Artificial Intelligence-Based Anomalies Detection Scheme for Identifying Cyber Threat on IoT-Based Transport Network

被引:0
|
作者
Gupta, Huma [1 ]
Sharma, Sanjeev [1 ]
Agrawal, Sanjay [2 ]
机构
[1] Rajiv Gandhi Proudyogiki Vishwavidyalaya, SOIT, Bhopal 462033, India
[2] Natl Inst Tech Teachers Training & Res, Dept Comp Sci & Engn, Bhopal, India
关键词
Internet of Things; Feature extraction; Security; Computer crime; Intrusion detection; Genetic algorithms; Optimization; Artificial intelligence; deep learning; intrusion detection; feature optimization; genetic algorithm; cyber attack; PARTICLE SWARM OPTIMIZATION; INTRUSION-DETECTION; INTERNET;
D O I
10.1109/TCE.2023.3329253
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Increasing use of portable wireless devices in the Internet of Things (IoT) network has made it more dynamic, flexible, and vulnerable to cyber-attacks due to shared communication links, and it is critical to identify and mitigate potential security risks. Thus, this leads to the crucial need for an intrusion detection system that can uncover malicious attacks on the IoT network. In order to identify malicious sessions in IoT networks, the author proposes an artificial intelligence-based IDS model employing a feature selection technique based on fuzzy and genetic algorithms (GA). We use the bio-inspired genetic algorithms Intelligent Water Drop (IWD) and Biogeography-based Optimization (BBO) for feature selection. We provide an effective feature extractor that employs intelligent water drop (IWD) algorithms and a feed-forward network called the fuzzy water drop intrusion detection model (FWDNN) for assault categorization. In this paper, we propose an artificial intelligence-based IDS model using feature selection method based on fuzzy and genetic algorithms (GA) with the goal of detecting malicious sessions in IoT networks. Evaluation is done on real IoT datasets and CICIDS-2017, and the results show that the proposed BBOKNN model outperforms existing models in terms of evaluation parameters.
引用
收藏
页码:1716 / 1724
页数:9
相关论文
共 50 条
  • [1] Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection
    Sarhan, Mohanad
    Layeghy, Siamak
    Moustafa, Nour
    Portmann, Marius
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2023, 31 (01)
  • [2] Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection
    Mohanad Sarhan
    Siamak Layeghy
    Nour Moustafa
    Marius Portmann
    [J]. Journal of Network and Systems Management, 2023, 31
  • [3] Artificial intelligence-based detection and mitigation of cyber disruptions in microgrid control
    Tabassum, Tambiara
    Lim, Steven
    Khalghani, Mohammad Reza
    [J]. Electric Power Systems Research, 2024, 226
  • [4] Artificial intelligence-based detection and mitigation of cyber disruptions in microgrid control
    Tabassum, Tambiara
    Lim, Steven
    Khalghani, Mohammad Reza
    [J]. ELECTRIC POWER SYSTEMS RESEARCH, 2024, 226
  • [5] Swarm intelligence-based algorithms within IoT-based systems: A review
    Zedadra, Ouarda
    Guerrieri, Antonio
    Jouandeau, Nicolas
    Spezzano, Giandomenico
    Seridi, Hamid
    Fortino, Giancarlo
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 122 : 173 - 187
  • [6] Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning
    Ghaleb, Fuad A.
    Alsaedi, Mohammed
    Saeed, Faisal
    Ahmad, Jawad
    Alasli, Mohammed
    [J]. SENSORS, 2022, 22 (09)
  • [7] Network intrusion detection system: A survey on artificial intelligence-based techniques
    Habeeb, Mohammed Sayeeduddin
    Babu, T. Ranga
    [J]. EXPERT SYSTEMS, 2022, 39 (09)
  • [8] Review on Artificial Intelligence-based Network Attack Detection in Power Systems
    Zhang B.
    Liu X.
    Yu Z.
    Wang W.
    Jin Q.
    Li W.
    [J]. Gaodianya Jishu/High Voltage Engineering, 2022, 48 (11): : 4413 - 4426
  • [9] Artificial intelligence-based approach for islanding detection in cyber-physical power systems
    Golpira, Hemin
    Francois, Bruno
    [J]. CHAOS SOLITONS & FRACTALS, 2024, 185
  • [10] Edge Intelligence-based Privacy Protection Framework for IoT-based Smart Healthcare Systems
    Akter, Mahmuda
    Moustafa, Nour
    Lynar, Timothy
    [J]. IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2022,