You are currently viewing a new version of our website. To view the old version click .
Electronics
  • Article
  • Open Access

8 February 2022

Threat Analysis and Distributed Denial of Service (DDoS) Attack Recognition in the Internet of Things (IoT)

,
,
,
,
,
and
1
Computer Techniques Engineering Department, Faculty of Information Technology, Imam Ja’afar Al-sadiq University, Najaf 10023, Iraq
2
Faculty of Computer Science and Mathematics, University of Kufa, Najaf 10023, Iraq
3
Department of Computer Science, Dijlah University College, Baghdad 10022, Iraq
4
Department of Medical Instruments Engineering Techniques, Al-Farahidi University, Baghdad 10022, Iraq
This article belongs to the Special Issue Intelligence/Security Embedded IoT Systems

Abstract

The Internet of Things (IoT) plays a crucial role in various sectors such as automobiles and the logistic tracking medical field because it consists of distributed nodes, servers, and software for effective communication. Although this IoT paradigm has suffered from intrusion threats and attacks that cause security and privacy issues, existing intrusion detection techniques fail to maintain reliability against the attacks. Therefore, the IoT intrusion threat has been analyzed using the sparse convolute network to contest the threats and attacks. The web is trained using sets of intrusion data, characteristics, and suspicious activities, which helps identify and track the attacks, mainly, Distributed Denial of Service (DDoS) attacks. Along with this, the network is optimized using evolutionary techniques that identify and detect the regular, error, and intrusion attempts under different conditions. The sparse network forms the complex hypotheses evaluated using neurons, and the obtained event stream outputs are propagated to further hidden layer processes. This process minimizes the intrusion involvement in IoT data transmission. Effective utilization of training patterns in the network successfully classifies the standard and threat patterns. Then, the effectiveness of the system is evaluated using experimental results and discussion. Network intrusion detection systems are superior to other types of traditional network defense in providing network security. The research applied an IGA-BP network to combat the growing challenge of Internet security in the big data era, using an autoencoder network model and an improved genetic algorithm to detect intrusions. MATLAB built it, which ensures a 98.98% detection rate and 99.29% accuracy with minimal processing complexity, and the performance ratio is 90.26%. A meta-heuristic optimizer was used in the future to increase the system’s ability to forecast attacks.

1. Introduction

The Internet of Things (IoT) [] has a collection of network devices that are interconnected via near-field communication (NFC), Bluetooth, and Wi-Fi connections []. The IoT devices are widely utilized in smart appliances (thermostats, refrigerators, etc.), security systems, health care, computer peripherals, military, agriculture, etc. [,]. These IoT devices utilize the Internet Protocol (IP) to transmit the information from source to destination. This IP protocol identifies the computer to allow fast communication without requiring human intervention. However, IoT devices change human life in different applications, and the threats to IoT lead to a significant security risk. Intruder detection systems now in use may not provide adequate protection against today’s sophisticated threats. Therefore, in this study, the threat of IoT intrusion has been assessed by employing a sparse convolute network to counter threats and attacks. Every IoT device has specific characteristics [], such as large data gathering, physical and virtual environment connection, complex environment creation, centralized architecture. These characteristics enable the IoT to function efficiently, but it causes threat actors abuse in communication.
The SLR Blockchain paper suggested the world population utilizes around 10 billion IoT devices [] to improve their lifestyle. The high utilization of IoT devices faces IoT security issues in the fast expansion of smart appliances because of connecting to the network. The device-linked IoT devices consist of home automation; thermostats, printers, refrigerators, etc., are operated with the help of artificial intelligence like Google Assistant and Amazon Alexa [,]. Hence, hijacking [] these devices is easy by sending spam emails, conscripted into a botnet, and privacy leaks. By considering these, IoT devices are developed by considering the security-related features []. However, the IoT device utilization increases and data transmission is uncountable. Significant data transmission and billions of connections lead to difficulties while managing and tracking data security [,].
The IoT devices are susceptible to weaponization and hijacking for the Distributed Denial of Service (DDoS) attacks [], man-in-the-middle attack [], targeted code injection [], and pose estimation []. In addition to this, the IoT devices are remotely controlled by the bad actors, creating a significant impact while transmitting data in the network. Therefore, managing and protecting the IoT security is more essential to reduce the intermediate attacks in a network environment. Then, the security threats are reduced by the complete network, segmentation of IoT devices, monitoring, inspection and policy enforcement, and taking immediate automatic actions if the network is influenced by attacks.
The IoT security has been achieved using the Intrusion Detection System (IDS) [,]. The IDS system uses various devices and software applications that help to monitor the network and predict malicious activities. Suppose the system or IoT devices face any security information and event management (SIEM) control with [] their activities. SIEM integrates multiple source outputs and alarm filtering techniques to differentiate malicious activities []. The intrusions are prevented by four types: network-based, wireless intrusion, network behavior analysis, and host-based intrusion prevention system. These four types continuously monitor the entire network, wireless network, and software packages, and the suspicious traffic is predicted successfully. The prevention process uses Harris Hawks Sparse Auto-Encoder Networks for detecting the speeches [].
As an effective extractor, the GA and 5-fold cross-validation (CV) methods used to establish the CNN model structure identify the bagging (BG) classifier. The deep feature subset of the selected CNN model is utilized to test the performance of the BG classifier with a 5-fold CV. An enhanced detection rate was achieved using a hybrid CNN/BG learning technique, including the GA, FCM, CNN extractor, and CNN extractor. The very reliable validation findings produced by the 5-fold CV technique for the proposed algorithm imply that NIDS can be used in a real-world computer network setting. These methods successfully predict the intrusion activities by examining network protocol with the predetermined and pre-configured attack patterns. Therefore, the intrusion detection system should be designed according to the threat patterns. The patterns are classified into misuse intrusion patterns [] (it helps to predict the entire known threats by comparing the matching patterns) and anomaly intrusion [] (this intrusion detects based on the network behavior). Sometimes, this system develops by combining the misuse and anomaly intrusion patterns to reduce the intermediate access. By considering these patterns, statistical analysis, evolutionary algorithm, protocol verification, rule-based, and machine learning techniques [] are introduced to detect and prevent intrusion activities. The general description of these methods is illustrated in Table 1. Intrusion detection systems (IDS) are cutting-edge security mechanisms that use advanced approaches to guard computer networks against intrusions in process or illicit accesses that have already occurred. In addition, the IDS must be designed to survive large-scale ethical hacking and real-time testing to be effective in cyber security activities.
Table 1. Intrusion detection techniques.
As discussed in Table 1, different techniques are incorporated in the IoT network to predict intrusion activities. Machine learning techniques provide satisfactory results because the network is trained using sets of intrusion data, characteristics, and suspicious activities, which helps identify and track the attacks, mainly Distributed Denial of Service (DDoS) attacks. By considering the impact of machine learning techniques in the intrusion threat analysis process, these evolutionary techniques are incorporated to manage the reliability against the attacks.
The main contributions of the paper are:
  • Security and privacy concerns were a problem in this IoT paradigm because of threats and attacks.
  • This IoT paradigm was plagued by security and privacy concerns due to intrusion threats and attacks.
  • The use of training patterns in the network successfully classifies the standard and the threats.
Then, the rest of the paper is organized as follows; Section 2 discusses the various research opinion regarding intrusion and threat analysis in IoT networks. Section 3 explores the working process of machine learning with the evolutionary technique-based threat analysis process. Section 4 discusses the efficiency of the introduced system and concludes in Section 5.

