Journal of Machine and Computing


Enhancing Network Anomaly Intrusion Detection with IoT Data-Driven BOA-CNN-BiGRU-AAM -Net Classification



Journal of Machine and Computing

Received On : 23 December 2023

Revised On : 25 April 2024

Accepted On : 24 June 2024

Published On : 05 July 2024

Volume 04, Issue 03

Pages : 785-803


Abstract


Network security is one of the key components of cybersecurity anomaly intrusion detection, which is responsible for identifying unusual behaviours or activities within a network that might indicate possible security breaches or threats. In this suggested intrusion detection system (IDS), network traffic data is continuously monitored via anomaly detection. The study makes utilising one of the most recent datasets to spot unusual behaviour in networks connected to the Internet of Things, the IoTID20 dataset, to facilitate this process. The preprocessing stage involves painstaking steps for smoothing, filtering, and cleaning the data. The Pine Cone Optimisation algorithm (PCOA), a novel optimizer inspired by nature, is introduced in this study for the feature selection process. PCOA seeks to increase the effectiveness of feature selection while drawing inspiration from the various ways that pine trees reproduce, such as pollination and the movement of pine cones by animals and gravity. Moreover, IDS is classified using Bidirectional Gated Recurrent Unit–Additive Attention Mechanism Based on Convolutional Neural Networks (CNN-BiGRU-AAM), which makes use of deep learning's capabilities for efficient classification tasks. In addition, this work presents the Botox Optimisation Algorithm (BOA) for hyperparameter tuning, which is modelled after the way Botox functions in human anatomy. BOA uses a human-based method to adjust the hyperparameters of the model to attain the best accuracy. The results of the experiments show that the suggested methodologies are effective in improving network anomaly intrusion detection systems, with a maximum accuracy of 99.45%.


Keywords


Intrusion Detection System, Pine Cone Optimization Algorithm, Botox Optimization Algorithm, Long Short-Term Memory, Transformer.


