Abstract
In communication and information technology, the Internet of Things (IoT) creates an enormous amount of data traffic that permits data analysis to expose and detect unusual network load and hidden trends. There are different existing DL (Deep Learning) classification methods applied for IDM (Intrusion Detection Model) detection, but it has some limitations, such as being difficult for security and more complex. In order to overcome these problems, the proposed work used the DL based RK.CNN-MMBO (Recurrent Kernel Convolution Neural Network-Modified Monarch Butterfly Optimization) model to identify the attacks in the network. In the pre-processing stage, the data are pre-processed by min_max normalization. After pre-processing, the optimal features are selected by the IBRO (Improved Battle Royale Optimization) algorithm. Then the selected features are classified using the DL classifier RKCNN (Recurrent kernel convolutional neural network). Moreover, MMBO (Modified Monarch Butterfly Optimization) improves the classifier’s performance in attack detection. The proposed work used two different types of datasets for experimental validation, N-BaIoT and CICIDS-2017. The proposed IDM classification using the N-BaIoT dataset with the RKCNN-MMBO model attains the accuracy of (99.96%), and the CICIDS-2017 dataset with the RKCNN-MMBO model obtains the accuracy value of (99.95%). The proposed RKCNN-MMBO classifier model obtained higher accuracy in the detection of IDM than other methods.
Similar content being viewed by others
Availability of Data and Materials
No data Availability.
Change history
07 January 2023
The original version of this article was revised: In this article the author name P. Mercy Rajaselvi Beaulah was incorrectly written as V. Mercy Rajaselvi Beaulah. The original article has been corrected.
10 January 2023
A Correction to this paper has been published: https://doi.org/10.1007/s11277-023-10167-z
References
Patel, K. K., & Patel, S. M. (2016). Internet of things-IOT: definition, characteristics, architecture, enabling technologies, application and future challenges. International journal of engineering science and computing, 6(5).
Ramchurn, S. D., Vytelingum, P., Rogers, A., & Jennings, N. R. (2012). Putting the’smarts’ into the smart grid: a grand challenge for artificial intelligence. Communications of the ACM, 55(4), 86–97.
Abdullah, T. A., Ali, W., Malebary, S., & Ahmed, A. A. (2019). A review of cyber security challenges attacks and solutions for Internet of Things based smart home. International Journal Computing Science Network Security, 19(9), 139.
Kumar, S., & Dutta, K. (2016). Intrusion detection in mobile ad hoc networks: Techniques, systems, and future challenges. Security and Communication Networks, 9(14), 2484–2556.
Margolis, J., Oh, T.T., Jadhav, S., Kim, Y.H., & Kim, J.N. (2017). An in-depth analysis of the mirai botnet. In 2017 international conference on software security and assurance (icssa), ieee, 6–12.
Rghioui, A., & Oumnad, A. (2017). Internet of things: visions, technologies, and areas of application. Automation, Control and Intelligent Systems, 5(6), 83. https://doi.org/10.11648/j.acis.20170506.11
Vagts, H., and Bauer, A. (2010, August). Privacy-aware object representation for surveillance systems. In 2010 7th IEEE international conference on advanced video and signal based surveillance IEEE, 601–608.
Om Kumar, C. U., & Sathia Bhama, P. R. (2019). Detecting and confronting flash attacks from IoT botnets. The Journal of Supercomputing, 75(12), 8312–8338.
Shin, S., Xu, L., Hong, S., and Gu, G. (2016). Enhancing network security through software defined networking (SDN). In 2016 25th international conference on computer communication and networks (ICCCN) IEEE, 1–9.
Om Kumar, Chandra Umakantham, Jeyakumar Durairaj, Samsu Aliar Ahamed Ali, Y. Justindhas, and Suguna Marappan. "Effective intrusion detection system for IoT using optimized capsule auto encoder model." Concurrency and Computation: Practice and Experience (2022): e6918.
Om Kumar, C. U., & Sathia Bhama, P. R. “Efficient ensemble to combat flash attacks.” Computational Intelligence.
Rose, T., Kifayat, K., Abbas, S., & Asim, M. (2020). A hybrid anomaly-based intrusion detection system to improve time complexity in the Internet of Energy environment. Journal of Parallel and Distributed Computing, 145, 124–139.
Das, A. K., Zeadally, S., & He, D. (2018). Taxonomy and analysis of security protocols for Internet of Things. Future Generation Computer Systems, 89, 110–125.
Schjolberg, S., & Ghernaouti-Helie, S. (2011). A global treaty on cybersecurity and cybercrime. Cybercrime Law, 97.
