Sandpiper optimization with hybrid deep learning model for blockchain-assisted intrusion detection in iot environment

被引:0
|
作者
Alkhonaini, Mimouna Abdullah [1 ]
Alohali, Manal Abdullah [2 ]
Aljebreen, Mohammed [3 ]
Eltahir, Majdy M. [4 ]
Alanazi, Meshari H. [5 ]
Yafoz, Ayman [6 ]
Alsini, Raed [6 ]
Khadidos, Alaa O. [6 ]
机构
[1] Prince Sultan Univ, Coll Comp & Informat Sci, Dept Comp Sci, Riyadh, Saudi Arabia
[2] Princess Nourah bint Abdulrahman Univ, Dept Informat Syst Coll Comp & Informat Sci, POB 84428, Riyadh 11671, Saudi Arabia
[3] King Saud Univ, Community Coll, Dept Comp Sci, POB 28095, Riyadh 11437, Saudi Arabia
[4] King Khalid Univ, Appl Coll Mahayil, Dept Informat Syst, Abha, Saudi Arabia
[5] Northern Border Univ, Coll Sci, Dept Comp Sci, Ar Ar, Saudi Arabia
[6] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah, Saudi Arabia
关键词
Intrusion detection system; Security; Cyberattacks; Blockchain; Internet of Things; SYSTEM;
D O I
10.1016/j.aej.2024.10.032
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Intrusion detection in the Internet of Things (IoTs) is a vital unit of IoT safety. IoT devices face diverse kinds of attacks, and intrusion detection systems (IDSs) play a significant role in detecting and responding to these threats. A typical IDS solution can be utilized from the IoT networks for monitoring traffic, device behaviour, and system logs for signs of intrusion or abnormal movement. Deep learning (DL) approaches are exposed to promise in enhancing the accuracy and effectiveness of IDS for IoT devices. Blockchain (BC) aided intrusion detection from IoT platforms provides many benefits, including better data integrity, transparency, and resistance to tampering. This paper projects a novel sandpiper optimizer with hybrid deep learning-based intrusion detection (SPOHDL-ID) from the BC-assisted IoT platform. The key contribution of the SPOHDL-ID model is to accomplish security via the intrusion detection and classification process from the IoT platform. In this case, the BC technology can be used for a secure data-sharing process. In the presented SPOHDL-ID technique, the selection of features from the network traffic data takes place using the SPO model. Besides, the SPOHDL-ID technique employs the HDL model for intrusion detection, which involves the design of a convolutional neural network with a stacked autoencoder (CNN-SAE) model. The beetle search optimizer algorithm (BSOA) method is used for the hyperparameter tuning procedure to increase the recognition outcomes of the CNN-SAE technique. An extensive simulation outcome is created to exhibit a better solution to the SPOHDL-ID method. The experimental validation of the SPOHDL-ID method portrayed a superior accuracy value of 99.59 % and 99.54 % over recent techniques under the ToN-IoT and CICIDS-2017 datasets.
引用
收藏
页码:49 / 62
页数:14
相关论文
共 50 条
  • [1] Blockchain-Assisted Hybrid Harris Hawks Optimization Based Deep DDoS Attack Detection in the IoT Environment
    Katib, Iyad
    Ragab, Mahmoud
    MATHEMATICS, 2023, 11 (08)
  • [2] Optimal Deep-Learning-Based Cyberattack Detection in a Blockchain-Assisted IoT Environment
    Assiri, Fatmah Y.
    Ragab, Mahmoud
    MATHEMATICS, 2023, 11 (19)
  • [3] Piranha Foraging Optimization Algorithm with Deep Learning Enabled Fault Detection in Blockchain-Assisted Sustainable IoT Environment
    Assiri, Haitham
    SUSTAINABILITY, 2025, 17 (04)
  • [4] A Blockchain-assisted Collaborative Ensemble Learning for Network Intrusion Detection
    Liu, Lilian
    Li, Jinguo
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1042 - 1047
  • [5] Modeling of Blockchain Assisted Intrusion Detection on IoT Healthcare System Using Ant Lion Optimizer With Hybrid Deep Learning
    Alamro, Hayam
    Marzouk, Radwa
    Alruwais, Nuha
    Negm, Noha
    Aljameel, Sumayh S.
    Khalid, Majdi
    Hamza, Manar Ahmed
    Alsaid, Mohamed Ibrahim
    IEEE ACCESS, 2023, 11 : 82199 - 82207
  • [6] Capuchin Search Algorithm With Deep Learning-Based Data Edge Verification for Blockchain-Assisted IoT Environment
    Alyoubi, Khaled H.
    Khadidos, Adil O.
    Alshareef, Abdulrhman M.
    Hamed, Diaa
    Khadidos, Alaa O.
    Ragab, Mahmoud
    IEEE ACCESS, 2024, 12 : 351 - 360
  • [7] Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment
    Romany F. Mansour
    Scientific Reports, 12
  • [8] Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment
    Mansour, Romany F.
    SCIENTIFIC REPORTS, 2022, 12 (01)
  • [9] A Hybrid Deep Learning Intrusion Detection Model for Fog Computing Environment
    Kalaivani, K.
    Chinnadurai, M.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 30 (01): : 1 - 15
  • [10] Blockchain-Assisted Machine Learning with Hybrid Metaheuristics-Empowered Cyber Attack Detection and Classification Model
    Albakri, Ashwag
    Alabdullah, Bayan
    Alhayan, Fatimah
    SUSTAINABILITY, 2023, 15 (18)