Abstract
The Internet of Things (IoT) device is becoming universal domain and its success cannot be ignored, but its threats on IoT devices increases concurrently. The Cyber-attacks are becoming the component of IoT affecting user’s life. The professionals are forced to sift huge data to unveil and manage litigations. Hence, secure IoT is required for comprehending attacks. A model is presented for discovering cyber attack considering feature fusion. The routing of data towards Base Station (BS) is done with the Fractional gravitational search algorithm (FGSA). At BS, cybercrime detection is done, wherein data is splitted with enhanced Fuzzy c-means clustering (FCM) considering the MapReduce model. In mapper, the feature fusion is done with mutual information and the Deep Quantum Neural Network (DQNN), while reducer performs cybercrime detection. The Fractional Mayfly Shepherd Optimization (FrMSO)-based Deep Belief Network (DBN) is devised for describing the digital examination to notice and trace behaviors of attacks in IoT. Here, the training of DBN is done by the proposed FrMSO algorithm, which is developed by integrating the Fractional Calculus (FC), Mayfly Optimization Algorithm (MA), and the Shuffled shepherd optimization Algorithm (SSOA). The developed model helps to employ the weights of DBN with FrMSO for determining and tracing the abnormal aspects in IoT. The FrMSO-based DBN presented elevated precision of 96.4%, recall of 98.3% and F-measure of 95.4% respectively.
Similar content being viewed by others
Data Availability
UCSD Network Telescope Aggregrated DDoS Metadata, “https://catalog.caida.org/details/dataset/telescope_ddos”, accessed on January 2022.
References
P. Y. Chen, S. M. Cheng and K. C. Chen, Information fusion to defend intentional attack in internet of things, IEEE Internet of Things Journal, Vol. 1, No. 4, pp. 337–348, 2014.
E. F. Jesus, V. R. Chicarino, C. V. De Albuquerque and A. A. D. A. Rocha, A survey of how to use blockchain to secure internet of things and the stalker attack, Security and Communication Networks, 2018. https://doi.org/10.1155/2018/9675050.
A. A. Diro and N. Chilamkurti, Distributed attack detection scheme using deep learning approach for internet of things, Future Generation Computer Systems, Vol. 82, pp. 761–768, 2018.
K. Mohammed, A.H., Jebamikyous, H., Nawara, D. and Kashef, R, 2021 Iot cyber-attack detection: A comparative analysis, In International Conference on Data Science, E-learning and Information Systems, pp. 117–123
Y. N. Soe, Y. Feng, P. I. Santosa, R. Hartanto and K. Sakurai, Machine learning-based IoT-botnet attack detection with sequential architecture, Sensors, Vol. 20, No. 16, pp. 4372, 2020.
Q. Abu Al-Haija and S. Zein-Sabatto, An efficient deep-learning-based detection and classification system for cyber-attacks in IoT communication networks, Electronics, Vol. 9, No. 12, pp. 2152, 2020.
M. Saharkhizan, A. Azmoodeh, A. Dehghantanha, K. K. R. Choo and R. M. Parizi, An ensemble of deep recurrent neural networks for detecting IoT cyber attacks using network traffic, IEEE Internet of Things Journal, Vol. 7, No. 9, pp. 8852–8859, 2020.
Cervantes, C.; Poplade, D.; Nogueira, M.; Santos, A, Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things, In Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015
Guo, Z.; Harris, I.G.; Jiang, Y.; Tsaur, L.F, An efficient approach to prevent battery exhaustion attack on BLE-based mesh networks, In Proceedings of the International Conference on Computing, Networking and Communications (ICNC), 2017
B. Jia, Y. Ma, X. Huang, Z. Lin and Y. Sun, A novel real-time DDoS attack detection mechanism based on MDRA algorithm in big data, Math. Probl. Eng., 2016. https://doi.org/10.1155/2016/1467051.
K. J. Singh, K. Thongam and T. De, Entropy-based application layer DDoS attack detection using artificial neural networks, Entropy, Vol. 18, pp. 350, 2016.
