1
|
Eltoukhy MM, Gaber T, Almazroi AA, Mohamed MF. ONE3A: one-against-all authentication model for smartphone using GAN network and optimization techniques. PeerJ Comput Sci 2024; 10:e2001. [PMID: 38699213 PMCID: PMC11065406 DOI: 10.7717/peerj-cs.2001] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/26/2023] [Accepted: 03/28/2024] [Indexed: 05/05/2024]
Abstract
This study focuses on addressing computational limits in smartphones by proposing an efficient authentication model that enables implicit authentication without requiring additional hardware and incurring less computational cost. The research explores various wrapper feature selection strategies and classifiers to enhance authentication accuracy while considering smartphone limitations such as hardware constraints, battery life, and memory size. However, the available dataset is small; thus, it cannot support a general conclusion. In this article, a novel implicit authentication model for smartphone users is proposed to address the one-against-all classification problem in smartphone authentication. This model depends on the integration of the conditional tabular generative adversarial network (CTGAN) to generate synthetic data to address the imbalanced dataset and a new proposed feature selection technique based on the Whale Optimization Algorithm (WOA). The model was evaluated using a public dataset (RHU touch mobile keystroke dataset), and the results showed that the WOA with the random forest (RF) classifier achieved the best reduction rate compared to the Harris Hawks Optimization (HHO) algorithm. Additionally, its classification accuracy was found to be the best in mobile user authentication from their touch behavior data. WOA-RF achieved an average accuracy of 99.62 ± 0.40% with a reduction rate averaging 87.85% across ten users, demonstrating its effectiveness in smartphone authentication.
Collapse
Affiliation(s)
- Mohamed Meselhy Eltoukhy
- Department of Information Technology, College of Computing and Information Technology at Khulais, University of Jeddah, Jeddah, Saudi Arabia
| | - Tarek Gaber
- School of Science, Engineering, and Environment, University of Salford, Salford, United Kingdom
- Department of Computer Science, Faculty of Computers and Informatics, Suez Canal University, Ismailia, Egypt
| | - Abdulwahab Ali Almazroi
- Department of Information Technology, College of Computing and Information Technology at Khulais, University of Jeddah, Jeddah, Saudi Arabia
| | - Marwa F. Mohamed
- Department of Computer Science, Faculty of Computers and Informatics, Suez Canal University, Ismailia, Egypt
| |
Collapse
|
2
|
Liu Z, Wang Y, Feng F, Liu Y, Li Z, Shan Y. A DDoS Detection Method Based on Feature Engineering and Machine Learning in Software-Defined Networks. SENSORS (BASEL, SWITZERLAND) 2023; 23:6176. [PMID: 37448025 DOI: 10.3390/s23136176] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/18/2023] [Revised: 06/26/2023] [Accepted: 07/03/2023] [Indexed: 07/15/2023]
Abstract
Distributed denial-of-service (DDoS) attacks pose a significant cybersecurity threat to software-defined networks (SDNs). This paper proposes a feature-engineering- and machine-learning-based approach to detect DDoS attacks in SDNs. First, the CSE-CIC-IDS2018 dataset was cleaned and normalized, and the optimal feature subset was found using an improved binary grey wolf optimization algorithm. Next, the optimal feature subset was trained and tested in Random Forest (RF), Support Vector Machine (SVM), K-Nearest Neighbor (k-NN), Decision Tree, and XGBoost machine learning algorithms, from which the best classifier was selected for DDoS attack detection and deployed in the SDN controller. The results show that RF performs best when compared across several performance metrics (e.g., accuracy, precision, recall, F1 and AUC values). We also explore the comparison between different models and algorithms. The results show that our proposed method performed the best and can effectively detect and identify DDoS attacks in SDNs, providing a new idea and solution for the security of SDNs.
Collapse
Affiliation(s)
- Zhenpeng Liu
- School of Electronic Information Engineering, Hebei University, Baoding 071002, China
- Information Technology Center, Hebei University, Baoding 071002, China
| | - Yihang Wang
- School of Electronic Information Engineering, Hebei University, Baoding 071002, China
| | - Fan Feng
- Information Technology Center, Hebei University, Baoding 071002, China
| | - Yifan Liu
- School of Cyberspace Security and Computer, Hebei University, Baoding 071002, China
| | - Zelin Li
- School of Electronic Information Engineering, Hebei University, Baoding 071002, China
| | - Yawei Shan
- School of Electronic Information Engineering, Hebei University, Baoding 071002, China
| |
Collapse
|
3
|
Sharma RK, Issac B, Xin Q, Gadekallu TR, Nath K. Plant and Salamander Inspired Network Attack Detection and Data Recovery Model. SENSORS (BASEL, SWITZERLAND) 2023; 23:5562. [PMID: 37420729 DOI: 10.3390/s23125562] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/15/2023] [Revised: 04/24/2023] [Accepted: 06/01/2023] [Indexed: 07/09/2023]
Abstract
The number of users of the Internet has been continuously rising, with an estimated 5.1 billion users in 2023, which comprises around 64.7% of the total world population. This indicates the rise of more connected devices to the network. On average, 30,000 websites are hacked daily, and nearly 64% of companies worldwide experience at least one type of cyberattack. As per IDC's 2022 Ransomware study, two-thirds of global organizations were hit by a ransomware attack that year. This creates the desire for a more robust and evolutionary attack detection and recovery model. One aspect of the study is the bio-inspiration models. This is because of the natural ability of living organisms to withstand various odd circumstances and overcome them with an optimization strategy. In contrast to the limitations of machine learning models with the need for quality datasets and computational availability, bio-inspired models can perform in low computational environments, and their performances are designed to evolve naturally with time. This study concentrates on exploring the evolutionary defence mechanism in plants and understanding how plants react to any known external attacks and how the response mechanism changes to unknown attacks. This study also explores how regenerative models, such as salamander limb regeneration, could build a network recovery system where services could be automatically activated after a network attack, and data could be recovered automatically by the network after a ransomware-like attack. The performance of the proposed model is compared to open-source IDS Snort and data recovery systems such as Burp and Casandra.
