Next Article in Journal
Young Households’ Diminishing Access to Homeownership Attainment in Europe
Next Article in Special Issue
Digital Transformation to Help Carbon Neutrality and Green Sustainable Development Based on the Metaverse
Previous Article in Journal
Privacy-Preserving Blockchain Framework for Supply Chain Management: Perceptive Craving Game Search Optimization (PCGSO)
Previous Article in Special Issue
Research on Acquisition Performance of FFT Algorithm for Low-Frequency Spread-Spectrum Signals Using Acoustic Sensors
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Intrusion Detection Using Chaotic Poor and Rich Optimization with Deep Learning Model for Smart City Environment

by
Fatma S. Alrayes
1,
Mashael M. Asiri
2,
Mashael Maashi
3,
Ahmed S. Salama
4,
Manar Ahmed Hamza
5,*,
Sara Saadeldeen Ibrahim
5,
Abu Sarwar Zamani
5 and
Mohamed Ibrahim Alsaid
5
1
Department of Information Systems, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
2
Department of Computer Science, College of Science & Art at Mahayil, King Khalid University, Abha 62529, Saudi Arabia
3
Department of Software Engineering, College of Computer and Information Sciences, King Saud University, P.O. Box 103786, Riyadh 11671, Saudi Arabia
4
Department of Electrical Engineering, Faculty of Engineering & Technology, Future University in Egypt, New Cairo 11845, Egypt
5
Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, AlKharj 16278, Saudi Arabia
*
Author to whom correspondence should be addressed.
Sustainability 2023, 15(8), 6902; https://doi.org/10.3390/su15086902
Submission received: 4 February 2023 / Revised: 27 February 2023 / Accepted: 2 March 2023 / Published: 19 April 2023

Abstract

:
Artificial intelligence (AI) techniques play a vital role in the evolving growth and rapid development of smart cities. To develop a smart environment, enhancements to the execution, sustainability, and security of traditional mechanisms become mandatory. Intrusion detection systems (IDS) can be considered an effective solutions to achieve security in the smart environment. This article introduces intrusion detection using chaotic poor and rich optimization with a deep learning model (IDCPRO-DLM) for ubiquitous and smart atmospheres. The IDCPRO-DLM model follows preprocessing, feature selection, and classification stages. At the initial stage, the Z-score data normalization system is exploited to scale the input data. Additionally, the IDCPRO-DLM method designs a chaotic poor and rich optimization algorithm-based feature selection (CPROA-FS) approach for selecting feature subsets. For intrusion detection, butterfly optimization algorithm (BOA) with a deep sparse autoencoder (DSAE) is used. The simulation analysis of the IDCPRO-DLM technique is studied on the benchmark CICIDS dataset and the comparison results show the better performance of the IDCPRO-DLM algorithm over recent state-of-the-art approaches with a maximum accuracy of 98.53%.

1. Introduction

Owing to the evolving advancement and fast progression in artificial technology, the ubiquitous computing method is a vital part of everyday life [1]. The common aim of the ubiquitous method is a too-quick tight combination of its coexisting ambience, human beings, and information. To devise smart ambiences, an enhancement to security, performances, and sustainability of conventional policies was essential [2]. As a community, computation resources must be treated as finite and precious, utilized if needed, and as effectually as possible. The Internet of Things (IoT) was based on interconnected smart gadgets, and different services were used to intergrade one network [3]. This allows the smart devices to collect delicate data and executes important functions, and these gadgets link and interact with each other at the highest speed and make decisions based on the indicator information. The IoT atmospheres employ cloud service as the back-end top for processing information and maintaining remote control. Client users leverage web services or mobile applications to access information and control their gadgets. The IoT structures employ an enormous quantity of sensor nodes to extract significant data, and it can be scrutinized using the artificial intelligence (AI) method [4,5].
An IDS refers to a security methodology which majorly operates in the IoT network layer. An IDS positioned for an IoT network has the capability in the analyses data packets to produce responses realistically, examining data packets in dissimilar layers of IoT networks with dissimilar protocol stacks, and adapting to several methods in IoT systems [5,6]. An IDS can be advanced for IoT-related smart settings that need to operate in extreme circumstances of higher-volume data processing, less processing capability, and quicker response. Therefore, conventional IDS does not suit the IoT network [7]. The security of IoT is a continuous and serious issue; thus, the progression of respective mitigating techniques and understanding of security vulnerabilities of IoT mechanisms is required. Machine learning (ML) techniques are widely used in the detection of several types of assaults, and they can support the network administrator in taking corresponding initiatives for preventing intrusion [8]. However, several traditional ML approaches go to shallow learning and often highlight feature selection and engineering; it cannot proficiently solve the vast intrusion data classifying issues that appear in face of real-time network applications. Of the speedy advancement of the dataset, numerous classifying approaches may lead to diminished performance [9]. Along with that, shallow learning cannot be suitable for predicting the need for high-dimension learning with huge data and intellectual analysis. Conversely, deep learners may have a possibility to derive superior representation from the data for generating better methods. Subsequently, IDS has encountered incredible progression after dropping into an unhurried period [10].
This article presents intrusion detection using chaotic poor and rich optimization with a deep learning model (IDCPRO-DLM) for ubiquitous and smart environments. The presented IDCPRO-DLM model exploits the Z-score data normalization approach to scale the input data. In addition, the IDCPRO-DLM model designs a chaotic poor and rich optimization algorithm-related feature selection (CPROA-FS) approach for electing feature subsets. Moreover, the butterfly optimization algorithm (BOA) with a deep sparse autoencoder (DSAE) classification model is utilized to classify intrusions. The simulation analysis of the IDCPRO-DLM approach was tested employing a series of simulations.
The rest of the paper is organized as follows. Section 2 provides the related works and Section 3 offers the proposed model. Then, Section 4 presents the result analysis and Section 5 concludes the paper.