3. Materials and Methods

Intrusion Detection Using Optimized Sparse Convolution Neural Networks

This section discusses the optimized sparse CNN-based intrusion detection in the IoT. As discussed earlier, intrusions are prevented in any type such as host, network, wireless, etc. These kinds of data have been utilized to extract anomaly features using introduced approaches.
Figure 1 shows the database load balancer to act as a middleman between the database and the applications that use it. A single database endpoint, increased query throughput, reduced latency, and better usage of database server resources are all aims of database load balancing. Changing the training dataset’s composition is the most common approach to an unbalanced classification problem. Because we are sampling an existing data sample, strategies to alter the class distribution in the training dataset are sometimes referred to as sampling methods or resampling methods. It collects and translates a dataset into relevant, useable information that constitutes data processing in research. A researcher, data engineer, or data scientist can manually or automatically transform raw data into a more understandable format, such as a graph, report, or chart. A dataset of this size is a training dataset to train a machine learning model. The second set of data, referred to as a validation or testing set, might supplement the first. A training set, training dataset, or learning set is another name for training data. There are several ways to evaluate the effectiveness of a learning model. Still, one of the most common is to use a train test dataset, which divides a dataset into training and testing datasets. The full dataset is utilized for training and testing a specific model in a more advanced method.
Figure 1. Data balancing model structure and its process.
Datasets in neural networks are essentially data sets that may be analyzed and predicted by computers as if they were a single entity. Quantitative risk analysis is used for risks that need additional investigation. Modern biology relies heavily on computational models. To synthesize current knowledge, assess opposing hypotheses qualitatively and quantitatively, and assist the understanding of complex data, they give a framework within which to do so.
The extracted features are more helpful in predicting intrusions and threats with minimum complexity and maximum detection rate. The intrusion detection system is then illustrated in Figure 2.
Figure 2. Intelligent Intrusion Detection System in the Internet of Things (IoT).
This study’s main objective is to detect threat and intrusion activities from the data traffic presented in the network and host reliably. Intrusion detection systems (IDS) are primarily designed to protect an IoT network from external threats, rapid response, and high-volume data processing requirements for an IDS intended for IoT-based smart settings. Network security technology such as an Intrusion Detection System (IDS) was designed to discover vulnerabilities in a target application or computer. The IDS is a listening-only device, as mentioned. The goal is achieved according to Equation (1), that is, the output of convolution layer feature map O ( g s + 1 ) ( w s + 1 ) × n = K × defined by
O ( y , x , j ) = i = 1 m u , v = 1 s K ( u , v , i , j ) ( y + u 1 , x + v 1 , i )
The objective is obtained from feature map in g w m ; input feature map height and width are denoted as g and w , convolutions kernel is K , with size s , and n number of the output channel. The network uses zero paddings and one stride during the threat identification process. The threat should be detected in a reliable and fast manner according to the sparse matrices. For this, the feature tensor should change according to sparse multiplication matrix-like   to   J g w m and kernel K to s s m n to P m m . The kernel operation is performed with kernel K and input , which O R*J replaces, defined as follows.
K ( u , v , i , j )   k = 1 m ( u , v , k , j )   P ( k , i )
J ( y , x , i ) = k = 1 m P ( i , k )   ( y , x , k )
Then, for channel i, decompose the tensor ( (.,.,i,.)   s s n ) into the product of matrix ( S i q i n ) and tensor ( W i s s q i ) according to number base ( q i ) that is defined in Equation (4).
( u , v , i , j ) k = 1 q i S i ( k , j ) W i ( u , v , k )
V i ( y , x , k ) = u , v = 1 s W i ( u , v , k ) J ( y + u 1 , x + v 1 , i )
From the denser decomposition process, the sparse convolution operation is performed using Equation (6).
O ( y , x , j ) i = 1 m k = 1 W i S i ( k , j ) V i ( y , x , k )
Here, O ( y , x , j ) is formulated according to the single matrix multiplication of S i ( k , j ) and V i ( y , x , k ) . The first two dimensions, S i ( k , j ) from ( u , v , i , j ) and V i ( y , x , k ) from V i ( y , x , k ) , are utilized from the sensor during this computation. This sparse convolution kernel value ensures the output of the threat’s activities from a user action.
However, the computation complexity should be reduced during the threat and intrusion detection process. The system’s complexity is measured by counting the number of multiplications. Generally, the convolution network requires m n s 2 ( g s + 1 ) ( w s + 1 ) multiplications; but this work reduces the complexity using the sparse kernel process; therefore, complexity is computed from non-zero sparse matrix γ and decomposition of a matrix.
( γ m n + i = 1 n q i ) s 2 ( g s + 1 ) ( w s + 1 ) + m 2 g w
After reducing computation complexity, the matrix formulation problem is reduced by performing decomposition, defined in Equations (2) and (3). Then, the fine-tuning process is applied to the network to improve the threat detection accuracy and specificity. In the fine-tuning phase, the objective function Equation (8) is used to minimize the deviation while predicting threats in IoT.
m i n i m i z e P , W i , S i   n e t + λ 1 i = 1 m S i 1 + λ 2 i = 1 m j = 1 q i S i ( j , . ) 2
The deviation should minimize using the logistic loss function n e t in network output. Element wise matrix is in . 1 and . 2 . Based on the above discussion, the objective of the work is achieved; that is, reliable and minimum computation complexity is achieved while detecting threats in IoT. Further, the system’s effectiveness improved using an effective training process that uses long-short term memory neural networks (LSTM).
The training process aims to predict user behavior while attempting to perform IoT actions. The user behavior and features are used to detect the intruder and inside threat. Here, user behavior features are extracted according to the function of LSTM that helps predict anomalous activity.
Consider the IoT network with a set of users such as { u 1 , u 2 , . u k } ; each user has several actions (A) in a day J . The user actions are represented as A = [ A u k , 1 ,   A u k , 2 , , A u k , j ] . During the training process, u k actions A u k , 1 in j day is derived that was utilized for the network training process; according to the u k and A u k , 1 Neural network extract features. Then, the derived features are analyzed and the matrix (fixed-size) M u k , j constructed, which contains user behavior-related temporal features. By utilizing these features, threat and regular activities are classified using the sparse convolution network in the testing phase. Then, the overall network training process is illustrated in Figure 3.
