Abstract
Devices belonging to the realm of edge Internet of Things (IoT) are becoming highly susceptible to intrusion attacks. The large-scale development in edge IoT, ease of availability, and affordability have drastically increased its usage in the real world. The business market revolves around producing better, innovative, and appealing products every day. However, security is often left unchecked to achieve these standards. Therefore, vulnerabilities present in these devices make them susceptible to various intrusion attacks. We devised a model named DF-IDS for detecting intrusions in IoT traffic. DF-IDS consists of two main phases: In the \(1^{st}\) phase, it comparatively selects the best features from the feature matrix using SpiderMonkey (SM), principle component analysis (PCA), information gain (IG), and correlation attribute evaluation (CAE). In the \(2^{nd}\) phase, these features along with assigned labels are used to train a deep neural network for intrusion detection. DF-IDS achieves an accuracy of 99.23% with an F1-score of 99.27%. It shows improvement not only in accuracy but also in F1 score as compared to the other comparative models and existing studies.
Similar content being viewed by others
Notes
References
Otoum Y, Liu D, Nayak A (2019) Dl-ids: a deep learning-based intrusion detection framework for securing iot. Trans Emerg Telecommun Technol 6:e3803
Iwendi C, Rehman SU, Javed AR, Khan S, Srivastava G (2021) Sustainable security for the internet of things using artificial intelligence architectures. ACM Trans Internet Technol (TOIT) 21(3):1–22
Patel KK, Patel SM et al (2016) Internet of things-iot: definition, characteristics, architecture, enabling technologies, application & future challenges. Int J Eng Sci Comput 6(5):517
Mohiyuddin A, Javed AR, Chakraborty C, Rizwan M, Shabbir M, Nebhen J (2021) Secure cloud storage for medical iot data using adaptive neuro-fuzzy inference system. Int J Fuzzy Syst 21:1–13
Jamali MAJ, Bahrami B, Heidari A, Allahverdizadeh P, Norouzi F (2020) Iot architecture. In: Towards the Internet of Things, Springer, pp 9–31
Bhanu K, Mahadevaswamy H, Jasmine H (2020) Iot based smart system for enhanced irrigation in agriculture. In: 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), IEEE, pp 760–765
Mendonça RV, Teodoro AA, Rosa RL, Saadi M, Melgarejo DC, Nardelli PH, Rodríguez DZ (2021) Intrusion detection system based on fast hierarchical deep convolutional neural network. IEEE Access 9:61024–61034
Ahmed W, Rasool A, Javed AR, Kumar N, Gadekallu TR, Jalil Z, Kryvinska N (2021) Security in next generation mobile payment systems: A comprehensive survey. IEEE Access 9:115932–115950. https://doi.org/10.1109/ACCESS.2021.3105450
Ran Z, Zheng D, Lai Y, Tian L (2020) Applying stack bidirectional lstm model to intrusion detection. CMC-Computers Mater Continua 65(1):309–320
ur Rehman S, Khaliq M, Imtiaz SI, Rasool A, Shafiq M, Javed AR, Jalil Z, Bashir AK (2021) Diddos: an approach for detection and identification of distributed denial of service (ddos) cyberattacks using gated recurrent units (gru). Fut Gener Computer Syst 118:453–466
Imtiaz SI, ur Rehman S, Javed AR, Jalil Z, Liu X, Alnumay WS (2021) Deepamd: detection and identification of android malware using high-efficient deep artificial neural network. Fut Gener Computer Syst 115:844–856
Hina M, Ali M, Javed AR, Ghabban F, Khan LA, Jalil Z (2021) Sefaced: semantic-based forensic analysis and classification of e-mail data using deep learning. IEEE Access 9:98398–98411
Mythili R, Kalpana P (2020) High speed network intrusion detection system (nids) using low power precomputation based content addressable memory. Computers, Mater Continua 62(3):1097–1107
Basit A, Zafar M, Liu X, Javed AR, Jalil Z, Kifayat K (2021) A comprehensive survey of ai-enabled phishing attacks detection techniques. Telecommun Syst 76(1):139–154