2. Related Works

Subbarayalu et al. [11] modelled the operation behaviors of IoT events with timed AC and developed a new hybrid NIDS. A web server is incorporated into IoT devices for remote accessibility, and constraint application protocol can be applied in intra and inter -smart device transmission. In [12], the authors presented various concepts for the security of wireless sensors in a smart environment. The suggested technique is dependent on electronic gadgets; the IDS minimizes the computation function of the sensor, thus increasing the efficacy. Similarly, the IDS presents the idea of a feedback signal and “trust table” applied for triggering the isolation and detection mechanisms in case of attack. Manimurugan et al. [13] projected a DL-related DBN system for IDS. Regarding anomaly detection and attacks, the CICIDS 2017 data are exploited for the assessment results of the presented method.
Efstathopoulos et al. [14] presented anomaly-based IDSs particularly developed for SG utilizing operation datasets from a real-time power plant. Especially important, various ML and DL methods have been deployed, presenting novel parameters and feature representations in a comparative analysis. Razib et al. [15] developed a DL-driven software defined networking (SDN)-assisted IDS to fight emergent cyberattacks in IoT. The suggested algorithm is able to counter a remarkable class of less frequently and commonly occurring cyberattacks in IoT communication. In [16], the authors determine exactly how supervised ML algorithms (RF, DT, KNN, and ridge classifiers) and DRNN are employed for developing a robust IDS in the IoMT environments to forecast and classify unpredicted cyberattacks. Normalization and preprocessing of network datasets are implemented. Then, the researchers optimized the feature using a bio-inspired PSO approach.
Moradi et al. [17] designed the intelligent IDS (I-IDS) using the ML mechanism so that the attack is recognized in the IoT system. The algorithm is constructed based on the malicious and normal assaults on the information that was produced in IoT smart environments. For simulating these models, a testbed is constructed whereby a node MCU, a wireless router, and a DHT11 sensor have been employed. An adversarial or attacker system is constructed to implement sniffing and poisoning attacks via a laptop system. The node captures the sensor value and transfers the information to the ThinkSpeak framework in the normal phase through a wireless gateway in addition to the assault stage; then, the malicious attackers interpret the information, and change it whereas transferring from nodes to the ThinkSpeak server.
In [18], the authors establish a novel extraction feature and selective manners for the IDS method utilizing the benefits of SI techniques. The authors propose an extraction feature process based on CNN. Then, the authors propose an alternative selective feature (FS) system utilizing the newly established SI technique, Aquila optimizer (AQU). Fatani et al. [19] present an effective AI-based process for IDS in IoT methods. The authors present an extraction feature approach utilizing the CNNs for extracting significant features. In addition, the authors establish a novel selective feature model utilizing a novel different of the transient search optimizer (TSO) technique named TSODE, utilizing the operators of the differential evolution (DE) technique.
D’hooge et al.’s [20] purposes for demonstrating that strong common performance could not typically follow a strong classifier on the current IDS databases. Binary classification approaches in a range of algorithmic families can be trained on the attack classes of CSE-CIC-IDS2018. Talaei Khoei and Kaabouch [21] relates the efficacy of supervised and unsupervised learning approaches in detecting cybersecurity. The supervised approaches are classification and regression decision tree, gaussian naïve bayes, LR, light gradient boosting, C-SVM, and Alex neural network. The unsupervised approaches are PCA, variational autoencoder (VAE), and K-means.

3. The Proposed Model

In this article, a novel IDCRPO-DLM methodology was developed for the recognition and classification of intrusion in smart environments. The presented IDCRPO-DLM methodology incorporates Z-score normalization, CRPOA-based feature subset selection, DSAE-based intrusion classification, and BOA-based hyperparameter tuning. The overall process is revealed in Figure 1.

3.1. Data Pre-Processing

Primarily, the Z-score data normalization approach is exploited to scale the input data. It is a predictable normal and standard technique that denotes the sum of standard deviations (SD), and original data points were below or above the population mean. It possibly lies between 3 and + 3 . This normalization of the dataset to mentioned scale converts all datasets with distinct scales to the default scale.
Z score = x μ σ  
where x indicates the value of a particular instance, μ represents the mean and σ denotes SD.