Collapse
Affiliation(s)
- Rupam Kumar Sharma
- Department of Computer Science and Engineering, Rajiv Gandhi University, Itanagar 791112, India
| | - Biju Issac
- Department of Computer and Information Sciences, Northumbria University, Newcastle upon Tyne NE1 8ST, UK
| | - Qin Xin
- Faculty of Science and Technology, University of the Faroe Islands, Vestara Bryggja 15, FO-100 Tórshavn, Faroe Islands
| | - Thippa Reddy Gadekallu
- School of Information Technology and Engineering, Vellore Institute of Technology & Engineering, Vellore 632014, India
- Department of Electrical and Computer Engineering, Lebanese American University, Byblos P.O. Box 36, Lebanon
- Zhongda Group, Haiyan County, Jiaxing 314312, China
- College of Information Science and Engineering, Jiaxing University, Jiaxing 314001, China
- Division of Research and Development, Lovely Professional University, Phagwara 144401, India
| | - Keshab Nath
- Department of Computer Science and Engineering, Indian Institute of Information Technology, Kottayam 686635, India
| |
Collapse
|
4
|
Almuqren L, Al-Mutiri F, Maashi M, Mohsen H, Hilal AM, Alsaid MI, Drar S, Abdelbagi S. Sine-Cosine-Adopted African Vultures Optimization with Ensemble Autoencoder-Based Intrusion Detection for Cybersecurity in CPS Environment. SENSORS (BASEL, SWITZERLAND) 2023; 23:4804. [PMID: 37430718 DOI: 10.3390/s23104804] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/31/2023] [Revised: 03/22/2023] [Accepted: 05/12/2023] [Indexed: 07/12/2023]
Abstract
A Cyber-Physical System (CPS) is a network of cyber and physical elements that interact with each other. In recent years, there has been a drastic increase in the utilization of CPSs, which makes their security a challenging problem to address. Intrusion Detection Systems (IDSs) have been used for the detection of intrusions in networks. Recent advancements in the fields of Deep Learning (DL) and Artificial Intelligence (AI) have allowed the development of robust IDS models for the CPS environment. On the other hand, metaheuristic algorithms are used as feature selection models to mitigate the curse of dimensionality. In this background, the current study presents a Sine-Cosine-Adopted African Vultures Optimization with Ensemble Autoencoder-based Intrusion Detection (SCAVO-EAEID) technique to provide cybersecurity in CPS environments. The proposed SCAVO-EAEID algorithm focuses mainly on the identification of intrusions in the CPS platform via Feature Selection (FS) and DL modeling. At the primary level, the SCAVO-EAEID technique employs Z-score normalization as a preprocessing step. In addition, the SCAVO-based Feature Selection (SCAVO-FS) method is derived to elect the optimal feature subsets. An ensemble Deep-Learning-based Long Short-Term Memory-Auto Encoder (LSTM-AE) model is employed for the IDS. Finally, the Root Means Square Propagation (RMSProp) optimizer is used for hyperparameter tuning of the LSTM-AE technique. To demonstrate the remarkable performance of the proposed SCAVO-EAEID technique, the authors used benchmark datasets. The experimental outcomes confirmed the significant performance of the proposed SCAVO-EAEID technique over other approaches with a maximum accuracy of 99.20%.