Figure 3. Intruder actions training using long-short term network.
Figure 3 illustrates that the LSTM based training process consists of input, embedding, hidden, and output layers. Each layer performs a specific function, and respective user behavior features are extracted. As discussed earlier, the output y t u k , j   ( 1 t T ) at time instance t is obtained by processing user actions A u k , j = { X 1 u k , j , X 2 u k , j , , X T u k , j } . X t u k , j ( 1 t T ) in the LSTM network hidden layer h t u k , j ( 0 l 3 , 1 t < T ) . The dictionary should be created for IoT users and individual actions, which helps identify user behavior features. If the user logs into the IoT device after an hour, that is represented as one, and logged off the IoT device after an hour, defined as 2. These actions are converted to the one-vector format to get the exact user behavior in the hidden layer process. The network generally has the input, weight, and bias values used to predict the output. The three hidden layer process is defined as follows:
l , t u k , j = σ ( l ( i , x )   h l 1 , t u k , j + l ( i , h ) h l , t 1 u k , j + b l i )
f l , t u k , j = σ ( l ( f , x )   h l 1 , t u k , j + l ( f , h ) h l , t 1 u k , j + b l f )
o l , t u k , j = σ ( l ( o , x )   h l 1 , t u k , j + l ( o , h ) h l , t 1 u k , j + b l o )
g l , t u k , j = t a n h ( l ( g , x )   h l 1 , t u k , j + l ( g , h ) h l , t 1 u k , j + b l g )
c i , t u k , j = f l , t u k , j c i , t 1 u k , j + l , t u k , j g l , t u k , j
h l , t u k , j = o l , t u k , j tanh ( c i , t u k , j )
The above computations are utilized for training the features derived from the user actions. Here, c i , 0 u k , j and h l , 0 u k , j values are zero for the entire three layers o n e l 3 , represented as the element-wise multiplication and σ ( . ) . It is denoted as the sigmoid function. These functions are applied to the hidden representation a l , t u k , j to identify the output in hidden units. Along with the value, l , t u k , j is updated, and f l , t u k , j values are forgotten for getting the o l , t u k , j output value. This process is repeated to investigate the user actions as A = [ A u k , 1 , A u k , 2 , A u k , j ] for getting the exact output value y l , t u k , j . At last, the cross-entropy loss value is estimated by collating output y l , t u k , j with input x t + 1 u k , j . Here, dropout process is applied to reduce the overfitting data that help to improve the overall recognition accuracy. The training process helps to derive the feature vectors u k , j = { h 3 , 1 u k , j , h 3 , 2 u k , j , , h 3 , T u k , j } . Then, the extracted features are transferred into the fixed-size illustration because it has to be given the input to the sparse CNNs.
The user u k any sequence actions A u k , j are defined in maximum ( N u k ) and minimum length ( n u k ) because the sequences are eliminated from this process with low length compared to n u k . This process helps minimize unwanted computation and to maximize threat detection time. Therefore, zeros are pad between n u k to ( N u k ) to reach the extract features to maximum length. This process is performed to convert the u k , j = { h 3 , 1 u k , j , h 3 , 2 u k , j , , h 3 , T u k , j } feature to matrix M u k , j ( N u k   V u k ) d i m e n s i o n . Then, the formed M u k , j is given as input to the sparse convolution matrix to analyzing user behavior to predict the threat and everyday activities.
Consider that the IoT network has a different number of nodes, in which one node is treated as a server node, and the remaining nodes are a client for data transmission and analytic processes. Here, traffic is continuously monitored to eliminate the modification on live traffic; every user action (data transmission) server responds to the client sender node by providing replies. The sensor node’s behavior must be analyzed to eliminate the intermediate action during this process. Then, the IoT communication behavior and attacks are illustrated in Figure 4.
Figure 4. IoT Experimental Structure of Intrusion Detection System.
As shown in Figure 4, the attacker attacks the server node because it analyzes transmitted data, login, and other responding processes. The DDoS attacks happened using a single host among the 10 million packets transferred. Therefore, the attack must be detected according to user actions in a day. According to the above process, features like several nodes, neighbors, leaving, joining, etc., are extracted as features. Those derived features are more valuable to predict the intermediate access. In addition to this, the evolutionary computation algorithm is incorporated to predict the threat activities with minimum loss and high accuracy value. The evolutionary algorithm chooses the best solution for automatically created solutions using the fitness value. Here, the multi-objective evolutionary algorithm is used to find the optimal solution (Pareto set). The predicted solution x is greater than the other solution y , supposing the network does not have any more excellent value; at least one less than the values are presented as the optimal solution. Here, sensor node features are continuously examined; if the server node characteristics face any changes, the alarm should be ringed to treat as intruder and attack. Then, the efficiency of the system is evaluated using experiments.
This paper focuses on DDoS by applying Bayesian network models with incomplete data. The above algorithm 1 can be used to re-estimate a parameter when a new set of data d = { d 0 , d 1 , , d n } becomes available, some of which may be partially observed. Algorithm 1 depicts a procedure that is in use while DDoS is running. New security data samples are added to the parameter when they arrive with thresholds th . The current characteristics of DdoS can be reflected in an improved modeling tool, which is critical for enhancing performance based on moment factor mf .
Algorithm 1:
Start
Initialize   network   values   n ,   d = { d 0 , d 1 , , dn } ,   momentum   factor   mf ,   threshold   th ;
Output parameter;
n 0 ; Δ th d = { d 0 , d 1 , , dn }   ;
         While   Δ th d > n do
          n = n + 1 ;
                    For   each   d = { d 0 , d 1 , , dn } ;
                                   Re-estimate variables mf ,   th ;
                    End for;
          mf d ;
          n + + ;
     End;
     Return;
     Print parameter value;
Stop
The industrial benchmark for the system is presented first. This system is mapped in MATLAB using a Bayesian network value n for risk assessment. We compare our proposed method ESCNN to the reference work in terms of accuracy and dynamic range during our threat assessment experimentation.