3.2. Process Involved in CPROA-FS Technique

As soon as the input dataset is preprocessed, the IDCPRO-DLM model developed a CPROA-FS approach to elect feature subsets. Generally, the CPROA integrates the concepts of classical PROA with the chaotic map. PROA is a new bio-inspired meta-heuristic algorithm dependent upon the behavior of the poor and the rich. Since it suffers from low convergence speed and premature convergence, and easily traps in the local optimum, the CPROA is derived through the use of chaotic-based population initialization.
The PROA is reliant primarily on people’s wealth behaviors in society [22]. In general, the grouping of persons according to their financial condition includes the two most important groups. The initial one consist of the poor economical class persons where wealth is lower than the average. The last one is richer economic class persons where wealth exceeds the average. In this study, the solution in poor populations shifts the way of globally optimal solutions in searching regions by learning from rich solutions in the population.
Now, each individual that exists in the population is determined as a binary vector and its length corresponds to the distinct feature number that exists in the input dataset. Where χ = η 1 ,   η 2 ,   η 3 ,   ,   η n , n refers to different features and every position of the solution maintains a binary value. The solution candidate encompasses poor and rich economical solutions. ‘N’ refers to population size. An ‘N’ solution is randomly produced with random numbers within zero and one. Next, the digitization method is applied to all the locations of the solution to transform the real value into binary values:
χ i , j = 1 ,   χ i , j > rand 0 ,   otherwise  
In Equation (13), rand indicates an arbitrary number between zero and one. The solution candidate that exists in the population is sorted based on the objective function. The bottommost and topmost people in the population indicate poor and rich economic sets of persons. The major population of the PROA can be demonstrated in Equation (3).
P O P Main = P O P rich + P O P poor  
People in a rich economical class shift in the way of improving the economical class gaps by observing the poor economical class. The poor people shift in the direction of decreasing the economical class by learning from the individuals in the rich class to increase their financial status. The features of rich and poor people are exploited for producing novel solutions. The motion of the rich solution is denoted by the following equation.
χ new = χ rich ,   i , j old + α * χ rich , i , j old | χ poor , best , j old
The motion of the poor solution is represented as follows.
χ poor , i , j new = χ poor , i , j old + α * χ rich , best , j 0 + χ rich , mean , j 0 + χ rich , worst , j 0 3 χ poor , i , j 0  
In this study, the CPROA is derived through the use of a chaotic map into the PROA to enhance the arbitrary nature (diversity) to arrive at a global minimum and escape from trapping to the local minimum which results in fast convergence. The primary point of the chaotic map is an arbitrary number in [0, 1]. The CPROA-FS approach was used to identify the optimum feature subset that enhances the classification procedure. The solution vector assessments were unchangeable and ranged from zero to one. The fitness value of the solution can be represented in a binary form. It is given below.
f θ = α E + 1 α i   θ i N  
where f θ displays FF to vector θ sized N with 1/0 units that elaborate unelected or elected feature subsets, N denotes the total quantity of features. E means the classifier error, and α defines a constant tradeoff balancing from classifier error to quantity of selected feature sets. Herein, a classifying procedure becomes the chief objective and α   =   1 .

3.3. DSAE-Based Classification Model

To detect and classify intrusions, the DSAE technique is applied. AE was an unsupervised feature learning NN which comprises hidden states that signify learned features, an input layer that represents input, and an output layer with a similar parameter to the input layer that signifies reconstruction term [23]. The hidden and output layer forms the decoding network that is accountable for the reconstruction of the original input in the learned hidden representation code, while the hidden and input layers in the encoding network are accountable for converting the original input into hidden representation code. For every x d   input vector from dataset   { x d } d = 1 M , the x ^ d reconstructed vector and the h d representation vector are determined in Equations (7) and (8), correspondingly, whereby f denotes the active function, W 1 and W 2 represent the weight matrixes, and b 1 and b 2 indicate the bias vector. In the SAE algorithm, the sigmoid function is utilized. The L ( x d ,   x ^ d ) reconstructed error among x d and x ^ d is determined in Equation (10). The entire cost function of M instances is determined by Equation (10). The initial term of (10) indicates the reconstructed error of the entire dataset, and the next term is the regularized weight penalty that prevents overfitting by constraining the weight magnitude. The weight decay variable can be represented as λ , the layer count of the network is denoted by n l , the neuron count in l layer is indicated as s l , and the weight connecting vectors among i - t h neurons in t h e   l + 1 layer and j - th neuron in the l   layer is referred to W j i l :
h d = f W 1 x d + b 1
x ^ d = f W 2 h d + b 2
L x d , x ^ d = 1 2 x d x ^ d 2  
J W ,   b = [ 1 M d = 1 M L x d , x ^ d ] + λ 2 l = 1 n l 1 i = 1 s l j = 1 s l + 1 ( W j i l ) 2    
However, the AE simply copies the input data even though the learned feature representation might perfectly rebuild the original input; the feature is not representative of classification and is redundant to a certain extent. In addition, the DSAE has a greater prospect to further learn representative and abstract features of the input than that of A [23]. Equation (11) illustrates the total cost function of SAE, whereby J W ,   b as previously shown in Equation (10), and the next is sparsity penalty term, whereby ρ ^ g = 1 , 2 e denotes the average activation value of g hidden unit that is determined in Equation (12); ρ refers to an artificially provided smaller value named the sparsity variable, and parameter β indicates the sparsity penalty term utilized for controlling the relative significance among the penalty and reconstructed terms.
J sparse W ,   b = J W ,   b + β g = 1 e ρ log ρ ρ ^ g + 1 ρ log 1 ρ 1 ρ ^ g  
ρ ^ g = 1 M d = 1 M h g d  
The DSAE aim is to future learn sparse and representative features that could remain and extract further data from the input rather than copying the input by minimalizing the cost function J s p a r s e W ,   b through the backpropagation (BP) model. The optimum set of variables W 1 ,   W 2 ,   b 1 , and b 2 are simultaneously learned through the reduction technique that is named the training model of DSAE.