Collapse
Affiliation(s)
- Latifah Almuqren
- Department of Information Systems, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
| | - Fuad Al-Mutiri
- Department of Mathematics, Faculty of Sciences and Arts, King Khalid University, Muhayil Asir 63311, Saudi Arabia
| | - Mashael Maashi
- Department of Software Engineering, College of Computer and Information Sciences, King Saud University, P.O. Box 103786, Riyadh 11543, Saudi Arabia
| | - Heba Mohsen
- Department of Computer Science, Faculty of Computers and Information Technology, Future University in Egypt, New Cairo 11835, Egypt
| | - Anwer Mustafa Hilal
- Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam Bin Abdulaziz University, AlKharj 11942, Saudi Arabia
| | - Mohamed Ibrahim Alsaid
- Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam Bin Abdulaziz University, AlKharj 11942, Saudi Arabia
| | - Suhanda Drar
- Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam Bin Abdulaziz University, AlKharj 11942, Saudi Arabia
| | - Sitelbanat Abdelbagi
- Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam Bin Abdulaziz University, AlKharj 11942, Saudi Arabia
| |
Collapse
|
5
|
Sallam YF, Abd El‐Nabi S, El‐Shafai W, Ahmed HEH, Saleeb A, El‐Bahnasawy NA, Abd El‐Samie FE. Efficient implementation of image representation, visual geometry group with 19 layers and residual network with 152 layers for intrusion detection from UNSW‐NB15 dataset. SECURITY AND PRIVACY 2023. [DOI: 10.1002/spy2.300] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/18/2022] [Accepted: 01/14/2023] [Indexed: 09/01/2023]
Abstract
AbstractThe Internet offers humanity many distinctive and indispensable services, whether for individuals or for institutions and companies. This great role has attracted the Internet attackers to develop their mechanisms to capture and obtain the data by illegal methods. This growth in the number of cyber‐attacks made scientists in a real challenge, to find advanced methods to face this danger. Due to the shortcomings of traditional data security means such as firewalls, encryption, and so forth, the motivation became to develop alternative systems to detect smart attacks. Intrusion detection systems (IDSs) have made remarkable progress in cyber‐security. They monitor the traffic in real time and continuously to detect the network attacks, giving alerts to the network administrator. In this article, two IDSs are introduced based on principles of transfer learning (TL) with convolutional neural networks. Our systems are built using the visual geometry group (VGG19) and residual network with 152 layers (ResNet152). UNSW‐NB15 intrusion detection dataset is used to evaluate the models. The proposals achieve high levels of precision, recall, and F1_score as 99%, 99%, and 99%, respectively. These achievements prove the efficiency of the proposed models in capturing cyber‐attacks with low alert rates.
Collapse
Affiliation(s)
- Youssef F. Sallam
- Department of Electronics and Electrical Communications Faculty of Electronic Engineering, Menoufia University Menouf Egypt
| | - Samy Abd El‐Nabi
- Alexandria Higher Institute of Engineering & Technology (AIET) Alexandria Egypt
| | - Walid El‐Shafai
- Department of Electronics and Electrical Communications Faculty of Electronic Engineering, Menoufia University Menouf Egypt
- Security Engineering Lab, Computer Science Department Prince Sultan University Riyadh Saudi Arabia
| | - Hossam El‐din H. Ahmed
- Department of Electronics and Electrical Communications Faculty of Electronic Engineering, Menoufia University Menouf Egypt
| | - Adel Saleeb
- Department of Electronics and Electrical Communications Faculty of Electronic Engineering, Menoufia University Menouf Egypt
| | - Nirmeen A. El‐Bahnasawy
- Department of Computer Science and Engineering Faculty of Electronic Engineering, Menoufia University Menouf Egypt
| | - Fathi E. Abd El‐Samie
- Department of Electronics and Electrical Communications Faculty of Electronic Engineering, Menoufia University Menouf Egypt
- Department of Information Technology, College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University Riyadh Saudi Arabia
| |
Collapse
|
6
|
Salman EH, Taher MA, Hammadi YI, Mahmood OA, Muthanna A, Koucheryavy A. An Anomaly Intrusion Detection for High-Density Internet of Things Wireless Communication Network Based Deep Learning Algorithms. SENSORS (BASEL, SWITZERLAND) 2022; 23:s23010206. [PMID: 36616806 DOI: 10.3390/electronics11203332] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/30/2022] [Revised: 12/10/2022] [Accepted: 12/22/2022] [Indexed: 05/27/2023]
Abstract
Telecommunication networks are growing exponentially due to their significant role in civilization and industry. As a result of this very significant role, diverse applications have been appeared, which require secured links for data transmission. However, Internet-of-Things (IoT) devices are a substantial field that utilizes the wireless communication infrastructure. However, the IoT, besides the diversity of communications, are more vulnerable to attacks due to the physical distribution in real world. Attackers may prevent the services from running or even forward all of the critical data across the network. That is, an Intrusion Detection System (IDS) has to be integrated into the communication networks. In the literature, there are numerous methodologies to implement the IDSs. In this paper, two distinct models are proposed. In the first model, a custom Convolutional Neural Network (CNN) was constructed and combined with Long Short Term Memory (LSTM) deep network layers. The second model was built about the all fully connected layers (dense layers) to construct an Artificial Neural Network (ANN). Thus, the second model, which is a custom of an ANN layers with various dimensions, is proposed. Results were outstanding a compared to the Logistic Regression algorithm (LR), where an accuracy of 97.01% was obtained in the second model and 96.08% in the first model, compared to the LR algorithm, which showed an accuracy of 92.8%.
