Abstract
The Internet of Things (IoT) is the most extensively utilized technology nowadays that is simple and has the advantage of replacing the data with other devices by employing cloud or wireless networks. However, cyber-threats and cyber-attacks significantly affect smart applications on these IoT platforms. The effects of these intrusions lead to economic and physical damage. The conventional IoT security approaches are unable to handle the current security problems since the threats and attacks are continuously evolving. In this background, employing Artificial Intelligence (AI) knowledge, particularly Machine Learning (ML) and Deep Learning (DL) solutions, remains the key to delivering a dynamically improved and modern security system for next-generation IoT systems. Therefore, the current manuscript designs the Honey Badger Algorithm with an Optimal Hybrid Deep Belief Network (HBA-OHDBN) technique for cyberattack detection in a blockchain (BC)-assisted IoT environment. The purpose of the proposed HBA-OHDBN algorithm lies in its accurate recognition and classification of cyberattacks in the BC-assisted IoT platform. In the proposed HBA-OHDBN technique, feature selection using the HBA is implemented to choose an optimal set of features. For intrusion detection, the HBA-OHDBN technique applies the HDBN model. In order to adjust the hyperparameter values of the HDBN model, the Dung Beetle Optimization (DBO) algorithm is utilized. Moreover, BC technology is also applied to improve network security. The performance of the HBA-OHDBN algorithm was validated using the benchmark NSLKDD dataset. The extensive results indicate that the HBA-OHDBN model outperforms recent models, with a maximum accuracy of 99.21%.
Keywords:
Internet of Things; blockchain; cybersecurity; intrusion detection system; deep learning; metaheuristics MSC:
68-11
1. Introduction
Currently, Internet of Things (IoT) technology is applied in a variety of applications such as sensors, devices, software, and tools to ensure improved functions and accuracy [1]. With the growth of the IoT, life has become comfortable and simple for human beings, governments, and industries. Machines, sensors, gadgets, and devices have become highly intelligent, whereas manual contributions have substantially decreased through the development of IoT technology [2]. The IoT is required for smart devices, namely, fire alarms, physical medical sensors, smart mobiles, smart energy meters, industrial devices, energy applications, and smart security systems. The term IoT security refers to the protection of internet-connected or network-based things [3]. In recent years, the concept of the IoT has developed, and its main terminology has developed over several years. The major role of the IoT is to interconnect the nodes, frameworks, sensors, smart cities, and systems through the internet for communication, control, and information sharing [4].
The IoT has been developed for the optimization of the day-to-day activities of human life and to enable the current world to run proficiently. Everything is connected to the internet, such as smart sensors, cooking appliances, thermostats, fitness mobile applications, air conditioners, and PV systems [5]. This fast growth of IoT technology is creating huge difficulties for securing and protecting IoT data from unauthorized users, malicious traffic, hackers, and attackers. Thus, numerous defense mechanisms and approaches have been proposed and developed in IoT systems and architectures to protect the data [6]. The application of various DL techniques to identify the attacks with binary classification and to classify different kinds of attacks with multi-class classification has become an active research domain [7]. While several great reviews have covered this developing area of research, the literature fails to produce an unbiased comparison of various DL techniques, particularly the application of new databases for intrusion detection in a controlled setting [8].
Cybersecurity is a serious challenge in the current world. Firewalls, for instance, have been employed for a long time to protect secret data. The intrusion detection system (IDS) studies network traffic on a certain computer environment to detect the indications of malicious activities [9]. The fast development of Artificial Intelligence (AI) has led to important advances in certain mechanisms, including anomaly detection and pattern identification. While the existing systems perform well in detecting cyberattacks, their performance could still be improved. With an increase in the number of network attacks, the quantity of data accessible on networks increases; thus, rapid and highly effective methods are required in order to identify the attacks. Without a doubt, a huge number of approaches to enhancing network security exist [10]. Privacy and security are significant IoT challenges to focus on and investigate further. With the employment AI, the identification of cyber security attacks on the IoT can be significantly enhanced.