Mittal M, Iwendi C, Khan S, Rehman Javed A (2021) Analysis of security and energy efficiency for shortest route discovery in low-energy adaptive clustering hierarchy protocol using levenberg-marquardt neural network and gated recurrent unit for intrusion detection system. Trans Emerg Telecommun Technol 32(6):e3997
Muhammad A, Asad M, Javed AR (2020) Robust early stage botnet detection using machine learning. In: 2020 International Conference on Cyber Warfare and Security (ICCWS), IEEE, pp 1–6
Basit A, Zafar M, Javed AR, Jalil Z (2020) A novel ensemble machine learning method to detect phishing attack. In: 2020 IEEE 23rd International Multitopic Conference (INMIC), IEEE, pp 1–5
Ahmed W, Shahzad F, Javed AR, Iqbal F, Ali L (2021) Whatsapp network forensics: Discovering the ip addresses of suspects. 2021 11th IFIP International Conference on New Technologies. Mobility and Security (NTMS), IEEE, pp 1–7
Kannadiga P, Zulkernine M (2005) Didma: A distributed intrusion detection system using mobile agents. In: Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network, IEEE, pp 238–245
Afzal S, Asim M, Javed AR, Beg MO, Baker T (2021) Urldeepdetect: a deep learning approach for detecting malicious urls using semantic vector models. J Netw Syst Manage 29(3):1–27
Javed AR, Rehman SU, Khan MU, Alazab M, Khan HU (2021) Betalogger: smartphone sensor-based side-channel attack detection and text inference using language modeling and dense multilayer neural network. Trans Asian Low-Resour Lang Inf Process 20(5):1–17
Rehman Javed A, Jalil Z, Atif Moqurrab S, Abbas S, Liu X (2020) Ensemble adaboost classifier for accurate and fast detection of botnet attacks in connected vehicles. Transactions on Emerging Telecommunications Technologies p e4088
Javed AR, Beg MO, Asim M, Baker T, Al-Bayatti AH (2020) Alphalogger: Detecting motion-based side-channel attack using smartphone keystrokes. Journal of Ambient Intelligence and Humanized Computing pp 1–14
Zhou Y, Han M, Liu L, He JS, Wang Y (2018) Deep learning approach for cyberattack detection. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE, pp 262–267
Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for internet of things. Fut Gener Computer Syst 82:761–768
Andresini G, Appice A, Malerba D (2021) Autoencoder-based deep metric learning for network intrusion detection. Inf Sci 569:706–727
Wang H, Gu J, Wang S (2017) An effective intrusion detection framework based on svm with feature augmentation. Knowl-Based Syst 136:130–139
Zhang Y, Li P, Wang X (2019) Intrusion detection for iot based on improved genetic algorithm and deep belief network. IEEE Access 7:31711–31722
Rehman A, Rehman SU, Khan M, Alazab M, Reddy T (2021) Canintelliids: detecting in-vehicle intrusion attacks on a controller area network using cnn and attention-based gru. IEEE Transactions on Network Science and Engineering
Javed AR, Usman M, Rehman SU, Khan MU, Haghighi MS (2020) Anomaly detection in automated vehicles using multistage attention-based convolutional neural network. IEEE Transactions on Intelligent Transportation Systems
Asad M, Asim M, Javed T, Beg MO, Mujtaba H, Abbas S (2020) Deepdetect: detection of distributed denial of service attacks using deep learning. Computer J 63:983–994
HaddadPajouh H, Dehghantanha A, Khayami R, Choo KKR (2018) A deep recurrent neural network based approach for internet of things malware threat hunting. Fut Gener Computer Syst 85:88–96
McDermott CD, Majdani F, Petrovski AV (2018) Botnet detection in the internet of things using deep learning approaches. In: 2018 International Joint Conference on Neural Networks (IJCNN), IEEE, pp 1–8
Funding
This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors share no conflict of interests.
Data availability
Data sources are highlighted in the paper.
Code availability
The authors can provide the code on demand.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Nasir, M., Javed, A.R., Tariq, M.A. et al. Feature engineering and deep learning-based intrusion detection framework for securing edge IoT. J Supercomput 78, 8852–8866 (2022). https://doi.org/10.1007/s11227-021-04250-0
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-021-04250-0