Collapse
Affiliation(s)
- Emad Hmood Salman
- Department of Communications Engineering, College of Engineering, University of Diyala, Baquba 32001, Iraq
| | - Montadar Abas Taher
- Department of Communications Engineering, College of Engineering, University of Diyala, Baquba 32001, Iraq
| | - Yousif I Hammadi
- Department of Medical Instruments Engineering Techniques, Bilad Alrafidain University College, Diyala 32001, Iraq
| | - Omar Abdulkareem Mahmood
- Department of Communications Engineering, College of Engineering, University of Diyala, Baquba 32001, Iraq
| | - Ammar Muthanna
- Department of Telecommunication Networks and Data Transmission, The Bonch-Bruevich Saint-Petersburg State University of Telecommunications, 193232 Saint Petersburg, Russia
| | - Andrey Koucheryavy
- Department of Telecommunication Networks and Data Transmission, The Bonch-Bruevich Saint-Petersburg State University of Telecommunications, 193232 Saint Petersburg, Russia
| |
Collapse
|
7
|
Salman EH, Taher MA, Hammadi YI, Mahmood OA, Muthanna A, Koucheryavy A. An Anomaly Intrusion Detection for High-Density Internet of Things Wireless Communication Network Based Deep Learning Algorithms. SENSORS (BASEL, SWITZERLAND) 2022; 23:s23010206. [PMID: 36616806 PMCID: PMC9824352 DOI: 10.3390/s23010206] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/30/2022] [Revised: 12/10/2022] [Accepted: 12/22/2022] [Indexed: 05/14/2023]
Abstract
Telecommunication networks are growing exponentially due to their significant role in civilization and industry. As a result of this very significant role, diverse applications have been appeared, which require secured links for data transmission. However, Internet-of-Things (IoT) devices are a substantial field that utilizes the wireless communication infrastructure. However, the IoT, besides the diversity of communications, are more vulnerable to attacks due to the physical distribution in real world. Attackers may prevent the services from running or even forward all of the critical data across the network. That is, an Intrusion Detection System (IDS) has to be integrated into the communication networks. In the literature, there are numerous methodologies to implement the IDSs. In this paper, two distinct models are proposed. In the first model, a custom Convolutional Neural Network (CNN) was constructed and combined with Long Short Term Memory (LSTM) deep network layers. The second model was built about the all fully connected layers (dense layers) to construct an Artificial Neural Network (ANN). Thus, the second model, which is a custom of an ANN layers with various dimensions, is proposed. Results were outstanding a compared to the Logistic Regression algorithm (LR), where an accuracy of 97.01% was obtained in the second model and 96.08% in the first model, compared to the LR algorithm, which showed an accuracy of 92.8%.
Collapse
Affiliation(s)
- Emad Hmood Salman
- Department of Communications Engineering, College of Engineering, University of Diyala, Baquba 32001, Iraq
| | - Montadar Abas Taher
- Department of Communications Engineering, College of Engineering, University of Diyala, Baquba 32001, Iraq
| | - Yousif I. Hammadi
- Department of Medical Instruments Engineering Techniques, Bilad Alrafidain University College, Diyala 32001, Iraq
- Correspondence:
| | - Omar Abdulkareem Mahmood
- Department of Communications Engineering, College of Engineering, University of Diyala, Baquba 32001, Iraq
| | - Ammar Muthanna
- Department of Telecommunication Networks and Data Transmission, The Bonch-Bruevich Saint-Petersburg State University of Telecommunications, 193232 Saint Petersburg, Russia
| | - Andrey Koucheryavy
- Department of Telecommunication Networks and Data Transmission, The Bonch-Bruevich Saint-Petersburg State University of Telecommunications, 193232 Saint Petersburg, Russia
| |
Collapse
|
8
|
A new intrusion detection system based on using non-linear statistical analysis and features selection techniques. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102906] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
|
9
|
Xiao Y, Kang C, Yu H, Fan T, Zhang H. Anomalous Network Traffic Detection Method Based on an Elevated Harris Hawks Optimization Method and Gated Recurrent Unit Classifier. SENSORS (BASEL, SWITZERLAND) 2022; 22:7548. [PMID: 36236647 PMCID: PMC9571187 DOI: 10.3390/s22197548] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/25/2022] [Revised: 09/22/2022] [Accepted: 09/29/2022] [Indexed: 06/16/2023]
Abstract
In recent years, network traffic contains a lot of feature information. If there are too many redundant features, the computational cost of the algorithm will be greatly increased. This paper proposes an anomalous network traffic detection method based on Elevated Harris Hawks optimization. This method is easier to identify redundant features in anomalous network traffic, reduces computational overhead, and improves the performance of anomalous traffic detection methods. By enhancing the random jump distance function, escape energy function, and designing a unique fitness function, there is a unique anomalous traffic detection method built using the algorithm and the neural network for anomalous traffic detection. This method is tested on three public network traffic datasets, namely the UNSW-NB15, NSL-KDD, and CICIDS2018. The experimental results show that the proposed method does not only significantly reduce the number of features in the dataset and computational overhead, but also gives better indicators for every test.