The current manuscript describes the Honey Badger Algorithm with the Optimal Hybrid Deep Belief Network (HBA-OHDBN) technique for cyberattack detection in a BC-assisted IoT platform. In the proposed HBA-OHDBN system, feature selection using HBA is implemented to choose an optimal set of features. In the HBA, digging and honey-finding strategies are simulated during the exploration and exploitation of the search space. For intrusion detection, the HBA-OHDBN technique applies the HDBN model. To adjust the hyperparameter values of the HDBN model, the Dung Beetle Optimization (DBO) algorithm is utilized. The DBO algorithm considers global exploration and local exploitation, thereby having the characteristics of a fast convergence rate and a satisfactory accuracy outcome. The HBA-OHDBN algorithm was tested using a benchmark IDS database, and the outcomes were inspected under different evaluation metrics. The key contributions of the paper are summarized herewith:
- Development of the HBA-OHDBN technique comprising HBA-based feature subset selection, HDBN-based detection, and DBO-based hyperparameter tuning for intrusion detection in the IoT environment. To the best of the authors’ knowledge, the HBA-OHDBN technique does not exist in the literature.
- Design of the HBA-based feature subset selection approach to identify the most relevant and informative features from the dataset, which helps in reducing the dimensionality and improving the overall performance of the intrusion detection system.
- Employment of the DBO algorithm to fine-tune the hyperparameters of the HDBN model, thus leading to a fast convergence rate and high solution accuracy. This approach ensures that the HDBN model is well adjusted for an improved intrusion detection performance.
2. Literature Review
Asiri et al. [11] introduced the Hybrid Metaheuristics FS with Stacked DL-enabled Cyber-Attack Detection (HMFS-SDLCAD) approach. In this study, data preprocessing was implemented, the Salp Swarm Optimizer (SSO) depends on the PSO (SSOPSO), and a Stacked Bidirectional-GRU (SBiGRU) algorithm was employed for FS identification and classification. Further, the Whale Optimization Algorithm (WOA) was utilized for optimization of the hyperparameters. In reference [12], the authors suggested a DL-based intrusion detection model for IIoT with a hybrid rule-based FS in order to confirm and train the data acquired from TCP/IP packets. In this study, the training method was executed utilizing a hybrid rule-based FS and deep FFNN (DFFNN) approach. In a study conducted earlier [13], the authors developed a Deep Random-NN (DRaNN)-based rapid and dependable attack identification method for IIoT platforms. The developed RaNN method was optimized by integrating the hybrid PSO with Sequential Quadratic Programming (SQP). The SQP-enabled PSO enables the NN to select the optimum hyper-parameters.
Chander and Upendra Kumar [14] presented a novel metaheuristic FS with DL-enabled anomaly detection approach in the IIoT platform, abbreviated as the MFSDL-ADIIoT algorithm. This method leveraged a novel Deer Hunting Optimization (DHO) technique based on FS to arrive at the valuable feature subsets. Moreover, a Cascaded RNN (CRNN) algorithm was also implemented for classification and recognition. Eventually, the Sparrow Search Algorithm (SSA) was employed for optimal fine-tuning of the parameters. Khacha et al. [15] suggested a novel IDS by exploiting the DL techniques. To be specific, the proposed system functions via the incorporation of CNN and LSTM algorithms for intrusion detection and classification. In this study, the current datasets, termed Edge-IIoT sets, containing the actual traffic network of the IIoT and IoT applications were employed. Alabsi et al. [16] integrated two CNNs and recommended a method by which to identify the attacks on IoT networks. The first CNN algorithm is used for the selection of the important features that identify the IoT attack in the raw data on network traffic. The second CNN applies the features detected by the first CNN for making a robust identification technique so as to correctly identify the IoT attacks. In reference [17], the authors developed a novel DL-based IDS (DL-IDS) approach. This method involves the application of a Spider Monkey Optimizer (SMO) approach and the Stacked-Deep Polynomial Network (SDPN). Here, the SMO chooses the optimum features in the databases, whereas the SDPN approach classifies the data as either normal or anomaly.
