Skip to main content

Enhanced IoT Based IDS Driven by Binary Snake Optimizer for Feature Selection

  • Conference paper
  • First Online:
Advances in Model and Data Engineering in the Digitalization Era (MEDI 2022)

Abstract

Connected devices have extended the borders of the traditional Internet into the new Internet of Things (IoT). IoT holds a significant role in several fields such as industry, transportation, smart homes, cities, and others. However, protecting IoT environments and preventing intrusions is one of the critical problems in IoT. An intrusion detection system (IDS) aims to identify malicious patterns and threats that traditional security countermeasures cannot detect. This paper presents an effective feature selection (FS) approach driven by a binary variant of the newly proposed Snake Optimizer (SO) for enhancing intrusion detection systems. Two variants of FS are developed, and the best one that is based on a V-shaped transfer function is compared with several optimization algorithms to confirm its efficiency in boosting IDSs. In addition, five datasets that represent real IoT traffic are employed for evaluation purposes. The experimental results show that SO based on V-shaped transfer is superior to the S-shaped transfer function and outperforms other optimizers in particular based on the obtained average accuracy and convergence rates. Hence, it can conclude that the proposed approach can be efficiently employed in IoT intrusion detection systems.

Supported by organization x.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Conti, M., Dehghantanha, A., Franke, K., Watson, S.: Internet of Things Security and Forensics: Challenges and Opportunities. Elsevier, Amsterdam (2018)

    Google Scholar 

  2. Mafarja, M., Heidari, A., Habib, M., Faris, H., Thaher, T., Aljarah, I.: Augmented whale feature selection for IoT attacks: structure, analysis and applications. Future Gener. Comput. Syst. 112, 18–40 (2020)

    Article  Google Scholar 

  3. Hung, M.: GARTNER Inc Gartner Insights on How to Lead in a Connected World. GARTNER Inc. (2017)

    Google Scholar 

  4. Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of things (IoT) security: current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336–341. IEEE (2015)

    Google Scholar 

  5. Hemdan, E.E.-D., Manjaiah, D.H.: Cybercrimes investigation and intrusion detection in internet of things based on data science methods. In: Sangaiah, A.K., Thangavelu, A., Meenakshi Sundaram, V. (eds.) Cognitive Computing for Big Data Systems Over IoT. LNDECT, vol. 14, pp. 39–62. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-70688-7_2

    Chapter  Google Scholar 

  6. Prabavathy, S., Sundarakantham, K., Shalinie, S.M.: Design of cognitive fog computing for intrusion detection in Internet of Things. J. Commun. Netw. 20(3), 291–298 (2018)

    Article  Google Scholar 

  7. Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395–411 (2018)

    Article  Google Scholar 

  8. Elrawy, M.F., Awad, A.I., Hamed, H.F.: Intrusion detection systems for IoT-based smart environments: a survey. J. Cloud Comput. 7(1), 21 (2018)

    Article  Google Scholar 

  9. Tan, P.-N., Steinbach, M., Kumar, V.: Introduction to Data Mining, 1st edn. Pearson Addison Wesley, Boston (2005)

    Google Scholar 

  10. Xue, B., Zhang, M., Browne, W.N.: Particle swarm optimization for feature selection in classification: a multi-objective approach. IEEE Trans. Cybern. 43(6), 1656–1671 (2013)

    Article  Google Scholar 

  11. Qiao, W., Tian, W., Tian, Y., Yang, Q., Wang, Y., Zhang, J.: The forecasting of PM2.5 using a hybrid model based on wavelet transform and an improved deep learning algorithm. IEEE Access 7, 142814–142825 (2019)

    Article  Google Scholar 

  12. Mafarja, M., Mirjalili, S.: Whale optimization approaches for wrapper feature selection. Appl. Soft Comput. 62, 441–453 (2018)

    Article  Google Scholar 

  13. Thaher, T., Chantar, H., Too, J., Mafarja, M., Turabieh, H.T., Houssein, E.H.: Boolean particle swarm optimization with various evolutionary population dynamics approaches for feature selection problems. Expert Syst. Appl. 195, 116550 (2022)

    Google Scholar 

  14. Thaher, T., Heidari, A.A., Mafarja, M., Dong, J.S., Mirjalili, S.: Binary Harris Hawks optimizer for high-dimensional, low sample size feature selection. In: Mirjalili, S., Faris, H., Aljarah, I. (eds.) Evolutionary Machine Learning Techniques. AIS, pp. 251–272. Springer, Singapore (2020). https://doi.org/10.1007/978-981-32-9990-0_12