Collapse
|
10
|
Awad M, Fraihat S, Salameh K, Al Redhaei A. Examining the Suitability of NetFlow Features in Detecting IoT Network Intrusions. SENSORS (BASEL, SWITZERLAND) 2022; 22:6164. [PMID: 36015924 PMCID: PMC9412997 DOI: 10.3390/s22166164] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 06/29/2022] [Revised: 08/08/2022] [Accepted: 08/16/2022] [Indexed: 06/15/2023]
Abstract
The past few years have witnessed a substantial increase in cyberattacks on Internet of Things (IoT) devices and their networks. Such attacks pose a significant threat to organizational security and user privacy. Utilizing Machine Learning (ML) in Intrusion Detection Systems (NIDS) has proven advantageous in countering novel zero-day attacks. However, the performance of such systems relies on several factors, one of which is prediction time. Processing speed in anomaly-based NIDS depends on a few elements, including the number of features fed to the ML model. NetFlow, a networking industry-standard protocol, offers many features that can be used to predict malicious attacks accurately. This paper examines NetFlow features and assesses their suitability in classifying network traffic. Our paper presents a model that detects attacks with (98-100%) accuracy using as few as 13 features. This study was conducted using a large dataset of over 16 million records released in 2021.
Collapse
Affiliation(s)
- Mohammed Awad
- Department of Computer Science and Engineering, American University of Ras Al Khaimah, Ras Al Khaimah P.O. Box 72603, United Arab Emirates
| | - Salam Fraihat
- Artificial Intelligence Research Center (AIRC), College of Engineering and Information Technology, Ajman University, Ajman P.O. Box 346, United Arab Emirates
| | - Khouloud Salameh
- Department of Computer Science and Engineering, American University of Ras Al Khaimah, Ras Al Khaimah P.O. Box 72603, United Arab Emirates
| | - Aneesa Al Redhaei
- Department of Computer Science and Engineering, American University of Ras Al Khaimah, Ras Al Khaimah P.O. Box 72603, United Arab Emirates
| |
Collapse
|
11
|
A framework to detect DDoS attack in Ryu controller based software defined networks using feature extraction and classification. APPL INTELL 2022. [DOI: 10.1007/s10489-022-03565-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
|
12
|
A Novel Chimp Optimization Algorithm with Refraction Learning and Its Engineering Applications. ALGORITHMS 2022. [DOI: 10.3390/a15060189] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/04/2023]
Abstract
The Chimp Optimization Algorithm (ChOA) is a heuristic algorithm proposed in recent years. It models the cooperative hunting behaviour of chimpanzee populations in nature and can be used to solve numerical as well as practical engineering optimization problems. ChOA has the problems of slow convergence speed and easily falling into local optimum. In order to solve these problems, this paper proposes a novel chimp optimization algorithm with refraction learning (RL-ChOA). In RL-ChOA, the Tent chaotic map is used to initialize the population, which improves the population’s diversity and accelerates the algorithm’s convergence speed. Further, a refraction learning strategy based on the physical principle of light refraction is introduced in ChOA, which is essentially an Opposition-Based Learning, helping the population to jump out of the local optimum. Using 23 widely used benchmark test functions and two engineering design optimization problems proved that RL-ChOA has good optimization performance, fast convergence speed, and satisfactory engineering application optimization performance.
Collapse
|
13
|
Balasaraswathi VR, Mary Shamala L, Hamid Y, Pachhaiammal Alias Priya M, Shobana M, Sugumaran M. An Efficient Feature Selection for Intrusion Detection System Using B-HKNN and C2 Search Based Learning Model. Neural Process Lett 2022. [DOI: 10.1007/s11063-022-10854-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
|
14
|
A Modified Grey Wolf Optimization Algorithm for an Intrusion Detection System. MATHEMATICS 2022. [DOI: 10.3390/math10060999] [Citation(s) in RCA: 9] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/04/2022]
Abstract
Cyber-attacks and unauthorized application usage have increased due to the extensive use of Internet services and applications over computer networks, posing a threat to the service’s availability and consumers’ privacy. A network Intrusion Detection System (IDS) aims to detect aberrant traffic behavior that firewalls cannot detect. In IDSs, dimension reduction using the feature selection strategy has been shown to be more efficient. By reducing the data dimension and eliminating irrelevant and noisy data, several bio-inspired algorithms have been employed to improve the performance of an IDS. This paper discusses a modified bio-inspired algorithm, which is the Grey Wolf Optimization algorithm (GWO), that enhances the efficacy of the IDS in detecting both normal and anomalous traffic in the network. The main improvements cover the smart initialization phase that combines the filter and wrapper approaches to ensure that the informative features will be included in early iterations. In addition, we adopted a high-speed classification method, the Extreme Learning Machine (ELM), and used the modified GWO to tune the ELM’s parameters. The proposed technique was tested against various meta-heuristic algorithms using the UNSWNB-15 dataset. Because the generic attack is the most common attack type in the dataset, the primary goal of this paper was to detect generic attacks in network traffic. The proposed model outperformed other methods in minimizing the crossover error rate and false positive rate to less than 30%. Furthermore, it obtained the best results with 81%, 78%, and 84% for the accuracy, F1-score, and G-mean measures, respectively.