Alohali et al. [18] developed a novel BC-Assisted Optimal ML-based Cyber-attack Detection and Classification (BAOML-CADC) approach. The primary aim of the proposed BAOML-CADC algorithm was to classify cyber-attacks. Therefore, the proposed BAOML-CADC approach executed the Thermal Equilibrium Algorithm-based FS (TEA-FS) algorithm for optimum selection of the features. The BAOML-CADC system utilized the ELM approach for cyber-attack detection. In the study conducted earlier [19], a new Hybrid Deep Random NN (HDRaNN) was established for cyber-attack detection from the IIoT. The HDRaNN integrates the DRaNN and MLP with dropout regularization. Al-Abassi et al. [20] examined a DL approach for the development of novel balanced representations of imbalanced databases. A novel representation was provided as an ensemble DL attack detection model, especially planned for the ICS platform. The presented attack detection model had the advantages of both DNN and DT approaches for the detection of cyber-attacks in a novel representation.
3. The Proposed Model
In the current manuscript, the HBA-OHDBN system is presented for cyberattack detection in a BC-assisted IoT platform. The major intention behind the HBA-OHDBN algorithm lies in its accurate recognition and classification of the cyberattacks that occur in the IoT platform. The proposed HBA-OHDBN approach has three operational stages: HBA-based feature selection, HDBN-based detection, and DBO-based hyperparameter tuning. Figure 1 depicts the overall flow of the HBA-OHDBN algorithm.
Figure 1.
Overall flow of the HBA-OHDBN algorithm.
3.1. BC Technology
The blockchain (BC) is a de-centralized digital ledger that enables endwise transmission and provides communication among untrustworthy people [21]. It includes number of blocks. In the current research work, all the blocks are incorporated into their prior block via reverse connection, except the initial block (genetic), i.e., the hash code of its early block. For instance, assumes the hash code of the early . Similarly, all the blocks contain additional data fields, namely, an encryption opcode, an identifier, a core hash of every commitment, and a core hash of every operation. Since single-bit change may result in commitments, the unique hash code and the fixed-size core hash values of these two functions are irreversible. One particular condition is satisfied, i.e., smart contracts working on the upper end of the BC can simplify the application of restrictions and contractual agreements. After it is synthesized to the implemented code and recorded from the BC, based on the irreversibility of the BC and core hash of the smart contract, the smart contract becomes irreversible. The smart contract helps in improving the efficacy of business operations, reducing its potential threats, and streamlining the administration. Figure 2 illustrates the structure of the BC.
Figure 2.
Structure of the BC.
3.2. Feature Selection Using HBA
In order to elect an optimal subset of features, the HBA is applied. HBA is a newly-established metaheuristic approach inspired by the smart foraging behavior of honey badgers (HB). In this approach, the honey-finding and digging approaches of HB are mimicked during the exploitation and exploration stages in the search range [22,23]. The initial population randomly initializes the individual location and the size of the population (number of HBs), as given below:
In Equation (1), refers to a random integer in the range of denotes the location of the individual of candidates; and and indicate the lower and upper boundaries of the search range, respectively. The concentration of prey and its smell intensity are related to the distance between the HBs and the prey. The olfactory intensity is compared with the distance between the targets and the HBs and the concentration of the prey. The slower the movement of the HB, the smaller the olfactory intensity will be. If the HB moves faster, then a higher inverse square law provides the olfactory concentration, as given below:
Here, shows the intensity concentration or source; denotes the olfactory concentration of the HB; corresponds to an arbitrary value ranged between 0 and 1; and signifies the distance between the prey and the existing individual, HB.
