054336.
J. Rubia J and B. Lincy R, “Evolutionary meta-heuristic optimized model: An application to plant disease diagnosis,” Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10967–10983, Dec. 2023, doi: 10.3233/jifs-213423.
A. Verma and V. Ranga, “Machine Learning Based Intrusion Detection Systems for IoT Applications,” Wireless Personal Communications, vol. 111, no. 4, pp. 2287–2310, Nov. 2019, doi: 10.1007/s11277-019-06986-8.
I. Idrissi, M. Azizi, and O. Moussaoui, “IoT security with Deep Learning-based Intrusion Detection Systems: A systematic literature review,” 2020 Fourth International Conference On Intelligent Computing in Data Sciences (ICDS), Oct. 2020, doi: 10.1109/icds50568.2020.9268713.
A. Khatib, M. Hamlich, and D. Hamad, “Machine Learning based Intrusion Detection for Cyber-Security in IoT Networks,” E3S Web of Conferences, vol. 297, p. 01057, 2021, doi: 10.1051/e3sconf/202129701057.
A. Sarwar, A. M. Alnajim, S. N. K. Marwat, S. Ahmed, S. Alyahya, and W. U. Khan, “Enhanced Anomaly Detection System for IoT Based on Improved Dynamic SBPSO,” Sensors, vol. 22, no. 13, p. 4926, Jun. 2022, doi: 10.3390/s22134926.
Y. N. Soe, Y. Feng, P. I. Santosa, R. Hartanto, and K. Sakurai, “Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation,” Advances in Intelligent Systems and Computing, pp. 458–469, Mar. 2019, doi: 10.1007/978-3-030-15032-7_39.
E. Altulaihan, M. A. Almaiah, and A. Aljughaiman, “Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions,” Electronics, vol. 11, no. 20, p. 3330, Oct. 2022, doi: 10.3390/electronics11203330.
Farah, A. Cross Dataset Evaluation for IoT Network Intrusion Detection. Ph.D. Thesis, The University of Wisconsin-Milwaukee, Milwaukee, WI, USA, 2020.
H. Liu and B. Lang, “Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey,” Applied Sciences, vol. 9, no. 20, p. 4396, Oct. 2019, doi: 10.3390/app9204396.
Jency Rubia, Babitha Lincy, Sherin Shibi, Sheeba, “An effective transfer learning model for multiclass brain tumor classification using MRI images”, AIP Conf. Proc. 2904, 020009 (2023), https://doi.org/10.1063/5.0170435
H. Hindy, R. Atkinson, C. Tachtatzis, J.-N. Colin, E. Bayne, and X. Bellekens, “Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection,” Electronics, vol. 9, no. 10, p. 1684, Oct. 2020, doi: 10.3390/electronics9101684.
J. Kim, J. Kim, H. Kim, M. Shim, and E. Choi, “CNN-Based Network Intrusion Detection against Denial-of-Service Attacks,” Electronics, vol. 9, no. 6, p. 916, Jun. 2020, doi: 10.3390/electronics9060916.
I. Idrissi, M. Azizi, and O. Moussaoui, “Accelerating the update of a DL-based IDS for IoT using deep transfer learning,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 23, no. 2, p. 1059, Aug. 2021, doi: 10.11591/ijeecs. v23.i2.pp1059-1067.
G. Kocher and G. Kumar, “Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges,” Soft Computing, vol. 25, no. 15, pp. 9731–9763, Jun. 2021, doi: 10.1007/s00500-021-05893-0.
E.-H. Qazi, M. Imran, N. Haider, M. Shoaib, and I. Razzak, “An intelligent and efficient network intrusion detection system using deep learning,” Computers and Electrical Engineering, vol. 99, p. 107764, Apr. 2022, doi: 10.1016/j.compeleceng.2022.107764.
S. Sriram, A. Shashank, R. Vinayakumar, and K. P. Soman, “DCNN-IDS: Deep Convolutional Neural Network Based Intrusion Detection System,” Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation, pp. 85–92, 2020, doi: 10.1007/978-981-15-9700-8_7.
R. Lohiya and A. Thakkar, “Intrusion Detection Using Deep Neural Network with AntiRectifier Layer,” Lecture Notes in Networks and Systems, pp. 89–105, 2021, doi: 10.1007/978-981-33-6173-7_7.