Collapse
|
15
|
A Lightweight Hybrid Deep Learning Privacy Preserving Model for FC-Based Industrial Internet of Medical Things. SENSORS 2022; 22:s22062112. [PMID: 35336282 PMCID: PMC8953567 DOI: 10.3390/s22062112] [Citation(s) in RCA: 7] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/13/2022] [Revised: 03/04/2022] [Accepted: 03/05/2022] [Indexed: 12/19/2022]
Abstract
The Industrial Internet of Things (IIoT) is gaining importance as most technologies and applications are integrated with the IIoT. Moreover, it consists of several tiny sensors to sense the environment and gather the information. These devices continuously monitor, collect, exchange, analyze, and transfer the captured data to nearby devices or servers using an open channel, i.e., internet. However, such centralized system based on IIoT provides more vulnerabilities to security and privacy in IIoT networks. In order to resolve these issues, we present a blockchain-based deep-learning framework that provides two levels of security and privacy. First a blockchain scheme is designed where each participating entities are registered, verified, and thereafter validated using smart contract based enhanced Proof of Work, to achieve the target of security and privacy. Second, a deep-learning scheme with a Variational AutoEncoder (VAE) technique for privacy and Bidirectional Long Short-Term Memory (BiLSTM) for intrusion detection is designed. The experimental results are based on the IoT-Botnet and ToN-IoT datasets that are publicly available. The proposed simulations results are compared with the benchmark models and it is validated that the proposed framework outperforms the existing system.
Collapse
|
16
|
Alzahrani MY, Bamhdi AM. Hybrid deep-learning model to detect botnet attacks over internet of things environments. Soft comput 2022. [DOI: 10.1007/s00500-022-06750-4] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
|
17
|
Effective Intrusion Detection System to Secure Data in Cloud Using Machine Learning. Symmetry (Basel) 2021. [DOI: 10.3390/sym13122306] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022] Open
Abstract
When adopting cloud computing, cybersecurity needs to be applied to detect and protect against malicious intruders to improve the organization’s capability against cyberattacks. Having network intrusion detection with zero false alarm is a challenge. This is due to the asymmetry between informative features and irrelevant and redundant features of the dataset. In this work, a novel machine learning based hybrid intrusion detection system is proposed. It combined support vector machine (SVM) and genetic algorithm (GA) methodologies with an innovative fitness function developed to evaluate system accuracy. This system was examined using the CICIDS2017 dataset, which contains normal and most up-to-date common attacks. Both algorithms, GA and SVM, were executed in parallel to achieve two optimal objectives simultaneously: obtaining the best subset of features with maximum accuracy. In this scenario, an SVM was employed using different values of hyperparameters of the kernel function, gamma, and degree. The results were benchmarked with KDD CUP 99 and NSL-KDD. The results showed that the proposed model remarkably outperformed these benchmarks by up to 5.74%. This system will be effective in cloud computing, as it is expected to provide a high level of symmetry between information security and detection of attacks and malicious intrusion.
Collapse
|
18
|
Momanyi E, Segera D. A Master-Slave Binary Grey Wolf Optimizer for Optimal Feature Selection in Biomedical Data Classification. BIOMED RESEARCH INTERNATIONAL 2021; 2021:5556941. [PMID: 34676261 PMCID: PMC8526239 DOI: 10.1155/2021/5556941] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/28/2021] [Revised: 09/10/2021] [Accepted: 09/20/2021] [Indexed: 11/30/2022]
Abstract
A new master-slave binary grey wolf optimizer (MSBGWO) is introduced. A master-slave learning scheme is introduced to the grey wolf optimizer (GWO) to improve its ability to explore and get better solutions in a search space. Five high-dimensional biomedical datasets are used to test the ability of MSBGWO in feature selection. The experimental results of MSBGWO are superior in terms of classification accuracy, precision, recall, F-measure, and number of features selected when compared to those of the binary grey wolf optimizer version 2 (BGWO2), binary genetic algorithm (BGA), binary particle swarm optimization (BPSO), differential evolution (DE) algorithm, and sine-cosine algorithm (SCA).
Collapse
Affiliation(s)
- Enock Momanyi
- Department of Electrical and Information Engineering, University of Nairobi, Nairobi 30197, Kenya
| | - Davies Segera
- Department of Electrical and Information Engineering, University of Nairobi, Nairobi 30197, Kenya
| |
Collapse
|
19
|
Herrera-Semenets V, Bustio-Martínez L, Hernández-León R, van den Berg J. A multi-measure feature selection algorithm for efficacious intrusion detection. Knowl Based Syst 2021. [DOI: 10.1016/j.knosys.2021.107264] [Citation(s) in RCA: 11] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
|
20
|
Particle Swarm Optimization and Multiple Stacked Generalizations to Detect Nitrogen and Organic-Matter in Organic-Fertilizer Using Vis-NIR. SENSORS 2021; 21:s21144882. [PMID: 34300620 PMCID: PMC8309747 DOI: 10.3390/s21144882] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/20/2021] [Revised: 07/13/2021] [Accepted: 07/16/2021] [Indexed: 11/29/2022]
Abstract
Organic fertilizer is a key component of agricultural sustainability and significantly contributes to the improvement of soil fertility. The values of nutrients such as organic matter and nitrogen in organic fertilizers positively affect plant growth and cause environmental problems when used in large amounts. Hence the importance of implementing fast detection of nitrogen (N) and organic matter (OM). This paper examines the feasibility of a framework that combined a particle swarm optimization (PSO) and two multiple stacked generalizations to determine the amount of nitrogen and organic matter in organic-fertilizer using visible near-infrared spectroscopy (Vis-NIR). The first multiple stacked generalizations for classification coupled with PSO (FSGC-PSO) were for feature selection purposes, while the second stacked generalizations for regression (SSGR) improved the detection of nitrogen and organic matter. The computation of root means square error (RMSE) and the coefficient of determination for calibration and prediction set (R2) was used to gauge the different models. The obtained FSGC-PSO subset combined with SSGR achieved significantly better prediction results than conventional methods such as Ridge, support vector machine (SVM), and partial least square (PLS) for both nitrogen (R2p = 0.9989, root mean square error of prediction (RMSEP) = 0.031 and limit of detection (LOD) = 2.97) and organic matter (R2p = 0.9972, RMSEP = 0.051 and LOD = 2.97). Therefore, our settled approach can be implemented as a promising way to monitor and evaluate the amount of N and OM in organic fertilizer.
