A Novel Method for Anomaly Detection in the Internet of Things using Whale Optimization Algorithm

被引:0
|
作者
Zhu, Zhihui [1 ]
Zhu, Meifang [2 ]
机构
[1] Guangzhou Maritime Univ, Guangzhou 510725, Guangdong, Peoples R China
[2] Guangdong Lingnan Inst Technol, Guangzhou 511510, Guangdong, Peoples R China
关键词
Internet of things; anomaly detection; intrusion detection; firewall; whale optimization algorithm; accuracy;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet of Things (IoT) is integral to human life due to its pervasive applications in home appliances, surveillance, and environment monitoring. Resource-constrained IoT devices are easily accessible to attackers due to their direct connection to the unsafe Internet. Public access to the Internet makes IoT objects more susceptible to intrusion. As the name implies, anomaly detection systems are designed to identify anomalous traffic patterns that conventional firewalls fail to detect. Effective Intrusion Detection Systems (IDSs) design faces three major problems, including handling high dimensionality, selecting a learning algorithm, and comparing entered observations and traffic patterns using a distance or similarity measure. Considering the dynamic nature of the entities involved and the limited computing resources available, more than traditional anomaly detection approaches is required. This paper proposes a novel method based on Whale Optimization Algorithm (WOA) to detect anomalies in IoT-based networks that conventional firewall systems cannot detect. Experiments are conducted on the KDD dataset. The accuracy of the proposed method is compared for classifiers such as kNN, SVM, and DT approaches. The detection accuracy rate of the proposed method is significantly higher than that of other methods for DoS, probing, normal attacks, R2L attacks, and U2R attacks compared to other methods. This method shows an impressive increase in accuracy when detecting a wide range of malicious activities, from DoS, probing, and privilege escalation attacks, to remote-to-local and user-to-root attacks.
引用
收藏
页码:765 / 773
页数:9
相关论文
共 50 条
  • [1] A Novel Secure and Energy-efficient Routing Method for the Agricultural Internet of Things Using Whale Optimization Algorithm
    Wang, Yanling
    Yang, Yong
    [J]. Journal of Cyber Security and Mobility, 2024, 13 (04): : 725 - 750
  • [2] Application of hyperspectral image anomaly detection algorithm for Internet of things
    Xinjian Wang
    Guangchun Luo
    Ling Tian
    [J]. Multimedia Tools and Applications, 2019, 78 : 5155 - 5167
  • [3] Application of hyperspectral image anomaly detection algorithm for Internet of things
    Wang, Xinjian
    Luo, Guangchun
    Tian, Ling
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (05) : 5155 - 5167
  • [4] Internet of Things Anomaly Detection using Machine Learning
    Njilla, Laruent
    Pearlstein, Larry
    Wu, Xin-Wen
    Lutz, Adam
    Ezekiel, Soundararajan
    [J]. 2019 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP (AIPR), 2019,
  • [5] Whale Optimization Algorithm for Energy- Efficient Task Allocation in the Internet of Things
    Yang, Shan
    Yu, Renping
    Jin, Xin
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (10) : 235 - 243
  • [6] A novel community detection method based on whale optimization algorithm with evolutionary population
    Yunfei Feng
    Hongmei Chen
    Tianrui Li
    Chuan Luo
    [J]. Applied Intelligence, 2020, 50 : 2503 - 2522
  • [7] A novel community detection method based on whale optimization algorithm with evolutionary population
    Feng, Yunfei
    Chen, Hongmei
    Li, Tianrui
    Luo, Chuan
    [J]. APPLIED INTELLIGENCE, 2020, 50 (08) : 2503 - 2522
  • [8] Enhanced pelican optimization algorithm with ensemble-based anomaly detection in industrial internet of things environment
    Chander, Nenavath
    Kumar, Mummadi Upendra
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05): : 6491 - 6509
  • [9] Malware cyberattacks detection using a novel feature selection method based on a modified whale optimization algorithm
    Al Ogaili, Riyadh Rahef Nuiaa
    Alomari, Esraa Saleh
    Alkorani, Manar Bashar Mortatha
    Alyasseri, Zaid Abdi Alkareem
    Mohammed, Mazin Abed
    Dhanaraj, Rajesh Kumar
    Manickam, Selvakumar
    Kadry, Seifedine
    Anbar, Mohammed
    Karuppayah, Shankar
    [J]. WIRELESS NETWORKS, 2023,
  • [10] A Novel Intrusion Detection Method for Internet of Things
    Li, Peisong
    Zhang, Ying
    [J]. PROCEEDINGS OF THE 2019 31ST CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2019), 2019, : 4761 - 4765