The density factor ensures a steady conversion from exploration to excavation. The reduction factor reduces with the number of iterations, upgraded by Equation (5) to reduce the uncertainty produced by time-varying changes at the time of foraging:
In Equation (5), corresponds to the maximal iteration counts; and is a constant value fixed at 2. The flag changes the search direction and provides a heavy prospect of finding the food within the search range.
Similar to the shape of the heart line, the HB implements the action in the excavation stage. The cardioid movement is simulated using the following expression:
In Equation (6), shows the distance between the target and the existing individual HB; indicates the global optimum location in the existing state; corresponds to the capability of the HB to attain food; and , and refer to three dissimilar random integers in the range of .
The HB heavily relies on a few parameters, such as the time-varying search, the fragrance concentration of the target, and the distance from the prey during the excavation phase. Furthermore, HBs are subjected to different disturbances that prevent them from finding the best location of the prey. The movement trajectory of the honey source or the HB follows the honeyguide bird to the hive, as shown in the following expression:
Here, refers to the upgraded individual location of the HBs; shows the prey’s location; and are defined using the Equations (5) and (7), respectively; and indicates the randomly generated value within [0, 1]. The HB searches near the prey’s position according to the distance
The Fitness Function (FF) deployed in the presented HBA methodology is intended to take a balance between the number of features elected from every performance (lesser) and the classification accuracy (higher) acquired by utilizing these elected features. Equation (9) defines the FF to calculate the performance:
Here, implies the errors of a provided classifier; suggests the cardinality of the elected subset; demonstrates the entire number of features from the database; and and correspond to two parameters that are equivalent to the impact of classifier quality and subset length, i.e., ∈ [1, 0] and
3.3. Cyberattack Detection Using the HDBN Model
In the current research work, the HDBN approach is applied to detect cyberattacks. Based on the assumption that both DBN and DBM techniques have constraints, the current study presents the HDBN model that employs the Deep Boltzmann Machine system that contains two low-level layers of RBMs and the DBN technique that contains two-layer RBMs from the upper layers. Either the training time or model accuracy should be of concern [24]. The HDBN technique contains four layers. represents the visual state and it also acts as the input for the method. All the samples are defined by a set length vector. , and correspond to four hidden layers (HLs) with distinct counts of nodes for all the levels. The nodes with similar HL values cannot be linked together; for nodes of distinct layers, among , , and , there exists directed connections. Among HL , , and HL , there exists undirected FC. Next, the sample is signified as a set vector and is trained by the first two layers, i.e., and of DBM training. Here, stands for DBM outcomes. Simultaneously, implies the input of the DBN technique that is composed of and . Here, represents the last outcome of the HDBN approach. Related to the visual state, it is called higher-level semantic representation. Figure 3 illustrates the architecture of DBN.
Figure 3.
DBN structure.
In order to gain the optimum parameters for the method, Hinton establishes an energy model in which the parameters are developed as an optimum performance that is embedded in the energy function. The most important mechanism in detecting the statistical pattern is the capturing of the correlations among variables, and it is similar to the energy model.
Here, signifies the number of hidden nodes (HNs); denotes the number of visible nodes (VNs); and and denote the biases of the visual state and HL, respectively. This equation is the energy function that signifies every connection between VN and HN. The main function of RBM is the cumulative value of energies for every VN and HN. However, for the main function, in every instance, there is a need to identify the values of every HN, which could be equivalent to calculating the energy so that it can face the index level of complexity in computation. The joint probability of VN and HN is given herewith:
By establishing this probability, it becomes simple to resolve the energy model. The purpose of this study is to obtain minimal energy. In the statistical procedure, the low energy layer has a greater probability of incident than the greater energy state. So, it is required to maximize the probability.
so
where denotes the normalized factor.
In this equation, the first item on the right denotes the negative values of the entire free-energy function of the whole network; on the left, the probability function is shown. This has been mentioned in the presented model, in which the maximal probability evaluation is used to resolve the model parameters.
