ASPG Menu
search

American Scientific Publishing Group

verified Journal

International Journal of Wireless and Ad Hoc Communication

ISSN
Online: 2692-4056
Frequency

Continuous publication

Publication Model

Open access journal. All articles are freely available online with no APC.

International Journal of Wireless and Ad Hoc Communication
Full Length Article

Volume 8Issue 2PP: 67-80 • 2024

Improving Network Security using Tunicate Swarm Algorithm with Stacked Deep Learning Model on IoT Environment

Abedallah Z. Abualkishik 1* ,
Rasha Almajed 1
1American University in the Emirates, Dubai, UAE
* Corresponding Author.
Received: September 14, 2023 Revised: December 22, 2023 Accepted: May 22, 2024

Abstract

The Internet of Things (IoT) represents important security vulnerabilities, increasing difficulties in cyberattacks. Attackers employ these vulnerabilities to establish distributed denial-of-service (DDoS) attacks, compromising availability and causing financial losses to digital platforms. Newly, numerous Machine Learning (ML) and Deep Learning (DL) approaches have been presented for the identification of botnet attacks in IoT networks. By analyzing the patterns of communication and behavior of IoT devices, DL algorithms will be differentiated between malicious and normal activity, therefore supporting the earlier detection and avoidance of botnet attacks. This is essential to protect the integrity and security of IoT systems that can be increasingly vulnerable to botnet-driven attacks because of their limited security measures and often large-scale applications. In this aspect, this study designs an innovative tunicate swarm algorithm with stacked deep learning for botnet detection (TSASDL-BD) technique for IoT platforms. The purpose of the TSASDL-BD technique is to recognize the botnets and achieve maximum network security. In the TSASDL-BD technique, the TSA is applied for the effectual feature selection process, which aids in reducing the dimensionality problem. For botnet detection, the TSASDL-BD technique makes use of the stacked long short-term memory gated recurrent unit (SLSTM-GRU) model. Finally, the artificial humming algorithm (AHA) can be used for the optimal selection of the hyperparameter values of the SLSTM+GRU system. The outcome analysis of the TSASDL-BD method on the benchmark database takes place. The extensive outcomes stated that the TSASDL-BD approach gains maximum detection results over other algorithms with respect of different measures

Keywords

Internet of Things Intrusion Detection System Denial-of-Service Artificial Humming Algorithm Feature selection

References

[1]     AL-Akhras, M., Alshunaybir, A., Omar, H. and Alhazmi, S., 2023. Botnet attacks detection in IoT environment using machine learning techniques. International Journal of Data and Network Science, 7(4), pp.1683-1706.

[2]     Waqas, M., Kumar, K., Laghari, A.A., Saeed, U., Rind, M.M., Shaikh, A.A., Hussain, F., Rai, A. and Qazi, A.Q., 2022. Botnet attack detection in Internet of Things devices over cloud environment via machine learning. Concurrency and Computation: Practice and Experience, 34(4), p.e6662.

[3]     Rajit Nair, Unraveling the Decision-making Process Interpretable Deep Learning IDS for Transportation Network Security, Journal of Cybersecurity and Information Management , Vol. 12 , No. 2 , (2023) : 69-82 (Doi   :  https://doi.org/10.54216/JCIM.120205)

[4]     Habibi, O., Chemmakha, M. and Lazaar, M., 2023. Imbalanced tabular data modelization using CTGAN and machine learning to improve IoT Botnet attacks detection. Engineering Applications of Artificial Intelligence, 118, p.105669.

[5]     Alissa, K., Alyas, T., Zafar, K., Abbas, Q., Tabassum, N. and Sakib, S., 2022. Botnet attack detection in IoT using machine learning. Computational Intelligence and Neuroscience, 2022.

[6]     Sudhakar and Kumar, S., 2023, April. ABBDIoT: Anomaly-Based Botnet Detection Using Machine Learning Model in the Internet of Things Network. In International Conference on IoT, Intelligent Computing and Security: Select Proceedings of IICS 2021 (pp. 235-245). Singapore: Springer Nature Singapore.

[7]     Ali Kadhim Nsaif, Securing Pervasive Computing Networks: Enhancing Network Security via Network Virtualization in Wireless Communications Infrastructure, ournal of Intelligent Systems and Internet of Things, Vol. 12 , No. 2 , (2024) : 75-88 (Doi   :  https://doi.org/10.54216/JISIoT.120206)

[8]     Alani, M.M., 2022. BotStop: Packet-based efficient and explainable IoT botnet detection using machine learning. Computer Communications, 193, pp.53-62.

[9]     Li, Y., Zhu, M., Luo, X., Yin, L. and Fu, Y., 2023. A privacy-preserving botnet detection approach in a largescale cooperative IoT environment. Neural Computing and Applications, 35(19), pp.13725-13737.

[10]   Mahmoud M. Ismail, Ahmed A. Metwaly, Enhancing Wireless Ad-Hoc Network Security by Mitigating Distributed Denial-of-Service (DDoS) Attacks, International Journal of Wireless and Ad Hoc Communication , Vol. 8 , No. 2 , (2024) : 46-52 (Doi   :  https://doi.org/10.54216/IJWAC.080205)

[11]   Al-Fawa’reh, M., Abu-Khalaf, J., Szewczyk, P. and Kang, J.J., 2023. MalBoT-DRL: Malware Botnet Detection Using Deep Reinforcement Learning in IoT Networks. IEEE Internet of Things Journal.