    Chapter  Google Scholar 

  15. Chen, H., Heidari, A.A., Zhao, X., Zhang, L., Chen, H.: Advanced orthogonal learning-driven multi-swarm sine cosine optimization: framework and case studies. Expert Syst. Appl. 144, 113113 (2020)

    Google Scholar 

  16. Xu, Y., et al.: An efficient chaotic mutative moth-flame-inspired optimizer for global optimization tasks. Expert Syst. Appl. 129, 135–155 (2019)

    Article  Google Scholar 

  17. Hashim, F.A., Hussien, A.G.: Snake optimizer: a novel meta-heuristic optimization algorithm. Knowl.-Based Syst. 242, 108320 (2022)

    Google Scholar 

  18. Agrawal, P., Abutarboush, H., Talari, G., Wagdy, A.: Metaheuristic algorithms on feature selection: a survey of one decade of research (2009–2019). IEEE Access 9, 26766–26791 (2021)

    Article  Google Scholar 

  19. Hamamoto, A.H., Carvalho, L.F., Sampaio, L.D.H., Abrão, T., Proença Jr., M.L.: Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Syst. Appl. 92, 390–402 (2018)

    Google Scholar 

  20. Hajimirzaei, B., Navimipour, N.J.: Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Express 5(1), 56–59 (2019)

    Article  Google Scholar 

  21. Selvakumar, B., Muneeswaran, K.: Firefly algorithm based feature selection for network intrusion detection. Comput. Secur. 81, 148–155 (2019)

    Article  Google Scholar 

  22. Ali, M.H., Al Mohammed, B.A.D., Ismail, A., Zolkipli, M.F.: A new intrusion detection system based on fast learning network and particle swarm optimization. IEEE Access 6, 20255–20261 (2018)

    Article  Google Scholar 

  23. Hodo, E., et al.: Threat analysis of IoT networks using artificial neural network intrusion detection system. In: 2016 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–6. IEEE (2016)

    Google Scholar 

  24. Panigrahi, A., Patra, M.R.: A layered approach to network intrusion detection using rule learning classifiers with nature-inspired feature selection. In: Pattnaik, P.K., Rautaray, S.S., Das, H., Nayak, J. (eds.) Progress in Computing, Analytics and Networking. AISC, vol. 710, pp. 215–223. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-7871-2_21

    Chapter  Google Scholar 

  25. Su, J., He, S., Wu, Y.: Features selection and prediction for IoT attacks. High-Confidence Comput. 2(2), 100047 (2022)

    Google Scholar 

  26. Diro, A.A., Chilamkurti, N.: Distributed attack detection scheme using deep learning approach for internet of things. Futur. Gener. Comput. Syst. 82, 761–768 (2018)

    Article  Google Scholar 

  27. Anthi, E., Williams, L., Burnap, P.: Pulse: an adaptive intrusion detection for the internet of things. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018, pp. 1–4 (2018)

    Google Scholar 

  28. Mirjalili, S., Lewis, A.: S-shaped versus V-shaped transfer functions for binary particle swarm optimization. Swarm Evol. Comput. 9, 1–14 (2013)

    Article  Google Scholar 

  29. Li, J., Zhao, Z., Li, R., Zhang, H., Zhang, T.: AI-based two-stage intrusion detection for software defined IoT networks. IEEE Internet Things J. 6(2), 2093–2102 (2018)

    Article  Google Scholar 

  30. Kennedy, J., Eberhart, R. C.: A discrete binary version of the particle swarm algorithm. In: 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation, vol. 5, pp. 4104–4108. IEEE (1997)

    Google Scholar 

  31. Rashedi, E., Nezamabadi-Pour, H., Saryazdi, S.: BGSA: binary gravitational search algorithm. Nat. Comput. 9(3), 727–745 (2010)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

The research leading to these results has received funding from the Research Council (TRC) of the Sultanate of Oman under the Block Funding Program with agreement no. TRC/BFP/ASU/01/2019.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thaer Thaher .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

El-Saleh, A.A., Thaher, T., Chantar, H., Mafarja, M. (2022). Enhanced IoT Based IDS Driven by Binary Snake Optimizer for Feature Selection. In: Fournier-Viger, P., et al. Advances in Model and Data Engineering in the Digitalization Era. MEDI 2022. Communications in Computer and Information Science, vol 1751. Springer, Cham. https://doi.org/10.1007/978-3-031-23119-3_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-23119-3_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-23118-6

  • Online ISBN: 978-3-031-23119-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics