Skip to main content
Log in

Intrusion Detection Model for IoT Using Recurrent Kernel Convolutional Neural Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

A Correction to this article was published on 10 January 2023

This article has been updated

Abstract

In communication and information technology, the Internet of Things (IoT) creates an enormous amount of data traffic that permits data analysis to expose and detect unusual network load and hidden trends. There are different existing DL (Deep Learning) classification methods applied for IDM (Intrusion Detection Model) detection, but it has some limitations, such as being difficult for security and more complex. In order to overcome these problems, the proposed work used the DL based RK.CNN-MMBO (Recurrent Kernel Convolution Neural Network-Modified Monarch Butterfly Optimization) model to identify the attacks in the network. In the pre-processing stage, the data are pre-processed by min_max normalization. After pre-processing, the optimal features are selected by the IBRO (Improved Battle Royale Optimization) algorithm. Then the selected features are classified using the DL classifier RKCNN (Recurrent kernel convolutional neural network). Moreover, MMBO (Modified Monarch Butterfly Optimization) improves the classifier’s performance in attack detection. The proposed work used two different types of datasets for experimental validation, N-BaIoT and CICIDS-2017. The proposed IDM classification using the N-BaIoT dataset with the RKCNN-MMBO model attains the accuracy of (99.96%), and the CICIDS-2017 dataset with the RKCNN-MMBO model obtains the accuracy value of (99.95%). The proposed RKCNN-MMBO classifier model obtained higher accuracy in the detection of IDM than other methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Availability of Data and Materials

No data Availability.

Change history

  • 07 January 2023

    The original version of this article was revised: In this article the author name P. Mercy Rajaselvi Beaulah was incorrectly written as V. Mercy Rajaselvi Beaulah. The original article has been corrected.

  • 10 January 2023

    A Correction to this paper has been published: https://doi.org/10.1007/s11277-023-10167-z

References

  1. Patel, K. K., & Patel, S. M. (2016). Internet of things-IOT: definition, characteristics, architecture, enabling technologies, application and future challenges. International journal of engineering science and computing, 6(5).

  2. Ramchurn, S. D., Vytelingum, P., Rogers, A., & Jennings, N. R. (2012). Putting the’smarts’ into the smart grid: a grand challenge for artificial intelligence. Communications of the ACM, 55(4), 86–97.

    Article  Google Scholar 

  3. Abdullah, T. A., Ali, W., Malebary, S., & Ahmed, A. A. (2019). A review of cyber security challenges attacks and solutions for Internet of Things based smart home. International Journal Computing Science Network Security, 19(9), 139.

    Google Scholar 

  4. Kumar, S., & Dutta, K. (2016). Intrusion detection in mobile ad hoc networks: Techniques, systems, and future challenges. Security and Communication Networks, 9(14), 2484–2556.

    Article  Google Scholar 

  5. Margolis, J., Oh, T.T., Jadhav, S., Kim, Y.H., & Kim, J.N. (2017). An in-depth analysis of the mirai botnet. In 2017 international conference on software security and assurance (icssa), ieee, 6–12.

  6. Rghioui, A., & Oumnad, A. (2017). Internet of things: visions, technologies, and areas of application. Automation, Control and Intelligent Systems, 5(6), 83. https://doi.org/10.11648/j.acis.20170506.11

    Article  Google Scholar 

  7. Vagts, H., and Bauer, A. (2010, August). Privacy-aware object representation for surveillance systems. In 2010 7th IEEE international conference on advanced video and signal based surveillance IEEE, 601–608.

  8. Om Kumar, C. U., & Sathia Bhama, P. R. (2019). Detecting and confronting flash attacks from IoT botnets. The Journal of Supercomputing, 75(12), 8312–8338.

  9. Shin, S., Xu, L., Hong, S., and Gu, G. (2016). Enhancing network security through software defined networking (SDN). In 2016 25th international conference on computer communication and networks (ICCCN) IEEE, 1–9.

  10. Om Kumar, Chandra Umakantham, Jeyakumar Durairaj, Samsu Aliar Ahamed Ali, Y. Justindhas, and Suguna Marappan. "Effective intrusion detection system for IoT using optimized capsule auto encoder model." Concurrency and Computation: Practice and Experience (2022): e6918.

    Google Scholar 

  11. Om Kumar, C. U., & Sathia Bhama, P. R. “Efficient ensemble to combat flash attacks.” Computational Intelligence.

  12. Rose, T., Kifayat, K., Abbas, S., & Asim, M. (2020). A hybrid anomaly-based intrusion detection system to improve time complexity in the Internet of Energy environment. Journal of Parallel and Distributed Computing, 145, 124–139.

    Article  Google Scholar 

  13. Das, A. K., Zeadally, S., & He, D. (2018). Taxonomy and analysis of security protocols for Internet of Things. Future Generation Computer Systems, 89, 110–125.

    Article  Google Scholar 

  14. Schjolberg, S., & Ghernaouti-Helie, S. (2011). A global treaty on cybersecurity and cybercrime. Cybercrime Law, 97.

  15. Cox, D., & Fafchamps, M. (2007). Extended family and kinship networks: Economic insights and evolutionary directions. Handbook of development economics, 4, 3711–3784.

