2363 998
Full Length Article
Journal of Cybersecurity and Information Management
Volume 8 , Issue 1, PP: 17-25 , 2021 | Cite this article as | XML | Html |PDF

Title

Modeling of Deep Learning based Intrusion Detection System in Internet of Things Environment

  Mohammad Hammoudeh 1 * ,   Saeed M. Aljaberi 2

1  Manchester Metropolitan University, UK
    (m.hammoudeh@mmu.ac.uk ;)

2  Artificial Intelligence department, Dubai Police, Dubai, UAE
    (eljabri@live.com)


Doi   :   https://doi.org/10.54216/JCIM.080102

Received: February 19, 2021 Accepted: July 29, 2021

Abstract :

The Internet of Things (IoT) has become a hot popular topic for building a smart environment. At the same time, security and privacy are treated as significant problems in the real-time IoT platform. Therefore, it is highly needed to design intrusion detection techniques for accomplishing security in IoT. With this motivation, this study designs a novel flower pollination algorithm (FPA) based feature selection with a gated recurrent unit (GRU) model, named FPAFS-GRU technique for intrusion detection in the IoT platform. The proposed FPAFS-GRU technique is mainly designed to determine the presence of intrusions in the network. The FPAFS-GRU technique involves the design of the FPAFS technique to choose an optimal subset of features from the networking data. Besides, a deep learning based GRU model is applied as a classification tool to identify the network intrusions. An extensive experimental analysis takes place on KDDCup 1999 dataset, and the results are investigated under different dimensions. The resultant simulation values demonstrated the betterment of the FPAFS-GRU technique with a higher detection rate of 0.9976.

Keywords :

IoT , Security , intrusion detection , Feature selection , Deep learning , KDDCup 1999 dataset

References :

[1]      Almomani, A., Alauthman, M., Albalas, F., Dorgham, O. and Obeidat, A., 2020. An online intrusion detection system to cloud computing based on NeuCube algorithms. In Cognitive Analytics: Concepts, Methodologies, Tools, and Applications (pp. 1042-1059). IGI global.

[2]      Besharati, E., Naderan, M. and Namjoo, E., 2019. LR-HIDS: logistic regression host-based intrusion detection system for cloud environments. Journal of Ambient Intelligence and Humanized Computing, 10(9), pp.3669-3692.

[3]      Mehibs, S.M. and Hashim, S.H., 2018. Proposed network intrusion detection system‎ in cloud environment based on back‎ propagation neural network. Journal of University of Babylon for Pure and Applied Sciences, 26(1), pp.29-40.

[4]      Singh, D.A.A.G., Priyadharshini, R. and Leavline, E.J., 2018. Cuckoo optimisation based intrusion detection system for cloud computing. International Journal of Computer Network and Information Security, 11(11), p.42.

[5]      Ghosh, P., Karmakar, A., Sharma, J. and Phadikar, S., 2019. CS-PSO based intrusion detection system in cloud environment. In Emerging Technologies in Data Mining and Information Security (pp. 261-269). Springer, Singapore.

[6]      Deshpande, P., Sharma, S.C., Peddoju, S.K. and Junaid, S., 2018. HIDS: A host based intrusion detection system for cloud computing environment. International Journal of System Assurance Engineering and Management, 9(3), pp.567-576.

[7]      Chiba, Z., Abghour, N., Moussaid, K., El Omri, A. and Rida, M., 2019. New anomaly network intrusion detection system in cloud environment based on optimized back propagation neural network using improved genetic algorithm. International Journal of Communication Networks and Information Security, 11(1), pp.61-84.

[8]      Manickam, M. and Rajagopalan, S.P., 2019. A hybrid multi-layer intrusion detection system in cloud. Cluster Computing, 22(2), pp.3961-3969.

[9]      Umamaheswari, K. and Sujatha, S., 2017. Impregnable Defence Architecture using Dynamic Correlation-based Graded Intrusion Detection System for Cloud. Defence Science Journal, 67(6).

[10]   Mahajan, V. and Peddoju, S.K., 2017, August. Deployment of intrusion detection system in cloud: a performance-based study. In 2017 IEEE Trustcom/BigDataSE/ICESS (pp. 1103-1108). IEEE.

