Skip to main content
Log in

Design of Intrusion Detection System Using GA and CNN for MQTT-Based IoT Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

With the advancement of technology, Internet of Things (IoT) devices are integrated with smart homes, smart cities, intelligent medical systems, industries, smart cars, and many more applications to monitor and control them. These devices are connected to different heterogeneous environments and have many environmental constraints such as power, bandwidth, resources, etc. Unfortunately, this makes them attractive targets for attackers to perform malicious behaviours. It necessitates updating the current intrusion detection system (IDS) to cope with existing and new challenges. This paper proposes an IDS to secure a Message Queuing Telemetry Transport (MQTT)-based IoT environment. The MQTT does not use robust encryption algorithms to encrypt the transmitted data for fast communication, which makes the networks vulnerable to intruders and network attacks. The proposed model selects essential features using a genetic algorithm, and these selected features are used to train a convolutional neural network model for network packet classification. We have used the MQTT-IoT-IDS2020 dataset to analyze and measure the model’s performance. The test results are promising and prove that the proposed scheme can identify potential intrusions in the MQTT networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data Availability

No data was generated during the research to disclose. No code is available to share.

References

  1. Future of Industry Ecosystems: Shared Insights & Data | IDC Blog—blogs.idc.com. Retrieved March, 04, 2024, from https://blogs.idc.com/2021/01/06/future-of-industry-ecosystems-shared-data-and-insights/.

  2. Liao, H.-J., Lin, C.-H.R., Lin, Y.-C., & Tung, K.-Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 36(1), 16–24.

    Article  Google Scholar 

  3. Deshpande, P., Sharma, S. C., Peddoju, S. K., & Junaid, S. (2018). HIDS: A host based intrusion detection system for cloud computing environment. International Journal of System Assurance Engineering and Management, 9(3), 567–576.

    Google Scholar 

  4. Mondal, B., & Singh, S. K. (2022). A comparative analysis of network intrusion detection system for iot using machine learning. In Internet of Things and Its Applications (pp. 211–221). Springer Nature, Singapore.

  5. Khraisat, A., & Alazab, A. (2021). A critical review of intrusion detection systems in the internet of things: Techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity, 4(1), 1–27.

    Article  Google Scholar 

  6. Balaji, S., Nathani, K., & Santhakumar, R. (2019). IoT technology, applications and challenges: A contemporary survey. Wireless Personal Communications, 108(1), 363–388.

    Article  Google Scholar 

  7. Hindy, H., Bayne, E., Bures, M., Atkinson, R., Tachtatzis, C., & Bellekens, X. (2020). Machine learning based IoT intrusion detection system: An MQTT case study (MQTT-IoT-IDS2020 dataset). In International Networking Conference (pp. 73–84). Springer.

  8. Gupta, S. K., Tripathi, M., & Grover, J. (2022). Hybrid optimization and deep learning based intrusion detection system. Computers and Electrical Engineering, 100, 107876.

    Article  Google Scholar 

  9. Anthi, E., Williams, L., Slowinska, M., Theodorakopoulos, G., & Burnap, P. (2019). A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things Journal, 6(5), 9042–9053.

    Article  Google Scholar 

  10. Eskandari, M., Janjua, Z. H., Vecchio, M., & Antonelli, F. (2020). Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet of Things Journal, 7(8), 6882–6897.

    Article  Google Scholar 

  11. Zhong, W., Ning, Yu., & Ai, C. (2020). Applying big data based deep learning system to intrusion detection. Big Data Mining and Analytics, 3(3), 181–195.

    Article  Google Scholar 

  12. Derhab, A., Aldweesh, A., Emam, A. Z., & Khan, F. A. (2020). Intrusion detection system for internet of things based on temporal convolution neural network and efficient feature engineering. Wireless Communications and Mobile Computing 1–16.

  13. Saba, T., Rehman, A., Sadad, T., Kolivand, H., & Bahaj, S. A. (2022). Anomaly-based intrusion detection system for IoT networks through deep learning model. Computers and Electrical Engineering, 99, 107810.

    Article  Google Scholar 

  14. Pampapathi, B. M., Guptha, N., & Hema, M. S. (2022). Towards an effective deep learning-based intrusion detection system in the internet of things. Telematics and Informatics Reports, 7, 100009.