Y. N. Soe, Y. Feng, P. I. Santosa, R. Hartanto and K. Sakurai, Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features, Electronics, Vol. 9, No. 1, pp. 144, 2020.
A. Samy, H. Yu and H. Zhang, Fog-based attack detection framework for internet of things using deep learning, IEEE Access, Vol. 8, pp. 74571–74585, 2020.
T. Gopalakrishnan, D. Ruby, F. Al-Turjman, D. Gupta, I. V. Pustokhina, D. A. Pustokhin and K. Shankar, Deep learning enabled data offloading with cyber attack detection model in mobile edge computing systems, IEEE Access, Vol. 8, pp. 185938–185949, 2020.
P. Kumar, G. P. Gupta and R. Tripathi, Toward design of an intelligent cyber attack detection system using hybrid feature reduced approach for iot networks, Arabian Journal for Science and Engineering, Vol. 46, No. 4, pp. 3749–3778, 2021.
G. S. Chhabra, V. P. Singh and M. Singh, Cyber forensics framework for big data analytics in IoT environment using machine learning, Multimedia Tools and Applications, Vol. 79, No. 23, pp. 15881–15900, 2020.
Z. E. Huma, S. Latif, J. Ahmad, Z. Idress, A. Ibrar, Z. Zou, F. Alqahanti and F. Baothman, A hybrid deep random neural network for cyberattack detection in the industrial internet of things, IEEE Access, Vol. 9, pp. 55595–55605, 2021.
S. Venugopal, G. W. Sathianesan and R. Rengaswamy, Cyber forensic framework for big data analytics using Sunflower Jaya optimization-based Deep stacked autoencoder, International Journal of Numerical Modelling: Electronic Networks, Devices and Fields, 2021. https://doi.org/10.1002/jnm.2892.
A. Karimi, S. Abbasabadei, J. A. Torkestani and F. Zarafshan, Cybercrime detection using semi-supervised neural network, Computer Science Journal of Moldova, Vol. 86, No. 2, pp. 155–183, 2021.
A. V. Dhumane and R. S. Prasad, Multi-objective fractional gravitational search algorithm for energy efficient routing in IoT, Wireless networks, Vol. 25, No. 1, pp. 399–413, 2019.
S. Krinidis and V. Chatzis, A robust fuzzy local information C-means clustering algorithm, IEEE transactions on image processing, Vol. 19, No. 5, pp. 1328–1337, 2010.
K. Beer, D. Bondarenko, T. Farrelly, T. J. Osborne, R. Salzmann, D. Scheiermann and R. Wolf, Training deep quantum neural networks, Nature communications, Vol. 11, No. 1, pp. 1–6, 2020.
M. M. Hassan, M. G. R. Alam, M. Z. Uddin, S. Huda, A. Almogren and G. Fortino, Human emotion recognition using deep belief network architecture, Information Fusion, Vol. 51, pp. 10–18, 2019.
P. R. Bhaladhare and D. C. Jinwala, A clustering approach for the-diversity model in privacy preserving data mining using fractional calculus-bacterial foraging optimization algorithm, Advances in Computer Engineering, 2014. https://doi.org/10.1155/2014/396529.
K. Zervoudakis and S. Tsafarakis, A mayfly optimization algorithm, Computers & Industrial Engineering, Vol. 145, pp. 106559, 2020.
Kaveh, A. and Zaerreza, A., “Shuffled shepherd optimization method: a new meta-heuristic algorithm”, Engineering Computations, 2020
UCSD Network Telescope Aggregrated DDoS Metadata, https://catalog.caida.org/details/dataset/telescope_ddos, Accessed on January 2022
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Thapaliya, S., Sharma, P.K. Cyber Forensic Investigation in IoT Using Deep Learning Based Feature Fusion in Big Data. Int J Wireless Inf Networks 30, 16–29 (2023). https://doi.org/10.1007/s10776-022-00586-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10776-022-00586-3