Cox, D., & Fafchamps, M. (2007). Extended family and kinship networks: Economic insights and evolutionary directions. Handbook of development economics, 4, 3711–3784.
Waheed, N., He, X., Ikram, M., Usman, M., Hashmi, S. S., & Usman, M. (2020). Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures. ACM Computing Surveys (CSUR), 53(6), 1–37.
Rich, M.L. (2016). Machine learning, automated suspicion algorithms, and the fourth amendment. University of Pennsylvania Law Review, 871–929.
Om Kumar, C. U., & Sathia Bhama, P. R. (2022). “Proficient detection of flash attacks using a predictive strategy.” In Emerging research in computing, information, communication and applications (pp. 367–379). Singapore: Springer.
Om Kumar, C. U., & Sathia Bhama, P. R. (2023). “Efficacious intrusion detection on cloud using improved BES and HYBRID SKINET-EKNN.” In Emerging research in computing, information, communication and applications (pp. 61–72). Singapore: Springer.
Long, J., Luo, Y., Zhu, X., Luo, E., & Huang, M. (2020). Computation offloading through mobile vehicles in IoT-edge-cloud network. EURASIP Journal on Wireless Communications and Networking, 1, 1–21.
Keller, K. L. (2013). Building strong brands in a modern marketing communications environment. In The evolution of integrated marketing communications (pp. 73–90). Routledge.
Idrissi, I., Boukabous, M., Azizi, M., Moussaoui, O., & El Fadili, H. (2021). Toward a deep learning-based intrusion detection system for IoT against botnet attacks. IAES International Journal of Artificial Intelligence, 10(1), 110.
Derhab, A., Aldweesh, A., Emam, A. Z., & Khan, F. A. (2020). Intrusion detection system for internet of things based on temporal convolution neural network and efficient feature engineering. Wireless Communications and Mobile Computing, 2020, 1–16. https://doi.org/10.1155/2020/6689134
Elsayed, N., Zaghloul, Z.S., Azumah, S.W., and Li, C. (2021, August). Intrusion Detection System in Smart Home Network Using Bidirectional LSTM and Convolutional Neural Networks Hybrid Model. In 2021 IEEE international midwest symposium on circuits and systems (MWSCAS)IEEE, 55–58.
Alkahtani, H., & Aldhyani, T. H. H. (2021). Intrusion detection system to advance internet of things infrastructure-based deep learning algorithms. Complexity, 2021, 1–18. https://doi.org/10.1155/2021/5579851
Aljumah, A. (2021). IoT-based intrusion detection system using convolution neural networks. PeerJ Computer Science, 7, e721.
Wang, X., Yin, S., Li, H., Wang, J., & Teng, L. (2020). A network intrusion detection method based on deep multi-scale convolutional neural network. International Journal of Wireless Information Networks, 27(4), 503–517.
Kim, J., Kim, J., Kim, H., Shim, M., & Choi, E. (2020). CNN-based network intrusion detection against denial-of-service attacks. Electronics, 9(6), 916.
Li, Y., Xu, Y., Liu, Z., Hou, H., Zheng, Y., Xin, Y., Zhao, Y., & Cui, L. (2020). Robust detection for network intrusion of industrial IoT based on multi-CNN fusion. Measurement, 154, 107450.
Ruiz, N., Tavera, B., Abuzneid, A.S. (2020 Dec 16). Intrusion Detection System: The Use of Neural Network Packet Classification. In2020 international conference on computational science and computational intelligence (CSCI) IEEE, 1276–1281.
Le, K. H., Nguyen, M. H., Tran, T. D., & Tran, N. D. (2022). IMIDS: an intelligent intrusion detection system against cyber threats in IoT. Electronics, 11(4), 524.
Funding
No funding is provided for the preparation of manuscript.
Author information
Authors and Affiliations
Contributions
All authors have equal contributions in this work.
Corresponding author
Ethics declarations
Conflict of Interest
Authors Om Kumar C.U., Suguna Marappan, Bhavadharani Murugeshan, P. Mercy Rajaselvi Beaulah, declares that they have no conflict of interest.
Consent to Participate
All the authors involved have agreed to participate in this submitted article.
Consent to Publish
All the authors involved in this manuscript give full consent for publication of this submitted article.
Ethical Approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
The original version of this article was revised: In this article the author name P. Mercy Rajaselvi Beaulah was incorrectly written as V. Mercy Rajaselvi Beaulah. The original article has been corrected.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Om Kumar, C.U., Marappan, S., Murugeshan, B. et al. Intrusion Detection Model for IoT Using Recurrent Kernel Convolutional Neural Network. Wireless Pers Commun 129, 783–812 (2023). https://doi.org/10.1007/s11277-022-10155-9
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-10155-9