    Article  Google Scholar 

  15. Nasir, M., Javed, A. R., Tariq, M. A., Asim, M., & Baker, T. (2022). Feature engineering and deep learning-based intrusion detection framework for securing edge IoT. The Journal of Supercomputing, 78(6), 8852–8866.

    Article  Google Scholar 

  16. Tekin, N., Acar, A., Ahmet Aris, A., Uluagac, S., & Gungor, V. C. (2023). Energy consumption of on-device machine learning models for IoT intrusion detection. Internet of Things, 21, 100670.

    Article  Google Scholar 

  17. Kaushik, A., & Al-Raweshidy, H. (2024). A novel intrusion detection system for internet of things devices and data. Wireless Networks, 30(1), 285–294.

    Article  Google Scholar 

  18. Sharma, B., Sharma, L., Lal, C., & Roy, S. (2024). Explainable artificial intelligence for intrusion detection in IoT networks: A deep learning based approach. Expert Systems with Applications, 238, 121751.

    Article  Google Scholar 

  19. Nanjappan, M., Pradeep, K., Natesan, G., Samydurai, A., & Premalatha, G. (2024). DeepLG SecNet: Utilizing deep LSTM and GRU with secure network for enhanced intrusion detection in IoT environments. Cluster Computing 1–13.

  20. Sabitha, R., Gopikrishnan, S., Bejoy, B. J., Anusuya, V., & Saravanan, V. (2022). Network based detection of IoT attack using AIS-IDS model. Wireless Personal Communications, 128(3), 1543–1566.

    Article  Google Scholar 

  21. Gyamfi, E., & Jurcut, A. D. (2022). Novel online network intrusion detection system for industrial IoT based on OI-SVDD and AS-ELM. IEEE Internet of Things Journal, 10(5), 3827–3839.

    Article  Google Scholar 

  22. Booij, T. M., Chiscop, I., Meeuwissen, E., Moustafa, N., & den Hartog, F. T. H. (2022). ToN_IoT: The role of heterogeneity and the need for standardization of features and attack types in IoT network intrusion data sets. IEEE Internet of Things Journal, 9(1), 485–496.

    Article  Google Scholar 

  23. Popoola, S. I., Ande, R., Adebisi, B., Gui, G., Hammoudeh, M., & Jogunola, O. (2022). Federated deep learning for zero-day botnet attack detection in IoT-edge devices. IEEE Internet of Things Journal, 9(5), 3930–3944.

    Article  Google Scholar 

  24. Abbas, A., Khan, M. A., Latif, S., Ajaz, M., Shah, A. A., & Ahmad, J. (2021). A new ensemble-based intrusion detection system for internet of things. Arabian Journal for Science and Engineering, 47(2), 1805–1819.

    Article  Google Scholar 

  25. Liu, W., Liu, X., Di, X., & Qi, H. (2019). A novel network intrusion detection algorithm based on fast Fourier transformation.

  26. Ullah, I., Ullah, A., & Sajjad, M. (2021). Towards a hybrid deep learning model for anomalous activities detection in internet of things networks. IoT, 2(3), 428–448.

    Article  Google Scholar 

  27. Al-Hawawreh, M., Sitnikova, E., & Aboutorab, N. (2021). X-IIoTID: A connectivity-agnostic and device-agnostic intrusion data set for industrial internet of things. IEEE Internet of Things Journal, 9(5), 3962–3977.

    Article  Google Scholar 

  28. Chen, Y., Lin, Q., Wei, W., Ji, J., Wong, K.-C., & Coello, C. A. (2022). Intrusion detection using multi-objective evolutionary convolutional neural network for internet of things in Fog computing. Knowledge-Based Systems, 244, 108505.

    Article  Google Scholar 

  29. Kim, J., Kim, J., Kim, H., Shim, M., & Choi, E. (2020). CNN-based network intrusion detection against denial-of-service attacks. Electronics, 9(6), 916.

    Article  Google Scholar 

  30. Kottapalle, P. (2020). A CNN-LSTM model for intrusion detection system from high dimensional data. Journal of Information and Computational Science, 10, 1362–1370.

    Google Scholar 

  31. Hawawreh, M., Moustafa, N., & Sitnikova, E. (2018). Identification of malicious activities in industrial internet of things based on deep learning models. Journal of Information Security and Applications, 41, 1–11.