4. Results and Discussion

This section evaluates the effectiveness of the evolutionary sparse convolution network (ESCNN) intrusion or threat detection system discussed in Section 3. This system uses the DDoS Evaluation Dataset [] for evaluating the introduced system efficiency. The dataset aim to manage the network security on various attacks and traffic. The algorithm was developed to reduce the network overhead using various DDoS attack-related feature examinations. Here, 2313 samples are utilized as training, 490 samples for validation, and 502 samples for testing. Then, the data samples used in threat detection activities are illustrated in Table 3.
Table 3. Data sample description.
This dataset handles various DDoS attacks such as NTP, LDAP, DNS, NetBIOS, MSSQL, TFTP, SYM, WebDDoS, etc. These attacks are executed at a specific time. The collected samples are trained using the LSTM network, and the obtained results are illustrated in the confusion matrix shown in Figure 5.
Figure 5. Confusion matrix of classification results: (a) training, (b) validation, (c) test, and (d) full.
Figure 5 represents the confusion matrix value of training, testing, validation, and overall confusion matrix. The confusion matrix formed according to the false positive rate (FP) (indicates the correct classification of the regular events: yellow box) and true positive rate (TP) (measures the right category of attack events: green box). Then, the adequate training and learning process improves the overall classification rate up to 99.6%. It was able to detect the DDoS attacks in IoT network traffics. The practical computation of this process improves the general network security and alerts the data transmission team in the earlier stage by avoiding network disruptions. Further, the performance of the system is evaluated using accuracy (Acc), measuring the exact detection from entire data instances; Detection Rate (DR), intrusion instances ratio; False Alarm Rate (FAR), misclassification of normal instance; Precision (Pre), how many attacks are classified correctly; and Recall (Re), detecting how many attacks are done in the model return.
A c c u r a c y = T r u e   p o s i t i v e + T r u e   N e g a t i v e T r u e   p o s i t i v e + T r u e   N e g a t i v e + F a l s e   P o s i t i v e + F a l s e   N e g a t i v e
D e t e c t i o n   R a t e   ( D R ) = T r u e   P o s i t i v e   ( T P ) T r u e   P o s i t i v e   ( T P ) + F a l s e   N e g a t i v e   ( F N )
F a l s e   A l a r m   R a t e   ( F A R ) = F a l s e   P o s i t i v e T r u e   N e g a t i v e + F a l s e   P o s i t i v e
P r e c i s i o n = T r u e   P o s i t i v e T r u e   P o s i t i v e + F a l s e   P o s i t i v e
R e c a l l = T r u e   P o s t i v e T r u e   P o s i t i v e + F a l s e   N e g a t i v e
The discussed evolutionary sparse convolution network (ESCNN) classifies the abnormal activities in a reliable and the fastest manner. The successful formulation of sparse matrix features from data traffic reduces the computation complexity with maximum accuracy. The obtained accuracy result is illustrated in Figure 6. The introduced ESCNN approach compared with existing research approaches such as Particle swarm optimization with gradient descent algorithm (PSO-Light) [], genetic optimized deep belief network (GA-DBN) algorithm [], Two-tier classification model, and dimension reduction algorithm (TT-DR) [].
Figure 6. Classification results: (a) Precision and (b) Recall.
According to Figure 6a, the ESCNN approach predicts the abnormal activities, i.e., threat in IoT environment, by analyzing the user action sequences A u k , 1 , A u k , 2 , , A u k , j Using the LSTM layers, the extraction of u k , j = { h 3 , 1 u k , j , h 3 , 2 u k , j , , h 3 , T u k , j } helps to identify the normal and abnormal activities while the user tries to execute the IoT environment. A sparse matrix is generated f r o m   t h e   f e a t u r e s   M u k , j ( N u k   V u k ) . That minimizes the computation complexity while extracting different activities in the IoT. The successful identification of user behavior improves overall precision. Specific abnormal events are predicted from the analyzed behavior using practical computation of h l , t u k , j = o l , t u k , j tanh ( c i , t u k , j ) . The system minimizes the deviations in the fine-tuning phase m i n i m i z e   P , W i , S i   n e t + λ 1 i = 1 m S i 1 + λ 2 i = 1 m j = 1 q i S i ( j , . ) 2 . The system improves the threat prediction rate and minimizes the false alarm rate (Figure 7).