3.4. Hyperparameter Tuning Using BOA

For optimal modification of the hyperparameters related to the DSAE method, the BOA was applied to it. The BOA is a nature-based inspired optimization technique to resolve optimization problems. It depends on the mating and food-searching behaviors of butterflies (BF) [24]. The basic idea was to utilize the foraging approach of BF in nature which depends on a smaller sensor to determine the mating partner or nectar position. Power exponent (a), stimulus intensity (I), and sensory modality (c) are the three significant terms utilized for modelling the idea of processing and sensing the modality in the foraging process. It should be noted that sensory represents the energy form, whereby modality represents the raw input utilized by the sensor. In this study, the modality covering the fragrance (f) is expressed by a function of physical intensity in the following:
f = c I a  
In Equation (13), the perceived magnitude of fragrances was indicated as f , the sensory modality is indicated as c , the stimulus intensity is characterized by I , and the power exponent that depends on the modality that is accountable for various levels of absorption is denoted as a . The parameters’ a and c values are lies within the interval of zero and one.
The initialization, iteration, and final phases are the three stages of BOA. Initially, the algorithm determines its solution space and the objective function. An initialized population of BF is created where the position is generated randomly in the solution space. Next, several iterations are implemented. Each BF in the solution space moves towards a novel position with the evaluated fitness value. Following, the BF fragrance can be produced at the position using Equation (14). The iteration state is repeated until the ending condition is satisfied. At last, the algorithm output of the optimal solution obtained the optimal fitness value.
Local and global searching stages are the two major strategies utilized in this study. In a global search, the BF moves towards the solution or fittest BF:
x i t + 1 = x i t + r 2 × g * x i t × f i  
In Equation (15), the vector of solution for i - t h BFs in t   iteration is represented as x i t , the finest solution found in the existing iteration can be denoted by the term g * , and the fragrance of i-th BFs are denoted as f i and r , which indicate a random integer between zero and one. Alternatively, the local search technique is modeled through:
x i t + 1 = x i t + ( r 2 × x j t x k t ) × f i  
In Equation (15), x j t and x k t indicate j - th and k - th BFs from a solution space. The pseudo-code of the BOA has been shown in Algorithm 1. The FF roles are an important part in the BOA system. It computes a positive digit to signify the development of candidate results. The classifier rate of rates has been assumed as FF. The rich solution contains a lower fitness value.
fitness   χ i = Classifier Error Rate χ i = number of misclassified samples Total number of samples * 100  
Algorithm 1: Pseudo-code of BOA
Initialization of c sensor modality, a power exponent, and (p) switching probability
Determine the fitness function f x ,   x = x 1 ,   x 2 ,   , x dim ,   dim   = dimension count
Produce the initialized population of n BFs
while (end condition is not satisfied) do
for (every b f in the population) do
Evaluate fragrance for b f by utilizing Equation (13)
end for
Discover the optimal b f
for (all the b f in the population) do
Produce a r number randomly from 0 ,   1
if r < p then
Move to the finest BF by utilizing Equation (14)
else
Randomly move by utilizing Equation (15)
end if
end for
Upgrade the value of a
end while
Output the finest solution