    Article  Google Scholar 

  32. Jothi, B. & Pushpalatha, M. (2021). WILS-TRS—a novel optimized deep learning based intrusion detection framework for IoT networks. Personal and Ubiquitous Computing, 1–17 (2021).

  33. Labiod, Y., Amara Korba, A., & Ghoualmi, N. (2022). Fog computing-based intrusion detection architecture to protect IoT networks. Wireless Personal Communications, 125, 1–29.

    Article  Google Scholar 

  34. Jagadeesh Babu, M., & Raji Reddy, A. (2020). SH-IDS: specification heuristics based intrusion detection system for IoT networks. Wireless Personal Communications, 112(3), 2023–2045.

    Article  Google Scholar 

  35. Gothawal, D. B., & Nagaraj, S. V. (2020). Anomaly-based intrusion detection system in RPL by applying stochastic and evolutionary game models over IoT environment. Wireless Personal Communications, 110(3), 1323–1344.

    Article  Google Scholar 

  36. Bhatia, M. P. S. & Sangwan, S. R (2021). Soft computing for anomaly detection and prediction to mitigate IoT-based real-time abuse. Personal and Ubiquitous Computing, 1–11.

  37. Holland, J. H. (1992). Adaptation in natural and artificial systems: An introductory analysis with applications to biology, control, and artificial intelligence. Cambridge: MIT Press.

    Book  Google Scholar 

  38. Vaccari, I., Chiola, G., Aiello, M., Mongelli, M., & Cambiaso, E. (2020). MQTTset, a new dataset for machine learning techniques on MQTT. Sensors, 20(22), 6578.

    Article  Google Scholar 

  39. Moustakidis, S., & Karlsson, P. (2020). A novel feature extraction methodology using Siamese convolutional neural networks for intrusion detection. Cybersecurity, 3(1), 16.

    Article  Google Scholar 

  40. Belouch, M., El Hadaj, S., & Idhammad, M. (2018). Performance evaluation of intrusion detection based on machine learning using apache spark. Procedia Computer Science, 127, 1–6.

    Article  Google Scholar 

  41. Li, Y., Xia, J., Zhang, S., Yan, J., Ai, X., & Dai, K. (2012). An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Systems with Applications, 39(1), 424–430.

    Article  Google Scholar 

  42. Al-Yaseen, W. L., Othman, Z. A., & Nazri, M. Z. A. (2017). Multi-level hybrid support vector machine and extreme learning machine based on modified k-means for intrusion detection system. Expert Systems with Applications, 67, 296–303.

    Article  Google Scholar 

  43. Ji, S.-Y., Jeong, B.-K., Choi, S., & Jeong, D. H. (2016). A multi-level intrusion detection method for abnormal network behaviors. Journal of Network and Computer Applications, 62, 9–17.

    Article  Google Scholar 

  44. Wang, H., Jie, G., & Wang, S. (2017). An effective intrusion detection framework based on SVM with feature augmentation. Knowledge-Based Systems, 136, 130–139.

    Article  Google Scholar 

  45. Ahmad, R., Alsmadi, I., Alhamdani, W., & Tawalbeh, L. (2022). A comprehensive deep learning benchmark for IoT IDS. Computers & Security, 114, 102588.

    Article  Google Scholar 

Download references

Funding

The authors hereby declare that there was no full or partial financial support from any organization.

Author information

Authors and Affiliations

Authors

Contributions

Asimkiran Dandapat carried out the experiments and drafted the main manuscript text, Dr. Bhaskar Mondal conceptualized, supervised, and prepared all the figures and did the proofreading. All authors equally contributed to the scientific work and reviewed the manuscript.

Corresponding author

Correspondence to Bhaskar Mondal.

Ethics declarations

Conflict of interest

The authors do not have any financial or personal Conflict of interest to disclose related to this manuscript.

Ethical Approval

No human and/ or animal studies have been presented in the manuscript. Hence, no ethical approval is needed.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dandapat, A., Mondal, B. Design of Intrusion Detection System Using GA and CNN for MQTT-Based IoT Networks. Wireless Pers Commun 134, 2059–2082 (2024). https://doi.org/10.1007/s11277-024-10984-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-024-10984-w

Keywords

Navigation