Figure 7. False Alarm Rate.
The effective computation of K ( u , v , i , j ) ( y + u 1 , x + v 1 , i ) sparse multiplication and decomposition of denser and convolution operations help to identify the data traffic feature map. Moreover, the evolutionary algorithm minimizes the computation problem, and fine-tuning process helps to improve the overall attacks prediction rate.
The LSTM training process in different layers c i , t u k , j = f l , t u k , j c i , t 1 u k , j + l , t u k , j g l , t u k , j helps to reduce the false attack prediction rate. The minimum false alarm rate directly indicates the ESCNN approach maximizes the overall attack detection accuracy and detection rate shown in Table 4. The proposed ESCNN approach recognizes the network attacks with a maximum detection rate (98.9%). In addition to this, the method classifies the normal and abnormal activities with high recognition accuracy (99.29%).
Table 4. Attack Detection Rate.
As seen in Figure 8, an application or system’s data threat detection refers to the systems and procedures used to identify current or potential risks. “Intrusion Detection System” refers to these devices (IDS).
Figure 8. Threat defections on attackers.
There is always an unlawful system intrusion in any danger to data. These detective systems monitor a network system’s actions, traffic, identification, and assaults when they are used. Both software and hardware can be used in the creation of them. When data are “in use,” this kind of data protection is used. Masking is the act of covering or concealing something entirely or in part. The process of obscuring or hiding real-time access to data collection via dynamic data masking does not modify the actual data. When accessing the data, the process is running. As a safeguard against unwanted access, it is used.
By storing all atomic operations for a given set of convolution kernel elements in an instruction book, sparse convolution is shown in Figure 9. It is possible to train sparse neural networks from scratch with a fixed number of parameters using ESCNN. When training an ESCNN network, the weight values and sparse topology are optimized and combined to suit the distribution of data better. The main principle behind this is to start with a sparse network. As stated above, it provides superior threat detection and the correcting ratio is 90.26% compared to other approaches in the literature.
Figure 9. Overall performance analysis.

5. Conclusions

This paper analyzed the evolutionary sparse convolution network (ESCNN) intrusion and threat activities in the Internet of Things (IoT). Here, the DDoS Evaluation Dataset information is utilized to process the discussed intrusion detection system. The collected data are split into training, testing, and validation set. The data are trained according to the different layers of long–short term networks, improving attack detection accuracy. With the help of trained information, testing details are classified by extracting the feature and forming the sparse matrix construction. This process improves the overall attack detection accuracy with a minimum false alarm rate. The MATLAB tool implemented the system, ensuring 98.98% detection rate and 99.29% accuracy with minimum computation complexity, and the performance ratio is 90.26%. The limitation of the study is to ensure high reliability, fast computation, and reduced computation complexity. In the future, the system’s effectiveness will be improved using a metaheuristic optimizer to estimate the global solution to attack prediction through recent work using big data approaches [,,,] and deep learning CNN architectures models [,,].

Author Contributions

Conceptualization, A.R.; Data curation, M.H.A.; Formal analysis, M.M.J., S.K.A., M.J.A., R.D. and S.A.B.; Funding acquisition, R.D.; Investigation, M.H.A., M.M.J. and S.K.A.; Methodology, A.R.; Software, M.H.A.; Validation, S.K.A., A.R., M.J.A., R.D. and S.A.B.; Writing—original draft, M.H.A., M.M.J., S.K.A., A.R., M.J.A. and S.A.B.; Writing—review & editing, M.J.A. and R.D. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Dataset are available at https://www.unb.ca/cic/datasets/ddos-2019.html (accessed on 30 November 2021).

Conflicts of Interest

The authors declare no conflict of interest.