  1. Y. Otoum, D. Liu, and A. Nayak, “DL‐IDS: a deep learning–based intrusion detection framework for securing IoT,” Transactions on Emerging Telecommunications Technologies, vol. 33, no. 3, Nov. 2019, doi: 10.1002/ett.3803.
  2. A. DURAISAMY, M. SUBRAMANIAM, and C. R. RENE ROBIN, “An Optimized Deep Learning Based Security Enhancement and Attack Detection on IoT Using IDS and KH-AES for Smart Cities,” Studies in Informatics and Control, vol. 30, no. 2, pp. 121–131, Jun. 2021, doi: 10.24846/v30i2y202111.
  3. L. Aversano, M. L. Bernardi, M. Cimitile, R. Pecori, and L. Veltri, “Effective Anomaly Detection Using Deep Learning in IoT Systems,” Wireless Communications and Mobile Computing, vol. 2021, pp. 1–14, Oct. 2021, doi: 10.1155/2021/9054336.
  4. J. Rubia J and B. Lincy R, “Evolutionary meta-heuristic optimized model: An application to plant disease diagnosis,” Journal of Intelligent & Fuzzy Systems, vol. 45, no. 6, pp. 10967–10983, Dec. 2023, doi: 10.3233/jifs-213423.
  5. A. Verma and V. Ranga, “Machine Learning Based Intrusion Detection Systems for IoT Applications,” Wireless Personal Communications, vol. 111, no. 4, pp. 2287–2310, Nov. 2019, doi: 10.1007/s11277-019-06986-8.
  6. I. Idrissi, M. Azizi, and O. Moussaoui, “IoT security with Deep Learning-based Intrusion Detection Systems: A systematic literature review,” 2020 Fourth International Conference On Intelligent Computing in Data Sciences (ICDS), Oct. 2020, doi: 10.1109/icds50568.2020.9268713.
  7. A. Khatib, M. Hamlich, and D. Hamad, “Machine Learning based Intrusion Detection for Cyber-Security in IoT Networks,” E3S Web of Conferences, vol. 297, p. 01057, 2021, doi: 10.1051/e3sconf/202129701057.
  8. A. Sarwar, A. M. Alnajim, S. N. K. Marwat, S. Ahmed, S. Alyahya, and W. U. Khan, “Enhanced Anomaly Detection System for IoT Based on Improved Dynamic SBPSO,” Sensors, vol. 22, no. 13, p. 4926, Jun. 2022, doi: 10.3390/s22134926.
  9. Y. N. Soe, Y. Feng, P. I. Santosa, R. Hartanto, and K. Sakurai, “Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation,” Advances in Intelligent Systems and Computing, pp. 458–469, Mar. 2019, doi: 10.1007/978-3-030-15032-7_39.
  10. E. Altulaihan, M. A. Almaiah, and A. Aljughaiman, “Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions,” Electronics, vol. 11, no. 20, p. 3330, Oct. 2022, doi: 10.3390/electronics11203330.
  11. Farah, A. Cross Dataset Evaluation for IoT Network Intrusion Detection. Ph.D. Thesis, The University of Wisconsin-Milwaukee, Milwaukee, WI, USA, 2020.
  12. H. Liu and B. Lang, “Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey,” Applied Sciences, vol. 9, no. 20, p. 4396, Oct. 2019, doi: 10.3390/app9204396.
  13. Jency Rubia, Babitha Lincy, Sherin Shibi, Sheeba, “An effective transfer learning model for multiclass brain tumor classification using MRI images”, AIP Conf. Proc. 2904, 020009 (2023), https://doi.org/10.1063/5.0170435
  14. H. Hindy, R. Atkinson, C. Tachtatzis, J.-N. Colin, E. Bayne, and X. Bellekens, “Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection,” Electronics, vol. 9, no. 10, p. 1684, Oct. 2020, doi: 10.3390/electronics9101684.
  15. J. Kim, J. Kim, H. Kim, M. Shim, and E. Choi, “CNN-Based Network Intrusion Detection against Denial-of-Service Attacks,” Electronics, vol. 9, no. 6, p. 916, Jun. 2020, doi: 10.3390/electronics9060916.
  16. I. Idrissi, M. Azizi, and O. Moussaoui, “Accelerating the update of a DL-based IDS for IoT using deep transfer learning,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 23, no. 2, p. 1059, Aug. 2021, doi: 10.11591/ijeecs. v23.i2.pp1059-1067.
  17. G. Kocher and G. Kumar, “Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges,” Soft Computing, vol. 25, no. 15, pp. 9731–9763, Jun. 2021, doi: 10.1007/s00500-021-05893-0.
  18. E.-H. Qazi, M. Imran, N. Haider, M. Shoaib, and I. Razzak, “An intelligent and efficient network intrusion detection system using deep learning,” Computers and Electrical Engineering, vol. 99, p. 107764, Apr. 2022, doi: 10.1016/j.compeleceng.2022.107764.
  19. S. Sriram, A. Shashank, R. Vinayakumar, and K. P. Soman, “DCNN-IDS: Deep Convolutional Neural Network Based Intrusion Detection System,” Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation, pp. 85–92, 2020, doi: 10.1007/978-981-15-9700-8_7.
  20. R. Lohiya and A. Thakkar, “Intrusion Detection Using Deep Neural Network with AntiRectifier Layer,” Lecture Notes in Networks and Systems, pp. 89–105, 2021, doi: 10.1007/978-981-33-6173-7_7.
  21. F. Safarov, M. Basak, R. Nasimov, A. Abdusalomov, and Y. I. Cho, “Explainable Lightweight Block Attention Module Framework for Network-Based IoT Attack Detection,” Future Internet, vol. 15, no. 9, p. 297, Sep. 2023, doi: 10.3390/fi15090297.
  22. R. Meddeb, F. Jemili, B. Triki, and O. Korbaa, “A deep learning-based intrusion detection approach for mobile Ad-hoc network,” Soft Computing, vol. 27, no. 14, pp. 9425–9439, May 2023, doi: 10.1007/s00500-023-08324-4.
  23. V. Ponnusamy, M. Humayun, N. Z. Jhanjhi, A. Yichiet, and M. Fahhad Almufareh, “Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks,” Computer Systems Science and Engineering, vol. 40, no. 3, pp. 1199–1215, 2022, doi: 10.32604/csse.2022.018518.
  24. O. Sbai and M. Elboukhari, “Deep learning intrusion detection system for mobile ad hoc networks against flooding attacks,” IAES International Journal of Artificial Intelligence (IJ-AI), vol. 11, no. 3, p. 878, Sep. 2022, doi: 10.11591/ijai. v11.i3. pp878-885.
  25. Abbood, Z.A., Atilla, D.Ç. and Aydin, Ç., 2023. Intrusion Detection System Through Deep Learning in Routing MANET Networks. Intelligent Automation & Soft Computing, 37(1).
  26. S. B. Ninu, “An intrusion detection system using Exponential Henry Gas Solubility Optimization based Deep Neuro Fuzzy Network in MANET,” Engineering Applications of Artificial Intelligence, vol. 123, p. 105969, Aug. 2023, doi: 10.1016/j.engappai.2023.105969.
  27. M. Prasad, S. Tripathi, and K. Dahal, “An intelligent intrusion detection and performance reliability evaluation mechanism in mobile ad-hoc networks,” Engineering Applications of Artificial Intelligence, vol. 119, p. 105760, Mar. 2023, doi: 10.1016/j.engappai.2022.105760.
  28. E. Altulaihan, M. A. Almaiah, and A. Aljughaiman, “Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms,” Sensors, vol. 24, no. 2, p. 713, Jan. 2024, doi: 10.3390/s24020713.
  29. S. Hu et al., “Feature Extraction Approach for Distributed Wind Power Generation Based on Power System Flexibility Planning Analysis,” Electronics, vol. 13, no. 5, p. 966, Mar. 2024, doi: 10.3390/electronics13050966.
  30. M. Valikhan Anaraki and S. Farzin, “The Pine Cone Optimization Algorithm (PCOA),” Biomimetics, vol. 9, no. 2, p. 91, Feb. 2024, doi: 10.3390/biomimetics9020091.
  31. S. Liu, W. Lin, Y. Wang, D. Z. Yu, Y. Peng, and X. Ma, “Convolutional Neural Network-Based Bidirectional Gated Recurrent Unit–Additive Attention Mechanism Hybrid Deep Neural Networks for Short-Term Traffic Flow Prediction,” Sustainability, vol. 16, no. 5, p. 1986, Feb. 2024, doi: 10.3390/su16051986.
  32. M. Hubálovská, Š. Hubálovský, and P. Trojovský, “Botox Optimization Algorithm: A New Human-Based Metaheuristic Algorithm for Solving Optimization Problems,” Biomimetics, vol. 9, no. 3, p. 137, Feb. 2024, doi: 10.3390/biomimetics9030137.

Acknowledgements


Authors thank Reviewers for taking the time and effort necessary to review the manuscript.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Suresh G, Sathya M, Arthi D and Arulkumaran G, “Enhancing Network Anomaly Intrusion Detection with IoT Data-Driven BOA-CNN-BiGRU-AAM -Net Classification”, Journal of Machine and Computing, pp. 785-803, July 2024. doi: 10.53759/7669/jmc202404073.


Copyright


© 2024 Suresh G, Sathya M, Arthi D and Arulkumaran G. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.