3.4. Hyperparameter Selection Using DBO Algorithm
In this final stage, the DBO algorithm is applied upon the hyperparameter values of the HDBN model. The DBO algorithm is inspired by the natural behaviors of dung beetles [25]. Here, the optimum solution is attained by updating the location of the dung beetles [26]: the dung beetles that roll the balls can be upgraded and formulated using the following Equation (15):
The location-updating formula for female dung beetles is given herewith:
The location-updating formula for small dung beetles is given below.
The location-updating formula for thief dung beetles is as follows:
where, and values are fixed, i.e., 0.1 and 0.3, respectively; the flexure angle ranges from and is utilized in the dung beetles’ location-updating formula; and show the present optimum location and the global optimum location, respectively; and and are two constants that signify independent random vectors of size . The reproduction and ovipositional regions have upper and lower boundaries, which are denoted by , and . Moreover, a random vector of size that follows a uniform distribution is characterized by and signifies a constant value. The parameters and are uniformly distributed random numbers between [0, 1]. The location-updating equation for dung beetles is updated continuously, until the optimum solution is reached.
Fitness selection is a key aspect of the DBO algorithm. The encoded solution is utilized to assess the good performance of the candidate outcomes. At present, accuracy is the major condition exploited in the design of an FF.
In the above equation, and define the false- and true-positive values, respectively.
4. Results and Discussion
The cyberattack detection performance of the HBA-OHDBN technique is examined in this section using the standard NSLKDD dataset [27], comprising 148,517 samples under five classes, as summarized in Table 1.
Table 1.
Description of the database.
Figure 4 shows the classification outcomes of the HBA-OHDBN algorithm under the test dataset. Figure 4a,b portray the confusion matrices generated by the HBA-OHDBN method on 60:40 of the TR set/TS set. The outcome values demonstrate that the HBA-OHDBN approach classified and detected all five classes accurately. Figure 4c,d depict the classifier outcomes of the HBA-OHDBN methodology on 60:40 of the TR set/TS set. The proposed method accomplished effective detection of all four kinds of attacks and normal instances.
Figure 4.
Performance of the proposed HBA-OHDBN technique: (a,b) confusion matrices and (c,d) classifier outcome on 60:40 of the TR set/TS set.
The cyberattack detection output of the HBA-OHDBN technique is shown in Table 2 and Figure 5. The results highlight the effectual identification of all four kinds of attacks and normal samples. With the 60% TR set, the HBA-OHDBN technique achieved average , , , , and values such of 99.17%, 96.09%, 75.24%, 75.83%, and 87.30%, respectively. Moreover, with the 40% TS set, the HBA-OHDBN approach achieved average , , , , and values of 99.21%, 76.26%, 75.04%, 75.63%, and 87.21%, respectively.
Table 2.
Cyberattack detection outcomes of the HBA-OHDBN algorithm on 60:40 of the TR set/TS set.
Figure 5.
Average values of the HBA-OHDBN algorithm on 60:40 of the TR set/TS set.
Figure 6 demonstrates the training accuracy and values achieved via the HBA-OHDBN method. The is determined as an estimate of the HBA-OHDBN method on the TR dataset, whereas the is computed by evaluating the performance of the proposed method on a separate testing dataset. The outcomes demonstrate that the and values increased with the increase in the number of epochs. As a result, the performance of the HBA-OHDBN technique on the TR and TS datasets improved with the increase in the number of epochs.
Figure 6.
, curve of the HBA-OHDBN algorithm.
Figure 7 shows the and curves of the HBA-OHDBN technique. The value is defined as the error between the predictive outcome and original values of the TR data. The value measures of the outcome of the HBA-OHDBN system on individual validation data. The results indicate that the and values were reduced with the rising number of epochs. This phenomenon portrays the enhanced performance of the HBA-OHDBN technique and its ability to make accurate classifications. The minimal and values demonstrate the superior outcome of the HBA-OHDBN technique in capturing the patterns and relationships.
Figure 7.