4. Performance Evaluation

The proposed model is simulated using Python 3.6.5 tool on PC i5-8600k, GeForce 1050Ti 4 GB, 16 GB RAM, 250 GB SSD, and 1 TB HDD. The performance validation of the IDCPRO-DLM model was performed using the CICIDS2017 dataset (https://www.unb.ca/cic/datasets/ids-2017.html (accessed on 18 December 2022)). It is a network traffic dataset comprising a collection of benign and malicious traffic for network intrusion detection and traffic analysis. The CICIDS2017 dataset is gathered from a realistic network environment that includes traffic records from different protocols, such as TCP, UDP, ICMP, and HTTP. The dataset also includes network traffic records that have been captured from IoT devices, such as smart homes, wearable devices, and industrial control systems. It comprises data samples under diverse attacks such as Brute force attacks, DDoS attacks, normal attacks, botnet attacks, PortScan attacks, and infiltration attacks. The results are examined under 70% of training data and 30% of testing data.
Table 1 and Figure 2 report the classifier outcomes provided by the IDCPRO-DLM technique on training data. The outcomes implied that the IDCPRO-DLM approach has effectually classified the different kinds of attacks. For instance, the IDCPRO-DLM model has recognized normal attacks with p r e c n of 98.65%, r e c a l of 98.86%, s p e c y of 98.84%, a c c u y of 98.07%, and F s c o r e of 99.18%. Simultaneously, the IDCPRO-DLM model has recognized botnet attacks with p r e c n of 98.54%, r e c a l of 98.42%, s p e c y of 99.26%, a c c u y of 97.94%, and F s c o r e of 98.08%. Concurrently, the IDCPRO-DLM model has categorized DDoS attacks with p r e c n of 99.17%, r e c a l of 98.78%, s p e c y of 98.18%, a c c u y of 98.41%, and F s c o r e of 98.84%. Moreover, the IDCPRO-DLM model has classified PortScan attacks with p r e c n of 98.36%, r e c a l of 98.54%, s p e c y of 98.31%, a c c u y of 98.55%, and F s c o r e of 98.11%.
Table 2 and Figure 3 show the classification outcomes given by the IDCPRO-DLM methodology on the testing dataset. The outcome indicates that the IDCPRO-DLM technique has effectively considered the diverse types of attacks. For example, the IDCPRO-DLM approach has identified normal attacks with p r e c n of 98.02%, r e c a l of 98.51%, s p e c y of 98.64%, a c c u y of 97.97%, and F s c o r e of 98.32%. At the same time, the IDCPRO-DLM method has identified botnet attacks with p r e c n of 98.68%, r e c a l of 99.08%, s p e c y of 99.17%, a c c u y of 98.90%, and F s c o r e of 98.56%. Simultaneously, the IDCPRO-DLM approach has classified DDoS attacks with p r e c n of 98.44%, r e c a l of 99.28%, s p e c y of 98.54%, a c c u y of 97.32%, and F s c o r e of 99.26%. Furthermore, the IDCPRO-DLM method has categorized PortScan attacks with p r e c n of 99.15%, r e c a l of 98.67%, s p e c y of 98.86%, a c c u y of 98.91%, and F s c o r e of 98.41%.
The TACY and VACY accomplished via the IDCPRO-DLM approach to the testing database are demonstrated in Figure 4. The experimental result showed that the IDCPRO-DLM methodology has obtained higher values of TACY and VACY. Particularly of note, the VACY is higher than the TACY.
The TLOS and VLOS accomplished via the IDCPRO-DLM methodology on testing data are depicted in Figure 5. The simulation result shows the IDCPRO-DLM method has obtained lesser values of TLOS and VLOS. To be specific, the VLOS is lower than the TLOS.
An evident precision–recall analysis of the IDCPRO-DLM system on testing data is demonstrated in Figure 6. The figure demonstrates that the IDCPRO-DLM technique has resulted in improved values of precision–recall values in each class.
A comprehensive ROC analysis of the IDCPRO-DLM methodology on testing data is demonstrated in Figure 7. The result indicates that the IDCPRO-DLM system has exhibited its capability in classifying dissimilar classes on testing datasets.
To ensure the enhanced performance of the IDCPRO-DLM algorithm, a detailed comparative analysis is made with recent approaches [25] in Table 3. Figure 8 investigates a comparative analysis of the IDCPRO-DLM method with other techniques for p r e c n and r e c a l . The outcomes indicated that the IDCPRO-DLM method has shown increased values of p r e c n and r e c a l . For p r e c n , the IDCPRO-DLM method has rendered a higher p r e c n of 98.64%, whereas the DBN, SVM, RNN, SNN, FFNN, and MDLIDS-SSE models have reported a lower p r e c n of 97.80%, 97.05%, 96.96%, 98.14%, 96.26%, and 97.24%, respectively. Additionally, for r e c a l , the IDCPRO-DLM model has reached a maximum r e c a l of 98.82%, whereas the DBN, SVM, RNN, SNN, FFNN, and MDLIDS-SSE models have attained a minimum r e c a l of 96.72%, 96.46%, 97.07%, 97.18%, 96.58%, and 97.91%, respectively.
Figure 9 examines a result analysis of the IDCPRO-DLM with existing methods in terms of s p e c y , F s c o r e , and a c c u y . The result indicates that the IDCPRO-DLM approach has demonstrated higher values of s p e c y , F s c o r e , and a c c u y . Concerning s p e c y , the IDCPRO-DLM technique has offered an increased p r e c n of 98.74%, while the DBN, SVM, RNN, SNN, FFNN, and MDLIDS-SSE methodologies have exhibited lower s p e c y of 96.29%, 97.29%, 98.41%, 96.51%, 97.85%, and 98.26%, correspondingly. As well, concerning r e c a l , the IDCPRO-DLM approach has reached a maximal a c c u y of 98.53%, while the DBN, SVM, RNN, SNN, FFNN, and MDLIDS-SSE approaches have accomplished minimal a c c u y of 98%, 97.46%, 96.73%, 97.02%, 96.35%, and 96.91%, correspondingly. Thus, the experimental outcomes showed that the IDCPRO-DLM method has shown maximal performance over other models.