Collapse
|
21
|
Botnet Attack Detection Using Local Global Best Bat Algorithm for Industrial Internet of Things. ELECTRONICS 2021. [DOI: 10.3390/electronics10111341] [Citation(s) in RCA: 27] [Impact Index Per Article: 9.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
The need for timely identification of Distributed Denial-of-Service (DDoS) attacks in the Internet of Things (IoT) has become critical in minimizing security risks as the number of IoT devices deployed rapidly grows globally and the volume of such attacks rises to unprecedented levels. Instant detection facilitates network security by speeding up warning and disconnection from the network of infected IoT devices, thereby preventing the botnet from propagating and thereby stopping additional attacks. Several methods have been developed for detecting botnet attacks, such as Swarm Intelligence (SI) and Evolutionary Computing (EC)-based algorithms. In this study, we propose a Local-Global best Bat Algorithm for Neural Networks (LGBA-NN) to select both feature subsets and hyperparameters for efficient detection of botnet attacks, inferred from 9 commercial IoT devices infected by two botnets: Gafgyt and Mirai. The proposed Bat Algorithm (BA) adopted the local-global best-based inertia weight to update the bat’s velocity in the swarm. To tackle with swarm diversity of BA, we proposed Gaussian distribution used in the population initialization. Furthermore, the local search mechanism was followed by the Gaussian density function and local-global best function to achieve better exploration during each generation. Enhanced BA was further employed for neural network hyperparameter tuning and weight optimization to classify ten different botnet attacks with an additional one benign target class. The proposed LGBA-NN algorithm was tested on an N-BaIoT data set with extensive real traffic data with benign and malicious target classes. The performance of LGBA-NN was compared with several recent advanced approaches such as weight optimization using Particle Swarm Optimization (PSO-NN) and BA-NN. The experimental results revealed the superiority of LGBA-NN with 90% accuracy over other variants, i.e., BA-NN (85.5% accuracy) and PSO-NN (85.2% accuracy) in multi-class botnet attack detection.
Collapse
|
22
|
HCRNNIDS: Hybrid Convolutional Recurrent Neural Network-Based Network Intrusion Detection System. Processes (Basel) 2021. [DOI: 10.3390/pr9050834] [Citation(s) in RCA: 37] [Impact Index Per Article: 12.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022] Open
Abstract
Nowadays, network attacks are the most crucial problem of modern society. All networks, from small to large, are vulnerable to network threats. An intrusion detection (ID) system is critical for mitigating and identifying malicious threats in networks. Currently, deep learning (DL) and machine learning (ML) are being applied in different domains, especially information security, for developing effective ID systems. These ID systems are capable of detecting malicious threats automatically and on time. However, malicious threats are occurring and changing continuously, so the network requires a very advanced security solution. Thus, creating an effective and smart ID system is a massive research problem. Various ID datasets are publicly available for ID research. Due to the complex nature of malicious attacks with a constantly changing attack detection mechanism, publicly existing ID datasets must be modified systematically on a regular basis. So, in this paper, a convolutional recurrent neural network (CRNN) is used to create a DL-based hybrid ID framework that predicts and classifies malicious cyberattacks in the network. In the HCRNNIDS, the convolutional neural network (CNN) performs convolution to capture local features, and the recurrent neural network (RNN) captures temporal features to improve the ID system’s performance and prediction. To assess the efficacy of the hybrid convolutional recurrent neural network intrusion detection system (HCRNNIDS), experiments were done on publicly available ID data, specifically the modern and realistic CSE-CIC-DS2018 data. The simulation outcomes prove that the proposed HCRNNIDS substantially outperforms current ID methodologies, attaining a high malicious attack detection rate accuracy of up to 97.75% for CSE-CIC-IDS2018 data with 10-fold cross-validation.