[11]   Jelidi, M., Ghourabi, A. and Gasmi, K., 2019, April. A hybrid intrusion detection system for cloud computing environments. In 2019 International Conference on Computer and Information Sciences (ICCIS) (pp. 1-6). IEEE.

[12]   Balamurugan, V. and Saravanan, R., 2019. Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation. Cluster Computing, 22(6), pp.13027-13039.

[13]   Li, Z., Xu, H. and Liu, Y., 2017. A differential game model of intrusion detection system in cloud computing. International Journal of Distributed Sensor Networks, 13(1), p.1550147716687995.

[14]   Tummalapalli, S.R.K. and Chakravarthy, A.S.N., 2021. Intrusion detection system for cloud forensics using bayesian fuzzy clustering and optimization based SVNN. Evolutionary Intelligence, 14(2), pp.699-709.

[15]   Wen, L., 2021. Cloud Computing Intrusion Detection Technology Based on BP-NN. Wireless Personal Communications, pp.1-18.

[16]   Murugan, I., 2021. Supervised classifier approach for intrusion detection on KDD with optimal mapreduce framework model in cloud computing. Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science), 14(4), pp.1115-1125.

[17]   Singh, P. and Ranga, V., 2021. Attack and intrusion detection in cloud computing using an ensemble learning approach. International Journal of Information Technology, 13(2), pp.565-571. 

[18]   Krishnaveni, S., Sivamohan, S., Sridhar, S.S. and Prabakaran, S., 2021. Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing. Cluster Computing, pp.1-19. 

[19]   Sobin Soniya, S. and Maria Celestin Vigila, S., 2021. Feedback deer hunting optimization algorithm for intrusion detection in cloud based deep residual network. International Journal of Modeling, Simulation, and Scientific Computing, p.2150047.

[20]   Porkodi, V., Singh, A.R., Sait, A.R.W., Shankar, K., Yang, E., Seo, C. and Joshi, G.P., 2020. Resource provisioning for cyber–physical–social system in cloud-fog-edge computing using optimal flower pollination algorithm. IEEE Access, 8, pp.105311-105319.

[21]   Yan, B. and Han, G., 2018. LA-GRU: Building combined intrusion detection model based on imbalanced learning and gated recurrent unit neural network. security and communication networks, 2018.

 

[22]   https://www.unb.ca/cic/datasets/nsl.html


Cite this Article as :
Style #
MLA Mohammad Hammoudeh, Saeed M. Aljaberi. "Modeling of Deep Learning based Intrusion Detection System in Internet of Things Environment." Journal of Cybersecurity and Information Management, Vol. 8, No. 1, 2021 ,PP. 17-25 (Doi   :  https://doi.org/10.54216/JCIM.080102)
APA Mohammad Hammoudeh, Saeed M. Aljaberi. (2021). Modeling of Deep Learning based Intrusion Detection System in Internet of Things Environment. Journal of Journal of Cybersecurity and Information Management, 8 ( 1 ), 17-25 (Doi   :  https://doi.org/10.54216/JCIM.080102)
Chicago Mohammad Hammoudeh, Saeed M. Aljaberi. "Modeling of Deep Learning based Intrusion Detection System in Internet of Things Environment." Journal of Journal of Cybersecurity and Information Management, 8 no. 1 (2021): 17-25 (Doi   :  https://doi.org/10.54216/JCIM.080102)
Harvard Mohammad Hammoudeh, Saeed M. Aljaberi. (2021). Modeling of Deep Learning based Intrusion Detection System in Internet of Things Environment. Journal of Journal of Cybersecurity and Information Management, 8 ( 1 ), 17-25 (Doi   :  https://doi.org/10.54216/JCIM.080102)
Vancouver Mohammad Hammoudeh, Saeed M. Aljaberi. Modeling of Deep Learning based Intrusion Detection System in Internet of Things Environment. Journal of Journal of Cybersecurity and Information Management, (2021); 8 ( 1 ): 17-25 (Doi   :  https://doi.org/10.54216/JCIM.080102)
IEEE Mohammad Hammoudeh, Saeed M. Aljaberi, Modeling of Deep Learning based Intrusion Detection System in Internet of Things Environment, Journal of Journal of Cybersecurity and Information Management, Vol. 8 , No. 1 , (2021) : 17-25 (Doi   :  https://doi.org/10.54216/JCIM.080102)