5. Conclusions

In this article, a novel IDCRPO-DLM approach was devised for the recognition and classification of intrusion in smart environments. The presented IDCRPO-DLM approach incorporates Z-score normalization, CRPOA-based feature subset selection, DSAE-based intrusion classification, and BOA-based hyperparameter tuning. For optimal modification of hyperparameters related to the DSAE method, the BOA was carried out on, which improved the overall classification performance. The simulation analysis of the IDCPRO-DLM approach was tested utilizing the benchmark CICIDS2017 dataset and the comparative results highlighted the betterment of the IDCPRO-DLM algorithm over recent systems with maximum accuracy of 98.53%. In the future, the performance of the IDCPRO-DLM model can be expanded to the design of outlier detection models. In addition, the proposed model can be extended to the detection of Android malware attacks.

Author Contributions

Conceptualization, F.S.A.; Methodology, M.M.A.; Software, A.S.S. and A.S.Z.; Validation, F.S.A., A.S.S. and M.A.H.; Formal analysis, M.I.A.; Investigation, A.S.Z.; Resources, M.M.; Data curation, A.S.S.; Writing—original draft, F.S.A., M.M.A., M.M., M.A.H., S.S.I. and M.I.A.; Writing—review & editing, F.S.A., M.M., A.S.S., S.S.I., A.S.Z. and M.I.A.; Visualization, M.A.H.; Supervision, M.M.A.; Project administration, M.A.H.; Funding acquisition, F.S.A., M.M.A. and M.A.H. All authors have read and agreed to the published version of the manuscript.

Funding

The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under grant number (RGP 2/65/44). Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2023R319), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia. Research Supporting Project number (RSP2023R787), King Saud University, Riyadh, Saudi Arabia. This study is supported via funding from Prince Sattam bin Abdulaziz University project number (PSAU/2023/R/1444).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing not applicable to this article as no datasets were generated during the current study.

Conflicts of Interest

The authors declare that they have no conflict of interest. The manuscript was written through contributions of all authors. All authors have given approval of the final version of the manuscript.