Collapse
|
23
|
|
24
|
Prediction of software vulnerability based deep symbiotic genetic algorithms: Phenotyping of dominant-features. APPL INTELL 2021. [DOI: 10.1007/s10489-021-02324-3] [Citation(s) in RCA: 14] [Impact Index Per Article: 4.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
|
25
|
Luo K, Jiao Y. Automatic fault detection of sensors in leather cutting control system under GWO-SVM algorithm. PLoS One 2021; 16:e0248515. [PMID: 33760850 PMCID: PMC7990226 DOI: 10.1371/journal.pone.0248515] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/12/2020] [Accepted: 02/28/2021] [Indexed: 11/18/2022] Open
Abstract
The purposes are to meet the individual needs of leather production, improve the efficiency of leather cutting, and increase the product's competitiveness. According to the existing problems in current leather cutting systems, a Fault Diagnosis (FD) method combining Convolutional Neural Network (CNN) and the Support Vector Machine (SVM) of Gray Wolf Optimizer (GWO) is proposed. This method first converts the original signal into a scale spectrogram and then selects the pre-trained CNN model, AlexNet, to extract the signal scale spectrogram's features. Next, the Principal Component Analysis (PCA) reduces the obtained feature's dimensionality. Finally, the normalized data are input into GWO's SVM classifier to diagnose the bearing's faults. Results demonstrate that the proposed model has higher cutting accuracy than the latest fault detection models. After model optimization, when c is 25 and g is 0.2, the model accuracy can reach 99.24%, an increase of 66.96% compared with traditional fault detection models. The research results can provide ideas and practical references for improving leather cutting enterprises' process flow.
Collapse
Affiliation(s)
- Ke Luo
- School of Information and Electrical Engineering, Shandong Jianzhu University, Jinan, Shandong Province, China
| | - Yingying Jiao
- School of Information and Electrical Engineering, Shandong Jianzhu University, Jinan, Shandong Province, China
| |
Collapse
|
26
|
Analysis of the Optimal Application of Blockchain-Based Smart Lockers in the Logistics Industry Based on FFD-SAGA and Grey Decision-Making. Symmetry (Basel) 2021. [DOI: 10.3390/sym13020329] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022] Open
Abstract
Blockchain technology has been applied to logistics tracking, but it is not cost-effective. The development of smart lockers has solved the problem of repeated distribution to improve logistics efficiency, thereby becoming a solution with convenience and privacy compared to the in-store purchase and pickup alternative. This study prioritized the key factors of smart lockers using a simulated annealing–genetic algorithm by fractional factorial design (FFD-SAGA) and grey relational analysis, and investigated the main users of smart lockers by grey multiple attribute decision analysis. The results show that the Web application programming interface (API) concatenation and money flow provider are the key success factors of smart lockers, and office workers are the main users of the lockers. Hence, how to better meet the needs of office workers will be an issue of concern for service providers.
Collapse
|
27
|
An Analysis of the KDD99 and UNSW-NB15 Datasets for the Intrusion Detection System. Symmetry (Basel) 2020. [DOI: 10.3390/sym12101666] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022] Open
Abstract
The significant increase in technology development over the internet makes network security a crucial issue. An intrusion detection system (IDS) shall be introduced to protect the networks from various attacks. Even with the increased amount of works in the IDS research, there is a lack of studies that analyze the available IDS datasets. Therefore, this study presents a comprehensive analysis of the relevance of the features in the KDD99 and UNSW-NB15 datasets. Three methods were employed: a rough-set theory (RST), a back-propagation neural network (BPNN), and a discrete variant of the cuttlefish algorithm (D-CFA). First, the dependency ratio between the features and the classes was calculated, using the RST. Second, each feature in the datasets became an input for the BPNN, to measure their ability for a classification task concerning each class. Third, a feature-selection process was carried out over multiple runs, to indicate the frequency of the selection of each feature. From the result, it indicated that some features in the KDD99 dataset could be used to achieve a classification accuracy above 84%. Moreover, a few features in both datasets were found to give a high contribution to increasing the classification’s performance. These features were present in a combination of features that resulted in high accuracy; the features were also frequently selected during the feature selection process. The findings of this study are anticipated to help the cybersecurity academics in creating a lightweight and accurate IDS model with a smaller number of features for the developing technologies.
Collapse
|
28
|
Feature Selection Methods Simultaneously Improve the Detection Accuracy and Model Building Time of Machine Learning Classifiers. Symmetry (Basel) 2020. [DOI: 10.3390/sym12091424] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022] Open
Abstract
The detection accuracy and model building time of machine learning (ML) classifiers are vital aspects for an intrusion detection system (IDS) to predict attacks in real life. Recently, researchers have introduced feature selection methods to increase the detection accuracy and minimize the model building time of a limited number of ML classifiers. Therefore, identifying more ML classifiers with very high detection accuracy and the lowest possible model building time is necessary. In this study, the authors tested six supervised classifiers on a full NSL-KDD training dataset (a benchmark record for Internet traffic) using 10-fold cross-validation in the Weka tool with and without feature selection/reduction methods. The authors aimed to identify more options to outperform and secure classifiers with the highest detection accuracy and lowest model building time. The results show that the feature selection/reduction methods, including the wrapper method in combination with the discretize filter, the filter method in combination with the discretize filter, and the discretize filter, can significantly decrease model building time without compromising detection accuracy. The suggested ML algorithms and feature selection/reduction methods are automated pattern recognition approaches to detect network attacks, which are within the scope of the Symmetry journal.
Collapse
|