F. Safarov, M. Basak, R. Nasimov, A. Abdusalomov, and Y. I. Cho, “Explainable Lightweight Block Attention Module Framework for Network-Based IoT Attack Detection,” Future Internet, vol. 15, no. 9, p. 297, Sep. 2023, doi: 10.3390/fi15090297.
R. Meddeb, F. Jemili, B. Triki, and O. Korbaa, “A deep learning-based intrusion detection approach for mobile Ad-hoc network,” Soft Computing, vol. 27, no. 14, pp. 9425–9439, May 2023, doi: 10.1007/s00500-023-08324-4.
V. Ponnusamy, M. Humayun, N. Z. Jhanjhi, A. Yichiet, and M. Fahhad Almufareh, “Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks,” Computer Systems Science and Engineering, vol. 40, no. 3, pp. 1199–1215, 2022, doi: 10.32604/csse.2022.018518.
O. Sbai and M. Elboukhari, “Deep learning intrusion detection system for mobile ad hoc networks against flooding attacks,” IAES International Journal of Artificial Intelligence (IJ-AI), vol. 11, no. 3, p. 878, Sep. 2022, doi: 10.11591/ijai. v11.i3. pp878-885.
Abbood, Z.A., Atilla, D.Ç. and Aydin, Ç., 2023. Intrusion Detection System Through Deep Learning in Routing MANET Networks. Intelligent Automation & Soft Computing, 37(1).
S. B. Ninu, “An intrusion detection system using Exponential Henry Gas Solubility Optimization based Deep Neuro Fuzzy Network in MANET,” Engineering Applications of Artificial Intelligence, vol. 123, p. 105969, Aug. 2023, doi: 10.1016/j.engappai.2023.105969.
M. Prasad, S. Tripathi, and K. Dahal, “An intelligent intrusion detection and performance reliability evaluation mechanism in mobile ad-hoc networks,” Engineering Applications of Artificial Intelligence, vol. 119, p. 105760, Mar. 2023, doi: 10.1016/j.engappai.2022.105760.
E. Altulaihan, M. A. Almaiah, and A. Aljughaiman, “Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms,” Sensors, vol. 24, no. 2, p. 713, Jan. 2024, doi: 10.3390/s24020713.
S. Hu et al., “Feature Extraction Approach for Distributed Wind Power Generation Based on Power System Flexibility Planning Analysis,” Electronics, vol. 13, no. 5, p. 966, Mar. 2024, doi: 10.3390/electronics13050966.
M. Valikhan Anaraki and S. Farzin, “The Pine Cone Optimization Algorithm (PCOA),” Biomimetics, vol. 9, no. 2, p. 91, Feb. 2024, doi: 10.3390/biomimetics9020091.
S. Liu, W. Lin, Y. Wang, D. Z. Yu, Y. Peng, and X. Ma, “Convolutional Neural Network-Based Bidirectional Gated Recurrent Unit–Additive Attention Mechanism Hybrid Deep Neural Networks for Short-Term Traffic Flow Prediction,” Sustainability, vol. 16, no. 5, p. 1986, Feb. 2024, doi: 10.3390/su16051986.
M. Hubálovská, Š. Hubálovský, and P. Trojovský, “Botox Optimization Algorithm: A New Human-Based Metaheuristic Algorithm for Solving Optimization Problems,” Biomimetics, vol. 9, no. 3, p. 137, Feb. 2024, doi: 10.3390/biomimetics9030137.
Acknowledgements
Authors thank Reviewers for taking the time and effort necessary to review the manuscript.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of data and materials
Data sharing is not applicable to this article as no new data were created or analysed in this study.
Author information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Corresponding author
Suresh G
Suresh G
Department of Artificial Intelligence and Data Science, Kings Engineering College, Sriperumbudur, Tamil Nadu, India.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this article
Suresh G, Sathya M, Arthi D and Arulkumaran G, “Enhancing Network Anomaly Intrusion Detection with IoT Data-Driven BOA-CNN-BiGRU-AAM -Net Classification”, Journal of Machine and Computing, pp. 785-803, July 2024. doi: 10.53759/7669/jmc202404073.