Loss curve of the HBA-OHDBN algorithm.
A detailed PR analysis was conducted via the HBA-OHDBN approach using the test database, and the results are shown in Figure 8. The simulation values depict that the HBA-OHDBN system achieved high PR values. Thus, it is clear that the HBA-OHDBN method achieved enhanced PR values on all five classes.
Figure 8.
PR curve of the HBA-OHDBN algorithm.
Figure 9 shows the ROC curve of the HBA-OHDBN approach on the test database. The simulation values indicate that the HBA-OHDBN system achieved superior ROC values. Thus, it can be inferred that the HBA-OHDBN methodology achieved a better ROC performance in all five classes.
Figure 9.
ROC of the HBA-OHDBN algorithm.
In Table 3 and Figure 10, the results of the comparative analysis between the proposed HBA-OHDBN technique and other existing models are provided [28]. The results indicate that the HBA-OHDBN technique achieved improved performance over other models. At the same time, the NSL-KDD IoT model achieved the worst results, while the NIDS-ML, AE-MLID, DL-NIDS, and ADNT-ELM models obtained closer results. Although the remaining models achieved reasonable outcomes, the HBA-OHDBN technique outperformed the rest of the models.
Table 3.
Comparative analysis outcomes of the HBA-OHDBN algorithm with other approaches [28].
Figure 10.
Comparative outcomes of the HBA-OHDBN algorithm with other approaches.
Finally, the Computation Time (CT) results of the HBA-OHDBN technique are compared with recent models in Table 4 and Figure 11. The results indicate that the HBA-OHDBN technique reached effectual outcomes with a minimal CT of 0.95 s. On the other hand, the NIDS-ML, AE-MLID, NSL-KDD IoT, DL-Improved ID, DL-NIDS, ADNT-ELM, and DL-DCSCA IoT CN models attained increased CT values. Therefore, the HBA-OHDBN technique can be applied to classify the cyberattacks automatically.
Table 4.
CT analytical outcomes of the HBA-OHDBN algorithm with other approaches.
Figure 11.
CT analytical outcomes of the HBA-OHDBN algorithm with other approaches.
5. Conclusions
In the current manuscript, the authors have presented the HBA-OHDBN system for cyberattack detection in an IoT platform. The major intention behind the HBA-OHDBN approach is to accurately recognize and classify cyberattacks in a IoT platform. The proposed HBA-OHDBN system has three stages of operations: HBA-based feature selection, HDBN-based detection, and DBO-based hyperparameter tuning. Moreover, BC technology is also applied to improve network security. In the presented HBA-OHDBN technique, feature selection using HBA was applied to elect the optimal set of features, which, in turn, led to improved results. Finally, the DBO algorithm has been utilized to adjust the hyperparameter values of the HDBN algorithm. The performance of the HBA-OHDBN system was validated using the benchmark IDS database. Our extensive results confirmed the superior performance of the HBA-OHDBN technique compared to other recent approaches. Future research work can focus on auditing and securing smart contracts in the IoT environment. In addition, advanced tools and methodologies can be developed for the identification of vulnerabilities in IoT-related smart contracts in order to ensure their resilience against cyberattacks. In addition to these, scalability challenges related to BC technology can be resolved to accommodate the growing number of IoT devices and transactions.
Author Contributions
Conceptualization, M.R.; Methodology, F.Y.A.; Software, M.R.; Validation, M.R.; Formal analysis, F.Y.A.; Investigation, M.R.; Resources, F.Y.A.; Data curation, M.R.; Writing—original draft, F.Y.A.; Writing—review & editing, M.R.; Funding acquisition, F.Y.A. All authors have read and agreed to the published version of the manuscript.
Funding
This work was funded by the University of Jeddah, Jeddah, Saudi Arabia, under grant No. (UJ-23-DR-48). Therefore, the authors thank the University of Jeddah for its technical and financial support.
