Sandpiper optimization with hybrid deep learning model for blockchain-assisted intrusion detection in iot environment

被引:0
|
作者
Alkhonaini, Mimouna Abdullah [1 ]
Alohali, Manal Abdullah [2 ]
Aljebreen, Mohammed [3 ]
Eltahir, Majdy M. [4 ]
Alanazi, Meshari H. [5 ]
Yafoz, Ayman [6 ]
Alsini, Raed [6 ]
Khadidos, Alaa O. [6 ]
机构
[1] Prince Sultan Univ, Coll Comp & Informat Sci, Dept Comp Sci, Riyadh, Saudi Arabia
[2] Princess Nourah bint Abdulrahman Univ, Dept Informat Syst Coll Comp & Informat Sci, POB 84428, Riyadh 11671, Saudi Arabia
[3] King Saud Univ, Community Coll, Dept Comp Sci, POB 28095, Riyadh 11437, Saudi Arabia
[4] King Khalid Univ, Appl Coll Mahayil, Dept Informat Syst, Abha, Saudi Arabia
[5] Northern Border Univ, Coll Sci, Dept Comp Sci, Ar Ar, Saudi Arabia
[6] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah, Saudi Arabia
关键词
Intrusion detection system; Security; Cyberattacks; Blockchain; Internet of Things; SYSTEM;
D O I
10.1016/j.aej.2024.10.032
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Intrusion detection in the Internet of Things (IoTs) is a vital unit of IoT safety. IoT devices face diverse kinds of attacks, and intrusion detection systems (IDSs) play a significant role in detecting and responding to these threats. A typical IDS solution can be utilized from the IoT networks for monitoring traffic, device behaviour, and system logs for signs of intrusion or abnormal movement. Deep learning (DL) approaches are exposed to promise in enhancing the accuracy and effectiveness of IDS for IoT devices. Blockchain (BC) aided intrusion detection from IoT platforms provides many benefits, including better data integrity, transparency, and resistance to tampering. This paper projects a novel sandpiper optimizer with hybrid deep learning-based intrusion detection (SPOHDL-ID) from the BC-assisted IoT platform. The key contribution of the SPOHDL-ID model is to accomplish security via the intrusion detection and classification process from the IoT platform. In this case, the BC technology can be used for a secure data-sharing process. In the presented SPOHDL-ID technique, the selection of features from the network traffic data takes place using the SPO model. Besides, the SPOHDL-ID technique employs the HDL model for intrusion detection, which involves the design of a convolutional neural network with a stacked autoencoder (CNN-SAE) model. The beetle search optimizer algorithm (BSOA) method is used for the hyperparameter tuning procedure to increase the recognition outcomes of the CNN-SAE technique. An extensive simulation outcome is created to exhibit a better solution to the SPOHDL-ID method. The experimental validation of the SPOHDL-ID method portrayed a superior accuracy value of 99.59 % and 99.54 % over recent techniques under the ToN-IoT and CICIDS-2017 datasets.
引用
收藏
页码:49 / 62
页数:14
相关论文
共 50 条
  • [21] A blockchain-assisted security management framework for collaborative intrusion detection in smart cities
    Li, Wenjuan
    Stidsen, Christian
    Adam, Tobias
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 111
  • [22] Blockchain-Assisted Secure Smart Home Network Using Gradient-Based Optimizer With Hybrid Deep Learning Model
    Almuqren, Latifah
    Mahmood, Khalid
    Aljameel, Sumayh S.
    Salama, Ahmed S.
    Mohammed, Gouse Pasha
    Alneil, Amani A.
    IEEE ACCESS, 2023, 11 : 86999 - 87008
  • [23] A Hybrid Deep Learning Model with Self-Improved Optimization Algorithm for Detection of Security Attacks in IoT Environment
    Sagu, Amit
    Gill, Nasib Singh
    Gulia, Preeti
    Chatterjee, Jyotir Moy
    Priyadarshini, Ishaani
    FUTURE INTERNET, 2022, 14 (10):
  • [24] Blockchain-assisted caching optimization and data storage methods in edge environment
    Jingjing Guo
    Chunlin Li
    Youlong Luo
    The Journal of Supercomputing, 2022, 78 : 18225 - 18257
  • [25] Blockchain-assisted caching optimization and data storage methods in edge environment
    Guo, Jingjing
    Li, Chunlin
    Luo, Youlong
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (16): : 18225 - 18257
  • [26] Hybrid intrusion detection model for Internet of Things (IoT) network environment
    Rajarajan, S.
    Kavitha, M. G.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 45 (05) : 7827 - 7840
  • [27] Hybrid optimization and deep learning based intrusion detection system
    Gupta, Subham Kumar
    Tripathi, Meenakshi
    Grover, Jyoti
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 100
  • [28] Deep learning approach for intrusion detection in IoT-multi cloud environment
    Selvapandian, D.
    Santhosh, R.
    AUTOMATED SOFTWARE ENGINEERING, 2021, 28 (02)
  • [29] Deep learning approach for intrusion detection in IoT-multi cloud environment
    D. Selvapandian
    R. Santhosh
    Automated Software Engineering, 2021, 28
  • [30] Artificial Rabbits Optimizer with Deep Learning Model for Blockchain-Assisted Secure Smart Healthcare System
    Khubrani, Mousa Mohammed
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (09) : 935 - 945