Table of Abbreviations

NTPNetwork time protocol
LDAPLightweight directory access protocol
DNSDomain name system
NetBIOSNetwork Basic Input/Output System
MSSQLMicrosoft SQL Server
TFTPTrivial File Transfer Protocol

References

  1. Saba, T.; Haseeb, K.; Ahmed, I.; Rehman, A. Secure and energy-efficient framework using Internet of Medical Things for e-healthcare. J. Infect. Public Health 2020, 13, 1567–1575. [Google Scholar] [CrossRef]
  2. Awan, M.J.; Masood, O.A.; Mohammed, M.A.; Yasin, A.; Zain, A.M.; Damaševičius, R.; Abdulkareem, K.H. Image-Based Malware Classification Using VGG19 Network and Spatial Convolutional Attention. Electronics 2021, 10, 2444. [Google Scholar] [CrossRef]
  3. Noshad, Z.; Javaid, N.; Saba, T.; Wadud, Z.; Saleem, M.Q.; Alzahrani, M.E.; Sheta, O.E. Fault Detection in Wireless Sensor Networks through the Random Forest Classifier. Sensors 2019, 19, 1568. [Google Scholar] [CrossRef]
  4. Ahmad, A.M.; Sulong, G.; Rehman, A.; Alkawaz, M.H.; Saba, T. Data Hiding Based on Improved Exploiting Modification Direction Method and Huffman Coding. J. Intell. Syst. 2014, 23, 451–459. [Google Scholar] [CrossRef]
  5. Javaid, S.; Javaid, N.; Saba, T.; Wadud, Z.; Rehman, A.; Haseeb, A. Intelligent Resource Allocation in Residential Buildings Using Consumer to Fog to Cloud Based Framework. Energies 2019, 12, 815. [Google Scholar] [CrossRef]
  6. Hussain, M.; Javed, W.; Hakeem, O.; Yousafzai, A.; Younas, A.; Awan, M.J.; Nobanee, H.; Zain, A.M. Blockchain-Based IoT Devices in Supply Chain Management: A Systematic Literature Review. Sustainability 2021, 13, 13646. [Google Scholar] [CrossRef]
  7. Rehman, A.; Haseeb, K.; Saba, T.; Lloret, J.; Ahmed, Z. Mobility Support 5G Architecture with Real-Time Routing for Sustainable Smart Cities. Sustainability 2021, 13, 9092. [Google Scholar] [CrossRef]
  8. Saba, T.; Rehman, A.; Latif, R.; Fati, S.M.; Raza, M.; Sharif, M. Suspicious Activity Recognition Using Proposed Deep L4-Branched-Actionnet With Entropy Coded Ant Colony System Optimization. IEEE Access 2021, 9, 89181–89197. [Google Scholar] [CrossRef]
  9. Haseeb, K.; Almustafa, K.M.; Jan, Z.; Saba, T.; Tariq, U. Secure and Energy-Aware Heuristic Routing Protocol for Wireless Sensor Network. IEEE Access 2020, 8, 163962–163974. [Google Scholar] [CrossRef]
  10. Awan, M.J.; Farooq, U.; Babar, H.M.A.; Yasin, A.; Nobanee, H.; Hussain, M.; Hakeem, O.; Zain, A.M. Real-Time DDoS Attack Detection System Using Big Data Approach. Sustainability 2021, 13, 10743. [Google Scholar] [CrossRef]
  11. Saba, T.; Haseeb, K.; Din, I.U.; Almogren, A.; Altameem, A.; Fati, S.M. EGCIR: Energy-Aware Graph Clustering and Intelligent Routing Using Supervised System in Wireless Sensor Networks. Energies 2020, 13, 4072. [Google Scholar] [CrossRef]
  12. Rashid, M.; Khan, M.A.; Alhaisoni, M.; Wang, S.-H.; Naqvi, S.R.; Rehman, A.; Saba, T. A Sustainable Deep Learning Framework for Object Recognition Using Multi-Layers Deep Features Fusion and Selection. Sustainability 2020, 12, 5037. [Google Scholar] [CrossRef]
  13. Ferooz, F.; Hassan, M.T.; Awan, M.J.; Nobanee, H.; Kamal, M.; Yasin, A.; Zain, A.M. Suicide Bomb Attack Identification and Analytics through Data Mining Techniques. Electronics 2021, 10, 2398. [Google Scholar] [CrossRef]
  14. Khan, A.Y.; Latif, R.; Latif, S.; Tahir, S.; Batool, G.; Saba, T. Malicious Insider Attack Detection in IoTs Using Data Analytics. IEEE Access 2019, 8, 11743–11753. [Google Scholar] [CrossRef]
  15. Saba, T.; Haseeb, K.; Shah, A.A.; Rehman, A.; Tariq, U.; Mehmood, Z. A Machine-Learning-Based Approach for Autonomous IoT Security. IT Prof. 2021, 23, 69–75. [Google Scholar] [CrossRef]
  16. Ali, S.F.; Aslam, A.S.; Awan, M.J.; Yasin, A.; Damaševičius, R. Pose Estimation of Driver’s Head Panning Based on Interpolation and Motion Vectors under a Boosting Framework. Appl. Sci. 2021, 11, 11600. [Google Scholar] [CrossRef]
  17. Saba, T.; Sadad, T.; Rehman, A.; Mehmood, Z.; Javaid, Q. Intrusion Detection System Through Advance Machine Learning for the Internet of Things Networks. IT Prof. 2021, 23, 58–64. [Google Scholar] [CrossRef]
  18. Odusami, M.; Misra, S.; Adetiba, E.; Abayomi-Alli, O.; Damasevicius, R.; Ahuja, R. An Improved Model for Alleviating Layer Seven Distributed Denial of Service Intrusion on Webserver. J. Physics Conf. Ser. 2019, 1235. [Google Scholar] [CrossRef]
