Abstract
Connected devices have extended the borders of the traditional Internet into the new Internet of Things (IoT). IoT holds a significant role in several fields such as industry, transportation, smart homes, cities, and others. However, protecting IoT environments and preventing intrusions is one of the critical problems in IoT. An intrusion detection system (IDS) aims to identify malicious patterns and threats that traditional security countermeasures cannot detect. This paper presents an effective feature selection (FS) approach driven by a binary variant of the newly proposed Snake Optimizer (SO) for enhancing intrusion detection systems. Two variants of FS are developed, and the best one that is based on a V-shaped transfer function is compared with several optimization algorithms to confirm its efficiency in boosting IDSs. In addition, five datasets that represent real IoT traffic are employed for evaluation purposes. The experimental results show that SO based on V-shaped transfer is superior to the S-shaped transfer function and outperforms other optimizers in particular based on the obtained average accuracy and convergence rates. Hence, it can conclude that the proposed approach can be efficiently employed in IoT intrusion detection systems.
Supported by organization x.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Conti, M., Dehghantanha, A., Franke, K., Watson, S.: Internet of Things Security and Forensics: Challenges and Opportunities. Elsevier, Amsterdam (2018)
Mafarja, M., Heidari, A., Habib, M., Faris, H., Thaher, T., Aljarah, I.: Augmented whale feature selection for IoT attacks: structure, analysis and applications. Future Gener. Comput. Syst. 112, 18–40 (2020)
Hung, M.: GARTNER Inc Gartner Insights on How to Lead in a Connected World. GARTNER Inc. (2017)
Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of things (IoT) security: current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336–341. IEEE (2015)
Hemdan, E.E.-D., Manjaiah, D.H.: Cybercrimes investigation and intrusion detection in internet of things based on data science methods. In: Sangaiah, A.K., Thangavelu, A., Meenakshi Sundaram, V. (eds.) Cognitive Computing for Big Data Systems Over IoT. LNDECT, vol. 14, pp. 39–62. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-70688-7_2
Prabavathy, S., Sundarakantham, K., Shalinie, S.M.: Design of cognitive fog computing for intrusion detection in Internet of Things. J. Commun. Netw. 20(3), 291–298 (2018)
Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395–411 (2018)
Elrawy, M.F., Awad, A.I., Hamed, H.F.: Intrusion detection systems for IoT-based smart environments: a survey. J. Cloud Comput. 7(1), 21 (2018)
Tan, P.-N., Steinbach, M., Kumar, V.: Introduction to Data Mining, 1st edn. Pearson Addison Wesley, Boston (2005)
Xue, B., Zhang, M., Browne, W.N.: Particle swarm optimization for feature selection in classification: a multi-objective approach. IEEE Trans. Cybern. 43(6), 1656–1671 (2013)
Qiao, W., Tian, W., Tian, Y., Yang, Q., Wang, Y., Zhang, J.: The forecasting of PM2.5 using a hybrid model based on wavelet transform and an improved deep learning algorithm. IEEE Access 7, 142814–142825 (2019)
Mafarja, M., Mirjalili, S.: Whale optimization approaches for wrapper feature selection. Appl. Soft Comput. 62, 441–453 (2018)
Thaher, T., Chantar, H., Too, J., Mafarja, M., Turabieh, H.T., Houssein, E.H.: Boolean particle swarm optimization with various evolutionary population dynamics approaches for feature selection problems. Expert Syst. Appl. 195, 116550 (2022)
Thaher, T., Heidari, A.A., Mafarja, M., Dong, J.S., Mirjalili, S.: Binary Harris Hawks optimizer for high-dimensional, low sample size feature selection. In: Mirjalili, S., Faris, H., Aljarah, I. (eds.) Evolutionary Machine Learning Techniques. AIS, pp. 251–272. Springer, Singapore (2020). https://doi.org/10.1007/978-981-32-9990-0_12