Data Availability Statement
Data sharing does not apply to this article as no datasets were generated during the current study.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Arya, L.; Gupta, G.P. Ensemble Filter-based Feature Selection Model for Cyber Attack Detection in Industrial Internet of Things. In Proceedings of the 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 17–18 March 2023; Volume 1, pp. 834–840. [Google Scholar]
- Soliman, S.; Oudah, W.; Aljuhani, A. Deep learning-based intrusion detection approach for securing industrial Internet of Things. Alex. Eng. J. 2023, 81, 371–383. [Google Scholar] [CrossRef]
- Das, S.; Manchala, Y.; Rout, S.K.; Kumar Panda, S. Deep Learning and Metaheuristics based Cyber Threat Detection in Internet of Things Enabled Smart City Environment. Res. Sq. 2023. preprint. [Google Scholar] [CrossRef]
- Popoola, S.I.; Adebisi, B.; Ande, R.; Hammoudeh, M.; Anoh, K.; Atayero, A.A. smote-drnn: A deep learning algo-rithm for botnet detection in the internet-of-things networks. Sensors 2021, 21, 2985. [Google Scholar] [CrossRef] [PubMed]
- Tharewal, S.; Ashfaque, M.W.; Banu, S.S.; Uma, P.; Hassen, S.M.; Shabaz, M. Intrusion detection system for indus-trial Internet of Things based on deep reinforcement learning. Wirel. Commun. Mob. Comput. 2022, 2022, 9023719. [Google Scholar] [CrossRef]
- Koroniotis, N.; Moustafa, N.; Turnbull, B.; Schiliro, F.; Gauravaram, P.; Janicke, H. A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments. In Proceedings of the 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China, 20–22 October 2021; pp. 887–894. [Google Scholar] [CrossRef]
- Katib, I.; Ragab, M. Blockchain-Assisted Hybrid Harris Hawks Optimization Based Deep DDoS Attack Detection in the IoT Environment. Mathematics 2023, 11, 1887. [Google Scholar] [CrossRef]
- Nasir, M.; Javed, A.R.; Tariq, M.A.; Asim, M.; Baker, T. Feature engineering and deep learning-based intrusion detection framework for securing edge IoT. J. Supercomput. 2022, 78, 8852–8866. [Google Scholar] [CrossRef]
- Alkahtani, H.; Aldhyani, T.H.H. Intrusion Detection System to Advance Internet of Things Infrastructure-Based Deep Learning Algorithms. Complexity 2021, 2021, 5579851. [Google Scholar] [CrossRef]
- Alalayah, K.M.; Alrayes, F.S.; Alzahrani, J.S.; Alaidarous, K.M.; Alwayle, I.M.; Mohsen, H.; Ahmed, I.A.; Al Duhayyim, M. Optimal Deep Learning Based Intruder Identification in Industrial Internet of Things Environment. Comput. Syst. Sci. Eng. 2023, 46, 3121–3139. [Google Scholar] [CrossRef]
- Asiri, M.M.; Mohamed, H.G.; Nour, M.K.; Al Duhayyim, M.; Aziz, A.S.A.; Motwakel, A.; Zamani, A.S.; Eldesouki, M.I. Hybrid Metaheuristics Feature Selection with Stacked Deep Learning-Enabled Cyber-Attack Detection Model. Comput. Syst. Sci. Eng. 2023, 45, 1679–1694. [Google Scholar] [CrossRef]
- Awotunde, J.B.; Chakraborty, C.; Adeniyi, A.E. Intrusion Detection in Industrial Internet of Things Network-Based on Deep Learning Model with Rule-Based Feature Selection. Wirel. Commun. Mob. Comput. 2021, 2021, 7154587. [Google Scholar] [CrossRef]
- Ahmad, J.; Shah, S.A.; Latif, S.; Ahmed, F.; Zou, Z.; Pitropakis, N. DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things. J. King Saud Univ. Comput. Inf. Sci. 2022, 34, 8112–8121. [Google Scholar] [CrossRef]