References

  1. Monteiro, A.C.B.; França, R.P.; Arthur, R.; Iano, Y. A Look at Machine Learning in the Modern Age of Sustainable Future Secured Smart Cities. In Data-Driven Mining, Learning and Analytics for Secured Smart Cities; Springer: Cham, Switzerland, 2021; pp. 359–383. [Google Scholar]
  2. Kumar, P.; Gupta, G.P.; Tripathi, R. TP2SF: A Trustworthy Privacy-Preserving Secured Framework for sustainable smart cities by leveraging blockchain and machine learning. J. Syst. Arch. 2020, 115, 101954. [Google Scholar] [CrossRef]
  3. Tyagi, A.K. Building a smart and sustainable environment using internet of things. In Proceedings of the International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM), Jaipur, India, 26–28 February 2019. [Google Scholar]
  4. Ahad, M.A.; Paiva, S.; Tripathi, G.; Feroz, N. Enabling technologies and sustainable smart cities. Sustain. Cities Soc. 2020, 61, 102301. [Google Scholar] [CrossRef]
  5. Vijaykumar, J.; Rajkumar, P.; Kandan, S.R. WITHDRAWN: Fog computing based secured mobile cloud for cumulative integrity in smart environment and Internet of Things. Mater. Today Proc. 2021. [Google Scholar] [CrossRef]
  6. Jiang, S.; Zhao, J.; Xu, X. SLGBM: An intrusion detection mechanism for wireless sensor networks in smart environments. IEEE Access 2020, 8, 169548–169558. [Google Scholar] [CrossRef]
  7. Elrawy, M.F.; Awad, A.I.; Hamed, H.F. Intrusion detection systems for IoT-based smart environments: A survey. J. Cloud Comput. 2018, 7, 21. [Google Scholar] [CrossRef]
  8. Alsoufi, M.A.; Razak, S.; Siraj, M.; Nafea, I.; Ghaleb, F.A.; Saeed, F.; Nasser, M. Anomaly-Based Intrusion Detection Systems in IoT Using Deep Learning: A Systematic Literature Review. Appl. Sci. 2021, 11, 8383. [Google Scholar] [CrossRef]
  9. Keserwani, P.K.; Govil, M.C.; Pilli, E.S.; Govil, P. A smart anomaly-based intrusion detection system for the Internet of Things (IoT) network using GWO–PSO–RF model. J. Reliab. Intell. Environ. 2021, 7, 3–21. [Google Scholar] [CrossRef]
  10. Ramaiah, M.; Chandrasekaran, V.; Ravi, V.; Kumar, N. An intrusion detection system using optimized deep neural network architecture. Trans. Emerg. Telecommun. Technol. 2021, 32, e4221. [Google Scholar] [CrossRef]
  11. Subbarayalu, V.; Surendiran, B.; Arun Raj Kumar, P. Hybrid network intrusion detection system for smart environments based on internet of things. Comput. J. 2019, 62, 1822–1839. [Google Scholar] [CrossRef]
  12. Boni, K.R.C.; Xu, L.; Chen, Z.; Baddoo, T.D. A Security Concept Based on Scaler Distribution of a Novel Intrusion Detection Device for Wireless Sensor Networks in a Smart Environment. Sensors 2020, 20, 4717. [Google Scholar] [CrossRef]
  13. Manimurugan, S.; Al-Mutairi, S.; Aborokbah, M.M.; Chilamkurti, N.; Ganesan, S.; Patan, R. Effective Attack Detection in Internet of Medical Things Smart Environment Using a Deep Belief Neural Network. IEEE Access 2020, 8, 77396–77404. [Google Scholar] [CrossRef]
  14. Efstathopoulos, G.; Grammatikis, P.R.; Sarigiannidis, P.; Argyriou, V.; Sarigiannidis, A.; Stamatakis, K.; Angelopoulos, M.K.; Athanasopoulos, S.K. Operational data based intrusion detection system for smart grid. In Proceedings of the 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Limassol, Cyprus, 11–13 September 2019; pp. 1–6. [Google Scholar]
  15. Al Razib, M.; Javeed, D.; Khan, M.T.; Alkanhel, R.; Muthanna, M.S.A. Cyber Threats Detection in Smart Environments Using SDN-Enabled DNN-LSTM Hybrid Framework. IEEE Access 2022, 10, 53015–53026. [Google Scholar] [CrossRef]
  16. Saheed, Y.K.; Arowolo, M.O. Efficient Cyber Attack Detection on the Internet of Medical Things-Smart Environment Based on Deep Recurrent Neural Network and Machine Learning Algorithms. IEEE Access 2021, 9, 161546–161554. [Google Scholar] [CrossRef]
  17. Moradi, M.; Moradkhani, M.; Tavakoli, M.B. Enhancing Security on Social Networks with IoT-based Blockchain Hierarchical Structures with Markov Chain. J. Adv. Comput. Res. 2022, 13, 1–26. [Google Scholar]
  18. Fatani, A.; Dahou, A.; Al-Qaness, M.A.A.; Lu, S.; Elaziz, M.A. Advanced Feature Extraction and Selection Approach Using Deep Learning and Aquila Optimizer for IoT Intrusion Detection System. Sensors 2021, 22, 140. [Google Scholar] [CrossRef]
  19. Fatani, A.; Elaziz, M.A.; Dahou, A.; Al-Qaness, M.A.A.; Lu, S. IoT Intrusion Detection System Using Deep Learning and Enhanced Transient Search Optimization. IEEE Access 2021, 9, 123448–123464. [Google Scholar] [CrossRef]
  20. D’hooge, L.; Verkerken, M.; Wauters, T.; De Turck, F.; Volckaert, B. Investigating Generalized Performance of Data-Constrained Supervised Machine Learning Models on Novel, Related Samples in Intrusion Detection. Sensors 2023, 23, 1846. [Google Scholar] [CrossRef]
  21. Khoei, T.T.; Kaabouch, N. A Comparative Analysis of Supervised and Unsupervised Models for Detecting Attacks on the Intrusion Detection Systems. Information 2023, 14, 103. [Google Scholar] [CrossRef]