Chen, H., Heidari, A.A., Zhao, X., Zhang, L., Chen, H.: Advanced orthogonal learning-driven multi-swarm sine cosine optimization: framework and case studies. Expert Syst. Appl. 144, 113113 (2020)
Xu, Y., et al.: An efficient chaotic mutative moth-flame-inspired optimizer for global optimization tasks. Expert Syst. Appl. 129, 135–155 (2019)
Hashim, F.A., Hussien, A.G.: Snake optimizer: a novel meta-heuristic optimization algorithm. Knowl.-Based Syst. 242, 108320 (2022)
Agrawal, P., Abutarboush, H., Talari, G., Wagdy, A.: Metaheuristic algorithms on feature selection: a survey of one decade of research (2009–2019). IEEE Access 9, 26766–26791 (2021)
Hamamoto, A.H., Carvalho, L.F., Sampaio, L.D.H., Abrão, T., Proença Jr., M.L.: Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Syst. Appl. 92, 390–402 (2018)
Hajimirzaei, B., Navimipour, N.J.: Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Express 5(1), 56–59 (2019)
Selvakumar, B., Muneeswaran, K.: Firefly algorithm based feature selection for network intrusion detection. Comput. Secur. 81, 148–155 (2019)
Ali, M.H., Al Mohammed, B.A.D., Ismail, A., Zolkipli, M.F.: A new intrusion detection system based on fast learning network and particle swarm optimization. IEEE Access 6, 20255–20261 (2018)
Hodo, E., et al.: Threat analysis of IoT networks using artificial neural network intrusion detection system. In: 2016 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–6. IEEE (2016)
Panigrahi, A., Patra, M.R.: A layered approach to network intrusion detection using rule learning classifiers with nature-inspired feature selection. In: Pattnaik, P.K., Rautaray, S.S., Das, H., Nayak, J. (eds.) Progress in Computing, Analytics and Networking. AISC, vol. 710, pp. 215–223. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-7871-2_21
Su, J., He, S., Wu, Y.: Features selection and prediction for IoT attacks. High-Confidence Comput. 2(2), 100047 (2022)
Diro, A.A., Chilamkurti, N.: Distributed attack detection scheme using deep learning approach for internet of things. Futur. Gener. Comput. Syst. 82, 761–768 (2018)
Anthi, E., Williams, L., Burnap, P.: Pulse: an adaptive intrusion detection for the internet of things. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018, pp. 1–4 (2018)
Mirjalili, S., Lewis, A.: S-shaped versus V-shaped transfer functions for binary particle swarm optimization. Swarm Evol. Comput. 9, 1–14 (2013)
Li, J., Zhao, Z., Li, R., Zhang, H., Zhang, T.: AI-based two-stage intrusion detection for software defined IoT networks. IEEE Internet Things J. 6(2), 2093–2102 (2018)
Kennedy, J., Eberhart, R. C.: A discrete binary version of the particle swarm algorithm. In: 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation, vol. 5, pp. 4104–4108. IEEE (1997)
Rashedi, E., Nezamabadi-Pour, H., Saryazdi, S.: BGSA: binary gravitational search algorithm. Nat. Comput. 9(3), 727–745 (2010)
Acknowledgements
The research leading to these results has received funding from the Research Council (TRC) of the Sultanate of Oman under the Block Funding Program with agreement no. TRC/BFP/ASU/01/2019.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
El-Saleh, A.A., Thaher, T., Chantar, H., Mafarja, M. (2022). Enhanced IoT Based IDS Driven by Binary Snake Optimizer for Feature Selection. In: Fournier-Viger, P., et al. Advances in Model and Data Engineering in the Digitalization Era. MEDI 2022. Communications in Computer and Information Science, vol 1751. Springer, Cham. https://doi.org/10.1007/978-3-031-23119-3_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-23119-3_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-23118-6
Online ISBN: 978-3-031-23119-3
eBook Packages: Computer ScienceComputer Science (R0)