[12]   Al-Sarem, M., Saeed, F., Alkhammash, E.H. and Alghamdi, N.S., 2021. An aggregated mutual information-based feature selection with machine learning methods for enhancing IoT botnet attack detection. Sensors, 22(1), p.185.

[13]   Soe, Y.N., Feng, Y., Santosa, P.I., Hartanto, R. and Sakurai, K., 2020. Machine learning-based IoT-botnet attack detection with sequential architecture. Sensors, 20(16), p.4372.

[14]   S. Alrayes, F., Maray, M., Gaddah, A., Yafoz, A., Alsini, R., Alghushairy, O., Mohsen, H. and Motwakel, A., 2022. Modeling of Botnet Detection Using Barnacles Mating Optimizer with Machine Learning Model for Internet of Things Environment. Electronics, 11(20), p.3411.

[15]   Almuqren, L., Alqahtani, H., Aljameel, S.S., Salama, A.S., Yaseen, I. and Alneil, A.A., 2023. Hybrid Metaheuristics with Machine Learning based Botnet Detection in Cloud-Assisted Internet of Things Environment. IEEE Access.

[16]   Abu Al-Haija, Q. and Al-Dala’ien, M.A., 2022. ELBA-IoT: an ensemble learning model for botnet attack detection in IoT networks. Journal of Sensor and Actuator Networks, 11(1), p.18.

[17]   Zaheer, A., Tahir, S., Almufareh, M.F. and Hamid, B., 2023, March. A Hybrid Model for Botnet Detection Using Machine Learning. In 2023 International Conference on Business Analytics for Technology and Security (ICBATS) (pp. 1-8). IEEE.

[18]   Pokhrel, S., Abbas, R. and Aryal, B., 2021. IoT security: botnet detection in IoT using machine learning. arXiv preprint arXiv:2104.02231.

[19]   Khan, S., Singh, Y.V., Yadav, P.S., Sharma, V., Lin, C.C. and Jung, K.H., 2023. An Intelligent Bio-Inspired Autonomous Surveillance System Using Underwater Sensor Networks. Sensors, 23(18), p.7839.

[20]   Muhammad, A.U., Yahaya, A.S., Kamal, S.M., Adam, J.M., Muhammad, W.I. and Elsafi, A., 2020, October. A hybrid deep stacked LSTM and GRU for water price prediction. In 2020 2nd International Conference on Computer and Information Sciences (ICCIS) (pp. 1-6). IEEE.

[21]   Ekinci, S., Izci, D. and Yilmaz, M., 2023. Simulated Annealing-aided Artificial Hummingbird Optimizer for Infinite Impulse Response System Identification. IEEE Access.

[22]   Alshahrani, S.M., Alrayes, F.S., Alqahtani, H., Alzahrani, J.S., Maray, M., Alazwari, S., Shamseldin, M.A. and Al Duhayyim, M., 2023. IoT-Cloud-Assisted Botnet Detection Using Rat Swarm Optimizer with Deep Learning. Computers, Materials & Continua, 74(2).

Cite This Article

Choose your preferred format

format_quote
Abualkishik, Abedallah Z., Almajed, Rasha. "Improving Network Security using Tunicate Swarm Algorithm with Stacked Deep Learning Model on IoT Environment." International Journal of Wireless and Ad Hoc Communication, vol. Volume 8, no. Issue 2, 2024, pp. 67-80. DOI: https://doi.org/10.54216/IJWAC.080207
Abualkishik, A., Almajed, R. (2024). Improving Network Security using Tunicate Swarm Algorithm with Stacked Deep Learning Model on IoT Environment. International Journal of Wireless and Ad Hoc Communication, Volume 8(Issue 2), 67-80. DOI: https://doi.org/10.54216/IJWAC.080207
Abualkishik, Abedallah Z., Almajed, Rasha. "Improving Network Security using Tunicate Swarm Algorithm with Stacked Deep Learning Model on IoT Environment." International Journal of Wireless and Ad Hoc Communication Volume 8, no. Issue 2 (2024): 67-80. DOI: https://doi.org/10.54216/IJWAC.080207
Abualkishik, A., Almajed, R. (2024) 'Improving Network Security using Tunicate Swarm Algorithm with Stacked Deep Learning Model on IoT Environment', International Journal of Wireless and Ad Hoc Communication, Volume 8(Issue 2), pp. 67-80. DOI: https://doi.org/10.54216/IJWAC.080207
Abualkishik A, Almajed R. Improving Network Security using Tunicate Swarm Algorithm with Stacked Deep Learning Model on IoT Environment. International Journal of Wireless and Ad Hoc Communication. 2024;Volume 8(Issue 2):67-80. DOI: https://doi.org/10.54216/IJWAC.080207
A. Abualkishik, R. Almajed, "Improving Network Security using Tunicate Swarm Algorithm with Stacked Deep Learning Model on IoT Environment," International Journal of Wireless and Ad Hoc Communication, vol. Volume 8, no. Issue 2, pp. 67-80, 2024. DOI: https://doi.org/10.54216/IJWAC.080207
Digital Archive Ready