    Article  Google Scholar 

  16. Waheed, N., He, X., Ikram, M., Usman, M., Hashmi, S. S., & Usman, M. (2020). Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures. ACM Computing Surveys (CSUR), 53(6), 1–37.

  17. Rich, M.L. (2016). Machine learning, automated suspicion algorithms, and the fourth amendment. University of Pennsylvania Law Review, 871–929.

  18. Om Kumar, C. U., & Sathia Bhama, P. R. (2022). “Proficient detection of flash attacks using a predictive strategy.” In Emerging research in computing, information, communication and applications (pp. 367–379). Singapore: Springer.

  19. Om Kumar, C. U., & Sathia Bhama, P. R. (2023). “Efficacious intrusion detection on cloud using improved BES and HYBRID SKINET-EKNN.” In Emerging research in computing, information, communication and applications (pp. 61–72). Singapore: Springer.

  20. Long, J., Luo, Y., Zhu, X., Luo, E., & Huang, M. (2020). Computation offloading through mobile vehicles in IoT-edge-cloud network. EURASIP Journal on Wireless Communications and Networking, 1, 1–21.

    Google Scholar 

  21. Keller, K. L. (2013). Building strong brands in a modern marketing communications environment. In The evolution of integrated marketing communications (pp. 73–90). Routledge.

  22. Idrissi, I., Boukabous, M., Azizi, M., Moussaoui, O., & El Fadili, H. (2021). Toward a deep learning-based intrusion detection system for IoT against botnet attacks. IAES International Journal of Artificial Intelligence, 10(1), 110.

    Google Scholar 

  23. Derhab, A., Aldweesh, A., Emam, A. Z., & Khan, F. A. (2020). Intrusion detection system for internet of things based on temporal convolution neural network and efficient feature engineering. Wireless Communications and Mobile Computing, 2020, 1–16. https://doi.org/10.1155/2020/6689134

    Article  Google Scholar 

  24. Elsayed, N., Zaghloul, Z.S., Azumah, S.W., and Li, C. (2021, August). Intrusion Detection System in Smart Home Network Using Bidirectional LSTM and Convolutional Neural Networks Hybrid Model. In 2021 IEEE international midwest symposium on circuits and systems (MWSCAS)IEEE, 55–58.

  25. Alkahtani, H., & Aldhyani, T. H. H. (2021). Intrusion detection system to advance internet of things infrastructure-based deep learning algorithms. Complexity, 2021, 1–18. https://doi.org/10.1155/2021/5579851

    Article  Google Scholar 

  26. Aljumah, A. (2021). IoT-based intrusion detection system using convolution neural networks. PeerJ Computer Science, 7, e721.

    Article  Google Scholar 

  27. Wang, X., Yin, S., Li, H., Wang, J., & Teng, L. (2020). A network intrusion detection method based on deep multi-scale convolutional neural network. International Journal of Wireless Information Networks, 27(4), 503–517.

    Article  Google Scholar 

  28. Kim, J., Kim, J., Kim, H., Shim, M., & Choi, E. (2020). CNN-based network intrusion detection against denial-of-service attacks. Electronics, 9(6), 916.

    Article  Google Scholar 

  29. Li, Y., Xu, Y., Liu, Z., Hou, H., Zheng, Y., Xin, Y., Zhao, Y., & Cui, L. (2020). Robust detection for network intrusion of industrial IoT based on multi-CNN fusion. Measurement, 154, 107450.

    Article  Google Scholar 

  30. Ruiz, N., Tavera, B., Abuzneid, A.S. (2020 Dec 16). Intrusion Detection System: The Use of Neural Network Packet Classification. In2020 international conference on computational science and computational intelligence (CSCI) IEEE, 1276–1281.

  31. Le, K. H., Nguyen, M. H., Tran, T. D., & Tran, N. D. (2022). IMIDS: an intelligent intrusion detection system against cyber threats in IoT. Electronics, 11(4), 524.

    Article  Google Scholar 

Download references

Funding

No funding is provided for the preparation of manuscript.

Author information

Authors and Affiliations

Authors

Contributions

All authors have equal contributions in this work.

Corresponding author

Correspondence to C. U. Om Kumar.

Ethics declarations

Conflict of Interest

Authors Om Kumar C.U., Suguna Marappan, Bhavadharani Murugeshan, P. Mercy Rajaselvi Beaulah, declares that they have no conflict of interest.

Consent to Participate

All the authors involved have agreed to participate in this submitted article.

Consent to Publish

All the authors involved in this manuscript give full consent for publication of this submitted article.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original version of this article was revised: In this article the author name P. Mercy Rajaselvi Beaulah was incorrectly written as V. Mercy Rajaselvi Beaulah. The original article has been corrected.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Om Kumar, C.U., Marappan, S., Murugeshan, B. et al. Intrusion Detection Model for IoT Using Recurrent Kernel Convolutional Neural Network. Wireless Pers Commun 129, 783–812 (2023). https://doi.org/10.1007/s11277-022-10155-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-10155-9

Keywords

Navigation