  22. Moosavi, S.H.S.; Bardsiri, V.K. Poor and rich optimization algorithm: A new human-based and multi populations algorithm. Eng. Appl. Artif. Intell. 2019, 86, 165–181. [Google Scholar] [CrossRef]
  23. Sun, W.; Shao, S.; Zhao, R.; Yan, R.; Zhang, X.; Chen, X. A sparse auto-encoder-based deep neural network approach for induction motor faults classification. Measurement 2016, 89, 171–178. [Google Scholar] [CrossRef]
  24. Arora, S.; Singh, S. Butterfly optimization algorithm: A novel approach for global optimization. Soft Comput. 2018, 23, 715–734. [Google Scholar] [CrossRef]
  25. Malibari, A.A.; Alotaibi, S.S.; Alshahrani, R.; Dhahbi, S.; Alabdan, R.; Al-wesabi, F.N.; Hilal, A.M. A novel metaheuristics with deep learning enabled intrusion detection system for secured smart environment. Sustain. Energy Technol. Assess. 2022, 52, 102312. [Google Scholar] [CrossRef]
Figure 1. Block diagram of IDCPRO-DLM model.
Figure 1. Block diagram of IDCPRO-DLM model.
Sustainability 15 06902 g001
Figure 2. (ae) Intrusion detection results of IDCPRO-DLM model on the training phase.
Figure 2. (ae) Intrusion detection results of IDCPRO-DLM model on the training phase.
Sustainability 15 06902 g002
Figure 3. (ae) Intrusion detection results of IDCPRO-DLM model in the testing phase.
Figure 3. (ae) Intrusion detection results of IDCPRO-DLM model in the testing phase.
Sustainability 15 06902 g003
Figure 4. TACY and VACY of IDCPRO-DLM model.
Figure 4. TACY and VACY of IDCPRO-DLM model.
Sustainability 15 06902 g004
Figure 5. TLOS and VLOS of IDCPRO-DLM model.
Figure 5. TLOS and VLOS of IDCPRO-DLM model.
Sustainability 15 06902 g005
Figure 6. Precision–recall results of IDCPRO-DLM model.
Figure 6. Precision–recall results of IDCPRO-DLM model.
Sustainability 15 06902 g006
Figure 7. ROC analysis of IDCPRO-DLM model.
Figure 7. ROC analysis of IDCPRO-DLM model.
Sustainability 15 06902 g007
Figure 8. P r e c n and r e a l analysis of IDCPRO-DLM with recent models.
Figure 8. P r e c n and r e a l analysis of IDCPRO-DLM with recent models.
Sustainability 15 06902 g008
Figure 9. Result analysis of IDCPRO-DLM with recent models.
Figure 9. Result analysis of IDCPRO-DLM with recent models.
Sustainability 15 06902 g009
Table 1. Result analysis of the IDCPRO-DLM model in the training phase.
Table 1. Result analysis of the IDCPRO-DLM model in the training phase.
Attack TypesPrecision (%)Recall (%)Specificity (%)Accuracy (%)F-Score (%)
Training Phase
Normal Attack98.6598.8698.8498.0799.18
Botnet Attack98.5498.4299.2697.9498.08
Brute Force Attack98.1397.2398.5298.1098.23
DDoS Attack99.1798.7898.1898.4198.84
Infiltration Attack98.3398.2698.5998.0697.28
PortScan Attack98.3698.5498.3198.5598.11
Average98.5398.3598.6298.1998.29
Table 2. Result analysis of the IDCPRO-DLM approach in the testing phase.
Table 2. Result analysis of the IDCPRO-DLM approach in the testing phase.
Attack TypesPrecision (%)Recall (%)Specificity (%)Accuracy (%)F-Score (%)
Testing Phase
Normal Attack98.0298.5198.6497.9798.32
Botnet Attack98.6899.0899.1798.9098.56
Brute Force Attack98.5799.0099.2099.2198.75
DDos Attack98.4499.2898.5497.3299.26
Infiltration Attack98.9798.3798.0298.8498.24
PortScan Attack99.1598.6798.8698.9198.41
Average98.6498.8298.7498.5398.59
Table 3. Comparison study of IDCPRO-DLM with existing models [25].
Table 3. Comparison study of IDCPRO-DLM with existing models [25].
MethodsPrecision (%)Recall (%)Specificity (%)Accuracy (%)F-Score (%)
IDCPRO-DLM 98.6498.8298.7498.5398.59
Deep Belief Network97.8096.7296.2998.0096.96
Support Vector Machine97.0596.4697.2997.4697.12
Recurrent Neural Network96.9697.0798.4196.7397.31
Spiking Neural Networks98.1497.1896.5197.0296.49
Feedforward Neural Network96.2696.5897.8596.3597.94
MDLIDS-SSE Model97.2497.9198.2696.9196.25
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Alrayes, F.S.; Asiri, M.M.; Maashi, M.; Salama, A.S.; Hamza, M.A.; Ibrahim, S.S.; Zamani, A.S.; Alsaid, M.I. Intrusion Detection Using Chaotic Poor and Rich Optimization with Deep Learning Model for Smart City Environment. Sustainability 2023, 15, 6902. https://doi.org/10.3390/su15086902

AMA Style

Alrayes FS, Asiri MM, Maashi M, Salama AS, Hamza MA, Ibrahim SS, Zamani AS, Alsaid MI. Intrusion Detection Using Chaotic Poor and Rich Optimization with Deep Learning Model for Smart City Environment. Sustainability. 2023; 15(8):6902. https://doi.org/10.3390/su15086902

Chicago/Turabian Style

Alrayes, Fatma S., Mashael M. Asiri, Mashael Maashi, Ahmed S. Salama, Manar Ahmed Hamza, Sara Saadeldeen Ibrahim, Abu Sarwar Zamani, and Mohamed Ibrahim Alsaid. 2023. "Intrusion Detection Using Chaotic Poor and Rich Optimization with Deep Learning Model for Smart City Environment" Sustainability 15, no. 8: 6902. https://doi.org/10.3390/su15086902

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop