Intrusion detection for the internet of things (IoT) based on the emperor penguin colony optimization algorithm

被引:12
|
作者
Alweshah M. [1 ]
Hammouri A. [1 ]
Alkhalaileh S. [1 ]
Alzubi O. [1 ]
机构
[1] Prince Abdullah Bin Ghazi Faculty of Information and Communication Technology, Al-Balqa Applied University, Al‑Salt
关键词
Emperor penguin colony; Feature selection; Internet of things; Intrusion detection; Metaheuristic algorithm;
D O I
10.1007/s12652-022-04407-6
中图分类号
学科分类号
摘要
In the Internet of Things (IoT), the data that are sent via devices are sometimes unrelated, duplicated, or erroneous, which makes it difficult to perform the required tasks. Hence transmitted data need to be filtered and selected to suit the nature of the problem being dealt with in order to achieve the highest possible level of security. Feature selection is the process of identifying the suitable characteristics needed from a dataset's whole data set for usage in a certain task (FS). This study proposes a novel wrapper FS model that uses the emperor penguin colony (EPC) method to explore the issue space and a K-nearest neighbor classifier to solve FS for IoT challenges. In experiments, the proposed EPC model was applied to nine well-known IoT datasets in order to evaluate its performance. The results showed that the model had clear superiority over the multi-objective particle swarm optimization (MOPSO) and MOPSO-Lévy methods in terms of accuracy and FS size, achieving 98% classification accuracy. The results also provided a clear understanding of the effect of the EPC algorithm on various filter methods, including the ReliefF, correlation, information gain and symmetrical methods. © 2022, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature.
引用
收藏
页码:6349 / 6366
页数:17
相关论文
共 50 条
  • [1] AI-Based Intrusion Detection for a Secure Internet of Things (IoT)
    Aljohani, Reham
    Bushnag, Anas
    Alessa, Ali
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2024, 32 (03)
  • [2] Overview on Intrusion Detection Schemes for Internet of Things (IoT)
    Ghayyad, Saher
    Du, Shengzhi
    [J]. 2018 INTERNATIONAL CONFERENCE ON INTELLIGENT AND INNOVATIVE COMPUTING APPLICATIONS (ICONIC), 2018, : 614 - 619
  • [3] The flaws of Internet of Things (IoT) intrusion detection and prevention schemes
    Ghayyad, Saher
    Du, Shengzhi
    Kurien, Anish
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2022, 38 (01) : 25 - 36
  • [4] Illegal Intrusion Detection of Internet of Things Based on Deep Mining Algorithm
    Fan, Xingjuan
    Li, Hui
    Liu, Xinglong
    Guo, Fangtong
    Ma, Hongjing
    [J]. TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2023, 30 (06): : 1968 - 1974
  • [5] Intrusion detection for IoT based on a hybrid shuffled shepherd optimization algorithm
    Mohammed Alweshah
    Saleh Alkhalaileh
    Majdi Beseiso
    Muder Almiani
    Salwani Abdullah
    [J]. The Journal of Supercomputing, 2022, 78 : 12278 - 12309
  • [6] Hybrid intrusion detection model for Internet of Things (IoT) network environment
    Rajarajan, S.
    Kavitha, M. G.
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 45 (05) : 7827 - 7840
  • [7] Feature selection for intrusion detection system in Internet-of-Things (IoT)
    Nimbalkar, Pushparaj
    Kshirsagar, Deepak
    [J]. ICT EXPRESS, 2021, 7 (02): : 177 - 181
  • [8] Intrusion detection for IoT based on a hybrid shuffled shepherd optimization algorithm
    Alweshah, Mohammed
    Alkhalaileh, Saleh
    Beseiso, Majdi
    Almiani, Muder
    Abdullah, Salwani
    [J]. JOURNAL OF SUPERCOMPUTING, 2022, 78 (10): : 12278 - 12309
  • [9] Development of the Intrusion Detection System for the Internet of Things Based on a Sequence Alignment Algorithm
    M. O. Kalinin
    V. M. Krundyshev
    B. G. Sinyapkin
    [J]. Automatic Control and Computer Sciences, 2020, 54 : 993 - 1000
  • [10] Development of the Intrusion Detection System for the Internet of Things Based on a Sequence Alignment Algorithm
    Kalinin, M. O.
    Krundyshev, V. M.
    Sinyapkin, B. G.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (08) : 993 - 1000