  19. Saba, T. Intrusion Detection in Smart City Hospitals using Ensemble Classifiers. In Proceedings of the 2020 13th International Conference on Developments in eSystems Engineering (DeSE), Liverpool, UK, 14–17 December 2020; pp. 418–422. [Google Scholar]
  20. Mujahid, A.; Awan, M.; Yasin, A.; Mohammed, M.; Damaševičius, R.; Maskeliūnas, R.; Abdulkareem, K. Real-Time Hand Gesture Recognition Based on Deep Learning YOLOv3 Model. Appl. Sci. 2021, 11, 4164. [Google Scholar] [CrossRef]
  21. Ali, M.H.; Jaber, M.M.; Abd, S.K.; Rehman, A.; Awan, M.J.; Vitkutė-Adžgauskienė, D.; Damaševičius, R.; Bahaj, S.A. Harris Hawks Sparse Auto-Encoder Networks for Automatic Speech Recognition System. Appl. Sci. 2022, 12, 1091. [Google Scholar] [CrossRef]
  22. Haafza, L.A.; Awan, M.J.; Abid, A.; Yasin, A.; Nobanee, H.; Farooq, M.S. Big Data COVID-19 Systematic Literature Review: Pandemic Crisis. Electronics 2021, 10, 3125. [Google Scholar] [CrossRef]
  23. Awan, M.J.; Yasin, A.; Nobanee, H.; Ali, A.A.; Shahzad, Z.; Nabeel, M.; Zain, A.M.; Shahzad, H.M.F. Fake News Data Exploration and Analytics. Electronics 2021, 10, 2326. [Google Scholar] [CrossRef]
  24. Rehman, A.; Haseeb, K.; Saba, T.; Lloret, J.; Sendra, S. An Optimization Model with Network Edges for Multimedia Sensors Using Artificial Intelligence of Things. Sensors 2021, 21, 7103. [Google Scholar] [CrossRef]
  25. Rehman, A.; Haseeb, K.; Saba, T.; Lloret, J.; Tariq, U. Secured Big Data Analytics for Decision-Oriented Medical System Using Internet of Things. Electronics 2021, 10, 1273. [Google Scholar] [CrossRef]
  26. Khan, M.A.; Abuhasel, K.A. An evolutionary multi-hidden Markov model for intelligent threat sensing in industrial internet of things. J. Supercomput. 2021, 77, 6236–6250. [Google Scholar] [CrossRef]
  27. Gerard, A.; Latif, R.; Latif, S.; Iqbal, W.; Saba, T.; Gerard, N. MAD-Malicious Activity Detection Framework in Federated Cloud Computing. In Proceedings of the 2020 13th International Conference on Developments in eSystems Engineering (DeSE), Liverpool, UK, 14–17 December 2020; pp. 273–278. [Google Scholar]
  28. Dange, S.; Chatterjee, M. IoT Botnet: The Largest Threat to the IoT Network. In Data Communication and Networks; Springer: Singapore, 2020; pp. 137–157. [Google Scholar]
  29. Waheed, N.; He, X.; Ikram, M.; Usman, M.; Hashmi, S.; Usman, M. Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures. ACM Comput. Surv. (CSUR) 2020, 53, 1–37. [Google Scholar] [CrossRef]
  30. Liu, J.; Yang, D.; Lian, M.; Li, M. Research on Intrusion Detection Based on Particle Swarm Optimization in IoT. IEEE Access 2021, 9, 38254–38268. [Google Scholar] [CrossRef]
  31. Eskandari, M.; Janjua, Z.H.; Vecchio, M.; Antonelli, F. Passban IDS: An Intelligent Anomaly-Based Intrusion Detection System for IoT Edge Devices. IEEE Internet Things J. 2020, 7, 6882–6897. [Google Scholar] [CrossRef]
  32. Anthi, E.; Williams, L.; Slowinska, M.; Theodorakopoulos, G.; Burnap, P. A Supervised Intrusion Detection System for Smart Home IoT Devices. IEEE Internet Things J. 2019, 6, 9042–9053. [Google Scholar] [CrossRef]
  33. Zhang, Y.; Li, P.; Wang, X. Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network. IEEE Access 2019, 7, 31711–31722. [Google Scholar] [CrossRef]
  34. Pajouh, H.H.; Javidan, R.; Khayami, R.; Dehghantanha, A.; Choo, K.-K.R. A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks. IEEE Trans. Emerg. Top. Comput. 2016, 7, 314–323. [Google Scholar] [CrossRef]
  35. Li, J.; Zhao, Z.; Li, R.; Zhang, H. AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks. IEEE Internet Things J. 2019, 6, 2093–2102. [Google Scholar] [CrossRef]
  36. Al-Hamadi, H.; Chen, I.-R.; Wang, D.-C.; Almashan, M. Attack and Defense Strategies for Intrusion Detection in Autonomous Distributed IoT Systems. IEEE Access 2020, 8, 168994–169009. [Google Scholar] [CrossRef]
  37. Moustafa, N.; Turnbull, B.; Choo, K.-K.R. An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things. IEEE Internet Things J. 2019, 6, 4815–4830. [Google Scholar] [CrossRef]