- Chander, N.; Kumar, M.U. Metaheuristic feature selection with deep learning enabled cascaded recurrent neural network for anomaly detection in Industrial Internet of Things environment. Clust. Comput. 2022, 26, 1801–1819. [Google Scholar] [CrossRef]
- Khacha, A.; Saadouni, R.; Harbi, Y.; Aliouat, Z. Hybrid Deep Learning-based Intrusion Detection System for Industrial Internet of Things. In Proceedings of the 2022 5th International Symposium on Informatics and its Applications (ISIA), M’sila, Algeria, 29–30 November 2022; pp. 1–6. [Google Scholar]
- Alabsi, B.A.; Anbar, M.; Rihan, S.D.A. CNN-CNN: Dual Convolutional Neural Network Approach for Feature Selection and Attack Detection on Internet of Things Networks. Sensors 2023, 23, 6507. [Google Scholar] [CrossRef] [PubMed]
- Otoum, Y.; Liu, D.; Nayak, A. DL-IDS: A deep learning–based intrusion detection framework for securing IoT. Trans. Emerg. Telecommun. Technol. 2022, 33, e3803. [Google Scholar] [CrossRef]
- Alohali, M.A.; Elsadig, M.; Al-Wesabi, F.N.; Al Duhayyim, M.; Hilal, A.M.; Motwakel, A. Blockchain Assisted Op-timal Machine Learning Based Cyberattack Detection and Classification Scheme. Comput. Syst. Sci. Eng. 2023, 46, 3583–3598. [Google Scholar] [CrossRef]
- Huma, Z.E.; Latif, S.; Ahmad, J.; Idrees, Z.; Ibrar, A.; Zou, Z.; Alqahtani, F.; Baothman, F. A Hybrid Deep Random Neural Network for Cyberattack Detection in the Industrial Internet of Things. IEEE Access 2021, 9, 55595–55605. [Google Scholar] [CrossRef]
- Al-Abassi, A.; Karimipour, H.; Dehghantanha, A.; Parizi, R.M. An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System. IEEE Access 2020, 8, 83965–83973. [Google Scholar] [CrossRef]
- Alkatheiri, M.S.; Alghamdi, A.S. Blockchain-Assisted Cybersecurity for the Internet of Medical Things in the Healthcare Industry. Electronics 2023, 12, 1801. [Google Scholar] [CrossRef]
- Hashim, F.A.; Houssein, E.H.; Hussain, K.; Mabrouk, M.S.; Al-Atabany, W. Honey Badger Algorithm: New me-taheuristic algorithm for solving optimization problems. Math. Comput. Simul. 2022, 192, 84–110. [Google Scholar] [CrossRef]
- Jin, C.; Li, S.; Zhang, L.; Zhang, D. The Improvement of the Honey Badger Algorithm and Its Application in the Location Problem of Logistics Centers. Appl. Sci. 2023, 13, 6805. [Google Scholar] [CrossRef]
- Yan, Y.; Yin, X.-C.; Li, S.; Yang, M.; Hao, H.-W. Learning Document Semantic Representation with Hybrid Deep Belief Network. Comput. Intell. Neurosci. 2015, 2015, 650527. [Google Scholar] [CrossRef]
- Xue, J.; Shen, B. Dung beetle optimizer: A new meta-heuristic algorithm for global optimization. J. Supercomput. 2022, 79, 7305–7336. [Google Scholar] [CrossRef]
- Tu, N.; Fan, Z. IMODBO for Optimal Dynamic Reconfiguration in Active Distribution Networks. Processes 2023, 11, 1827. [Google Scholar] [CrossRef]
- Canadian Institute for Cybersecurity (CIS). NSL-KDD Dataset. Available online: https://www.unb.ca/cic/datasets/nsl.html (accessed on 15 March 2022).
- Abu Al-Haija, Q.; Zein-Sabatto, S. An Efficient Deep-Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks. Electronics 2020, 9, 2152. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).