  38. Khan, B.U.I.; Anwar, F.; Olanrewaju, R.F.; Pampori, B.R.; Mir, R.N. A Novel Multi-Agent and Multilayered Game Formulation for Intrusion Detection in Internet of Things (IoT). IEEE Access 2020, 8, 98481–98490. [Google Scholar] [CrossRef]
  39. Azeez, N.A.; Ayemobola, T.J.; Misra, S.; Maskeliūnas, R.; Damaševičius, R. Network Intrusion Detection with a Hashing Based Apriori Algorithm Using Hadoop MapReduce. Computers 2019, 8, 86. [Google Scholar] [CrossRef]
  40. Nie, L.; Ning, Z.; Wang, X.; Hu, X.; Cheng, J.; Li, Y. Data-Driven Intrusion Detection for Intelligent Internet of Vehicles: A Deep Convolutional Neural Network-Based Method. IEEE Trans. Netw. Sci. Eng. 2020, 7, 2219–2230. [Google Scholar] [CrossRef]
  41. Shafiq, M.; Tian, Z.; Bashir, A.K.; Du, X.; Guizani, M. CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques. IEEE Internet Things J. 2021, 8, 3242–3254. [Google Scholar] [CrossRef]
  42. Alarcon-Aquino, V.; Ramirez-Cortes, J.M.; Gomez-Gil, P.; Starostenko, O.; Garcia-Gonzalez, Y. Network Intrusion Detection Using Self-Recurrent Wavelet Neural Network with Multidimensional Radial Wavelons. Inf. Technol. Control 2014, 43, 347–358. [Google Scholar] [CrossRef][Green Version]
  43. Alharbi, A.; Alosaimi, W.; Alyami, H.; Rauf, H.; Damaševičius, R. Botnet Attack Detection Using Local Global Best Bat Algorithm for Industrial Internet of Things. Electronics 2021, 10, 1341. [Google Scholar] [CrossRef]
  44. Damaševičius, R.; Venčkauskas, A.; Toldinas, J.; Grigaliūnas, Š. Ensemble-Based Classification Using Neural Networks and Machine Learning Models for Windows PE Malware Detection. Electronics 2021, 10, 485. [Google Scholar] [CrossRef]
  45. Toldinas, J.; Venčkauskas, A.; Damaševičius, R.; Grigaliūnas, Š.; Morkevičius, N.; Baranauskas, E. A Novel Approach for Network Intrusion Detection Using Multistage Deep Learning Image Recognition. Electronics 2021, 10, 1854. [Google Scholar] [CrossRef]
  46. Sodhro, A.H.; Sangaiah, A.K.; Sodhro, G.H.; Lohano, S.; Pirbhulal, S. An Energy-Efficient Algorithm for Wearable Electrocardiogram Signal Processing in Ubiquitous Healthcare Applications. Sensors 2018, 18, 923. [Google Scholar] [CrossRef]
  47. Muzammal, M.; Talat, R.; Sodhro, A.H.; Pirbhulal, S. A multi-sensor data fusion enabled ensemble approach for medical data from body sensor networks. Inf. Fusion 2020, 53, 155–164. [Google Scholar] [CrossRef]
  48. Canadian Institute for Cybersecurity. DDoS Evaluation Dataset (CIC-DDoS2019). 2019. Available online: https://www.unb.ca/cic/datasets/ddos-2019.html (accessed on 29 November 2021).
  49. Javed Awan, M.; Shafry Mohd Rahim, M.; Nobanee, H.; Munawar, A.; Yasin, A.; Mohd Zain Azlanmz, A. Social Media and Stock Market Prediction: A Big Data Approach. Comput. Mater. Contin. 2021, 67, 2569–2583. [Google Scholar] [CrossRef]
  50. Awan, M.J.; Gilani, S.A.H.; Ramzan, H.; Nobanee, H.; Yasin, A.; Zain, A.M.; Javed, R. Cricket Match Analytics Using the Big Data Approach. Electronics 2021, 10, 2350. [Google Scholar] [CrossRef]
  51. Javed Awan, M.; Shafry Mohd Rahim, M.; Nobanee, H.; Yasin, A.; Ibrahim Khalaf, O.; Ishfaq, U. A Big Data Approach to Black Friday Sales. Intell. Autom. Soft Comput. 2021, 27, 785–797. [Google Scholar] [CrossRef]
  52. Awan, M.; Khan, R.; Nobanee, H.; Yasin, A.; Anwar, S.; Naseem, U.; Singh, V. A Recommendation Engine for Predicting Movie Ratings Using a Big Data Approach. Electronics 2021, 10, 1215. [Google Scholar] [CrossRef]
  53. Awan, M.J.; Rahim, M.S.M.; Salim, N.; Mohammed, M.A.; Garcia-Zapirain, B.; Abdulkareem, K.H. Efficient Detection of Knee Anterior Cruciate Ligament from Magnetic Resonance Imaging Using Deep Learning Approach. Diagnostics 2021, 11, 105. [Google Scholar] [CrossRef]
  54. Awan, M.J.; Bilal, M.H.; Yasin, A.; Nobanee, H.; Khan, N.S.; Zain, A.M. Detection of COVID-19 in Chest X-ray Images: A Big Data Enabled Deep Learning Approach. Int. J. Environ. Res. Public Health 2021, 18, 10147. [Google Scholar] [CrossRef]
  55. Awan, M.J.; Rahim, M.S.M.; Salim, N.; Rehman, A.; Nobanee, H.; Shabir, H. Improved Deep Convolutional Neural Network to Classify Osteoarthritis from Anterior Cruciate Ligament Tear Using Magnetic Resonance Imaging. J. Pers. Med. 2021, 11, 1163. [Google Scholar] [CrossRef] [PubMed]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.