Hybrid Deep Learning Techniques for Improved Anomaly Detection in IoT Environments

Authors

  • Hanan Abbas Mohammad University of Kirkuk

DOI:

https://doi.org/10.31185/wjcms.323

Keywords:

CICIoT2023 Dataset, Feature scaling, IoT Security, Deep learning, LSTM Models, Whale optimization algorithm (WOA), Detect IoT Attacks.

Abstract

The Internet of Things (IoT) is no longer limited to single personalities, but rather, it is a perceptions that has widely increased and spread in some applications or fields. The mechanism for communicating between IoT devices similarity works as traditional communication between hosts. However, the growing use of IoT has been gaining the interest of a growing number of attackers. Hence, a number of researchers are attempting to build an intrusion detection system utilizing machine learning and deep learning algorithms. In this work, a novel attack detection model is proposed by superimposing Whale Optimization Algorithm and Bidirectional Long Short-Term Memory (WB-LSTM) together. There are numerous deep learning competencies, but LSTM is one of the ones used to interpret big data or time series data. But, it is not easy to find what is the best weights for LSTMs in order to directly achieve performance. The LSTM results were 99.1%. Hence, in this work, we introduce the WOA-LSTM hybrid model, that utilizes WOA for finding the optimal weights for a network based on LSTM, and is used to detect the IoT attacks. The 99.98% was obtained from the WOA-LSTM hybrid model.

Downloads

Download data is not yet available.

References

[1] S. U. Qureshi, J. He, S. Tunio, N. Zhu, A. Nazir, A. Wajahat, ... & A. Wadud, “Systematic review of deep learning solutions for malware detection and forensic analysis in IoT,” Journal of King Saud University-Computer and Information Sciences, vol. 102164, 2024, doi: 10.1016/j.jksuci.2024.102164.

[2] A. Goni, M. U. F. Jahangir, & R. R. Chowdhury, “A study on cyber security: Analyzing current threats, navigating complexities, and implementing prevention strategies,” International Journal of Research and Scientific Innovation, vol. 10, no. 12, pp. 507-522, 2024, doi: unavailable.

[3] F. N. U. Jimmy, “Cyber security vulnerabilities and remediation through cloud security tools,” Journal of Artificial Intelligence General Science (JAIGS), vol. 2, no. 1, pp. 129-171, 2024, doi: unavailable.

[4] H. Sun, H. V. Burton, & H. Huang, “Machine learning applications for building structural design and performance assessment: State-of-the-art review,” Journal of Building Engineering, vol. 33, p. 101816, 2021, doi: 10.1016/j.jobe.2020.101816.

[5] N. Burkart, & M. F. Huber, “A survey on the explainability of supervised machine learning,” Journal of Artificial Intelligence Research, vol. 70, pp. 245-317, 2021, doi: 10.1613/jair.1.12228.

[6] G. C. Cawley, & N. L. Talbot, “On over-fitting in model selection and subsequent selection bias in performance evaluation,” The Journal of Machine Learning Research, vol. 11, pp. 2079-2107, 2010, doi: unavailable.

[7] J. Wang, & F. Biljecki, “Unsupervised machine learning in urban studies: A systematic review of applications,” Cities, vol. 129, p. 103925, 2022, doi: 10.1016/j.cities.2022.103925.

[8] N. K. Neeraj, & V. Maurya, “A review on machine learning (feature selection, classification and clustering) approaches of big data mining in different areas of research,” Journal of Critical Reviews, vol. 7, no. 19, pp. 2610-2626, 2020, doi: unavailable.

[9] P. C. Sen, M. Hajra, & M. Ghosh, “Supervised classification algorithms in machine learning: A survey and review,” in Emerging Technology in Modelling and Graphics: Proceedings of IEM Graph 2018, Singapore: Springer, 2020, pp. 99-111, doi: 10.1007/978-981-13-7403-6_10.

[10] I. A. Abdulmajeed & I. M. Husien, “MLIDS22- IDS Design by Applying Hybrid CNN-LSTM Model on Mixed-Datasets,” Informatica (Slovenia), vol. 46, no. 8, pp. 121–134, 2022, doi: 10.31449/inf.v46i8.4348.

[11] H. A. Mohammad, & I. M. Husien, “Machine Learning Algorithms and for robust IoT attack detection: A review,” Informatica, vol. 48, no. 12, pp. 55-64, 2024, doi: unavailable.

[12] I. A. Abdulmajeed & I. M. Husien, “Machine Learning Algorithms and Datasets for Modern IDS Design,” in Proceedings - 2022 IEEE International Conference on Cybernetics and Computational Intelligence, CyberneticsCom 2022, 2022, doi: 10.1109/CyberneticsCom55287.2022.9865255.

[13] M. Ahmed, & I. Husien, “Heart Disease Prediction Using Hybrid Machine Learning: A Brief Review,” Journal of Robotics and Control (JRC), vol. 5, no. 3, pp. 884-892, 2024, doi: unavailable.

[14] A. G. Philipo, D. S. Sarwatt, J. Ding, M. Daneshmand, & H. Ning, “Cyberbullying detection: Exploring datasets, technologies, and approaches on social media platforms,” arXiv preprint, arXiv:2407.12154, 2024, doi: unavailable.

[15] Y. Ban, D. Zhang, Q. He, & Q. Shen, “APSO-CNN-SE: An adaptive convolutional neural network approach for IoT intrusion detection,” Computers, Materials & Continua, vol. 81, no. 1, 2024, doi: unavailable.

[16] H. C. Altunay, & Z. Albayrak, “A hybrid CNN+ LSTM-based intrusion detection system for industrial IoT networks,” Engineering Science and Technology, an International Journal, vol. 38, p. 101322, 2023, doi: 10.1016/j.jestch.2022.101322.

[17] M. Zeeshan, Q. Riaz, M. A. Bilal, M. K. Shahzad, H. Jabeen, S. A. Haider, & A. Rahim, “Protocol-based deep intrusion detection for DoS and DDoS attacks using UNSW-NB15 and Bot-IoT datasets,” IEEE Access, vol. 10, pp. 2269-2283, 2021, doi: 10.1109/ACCESS.2021.3053957.

[18] Vu, L., Nguyen, Q. U., Nguyen, D. N., Hoang, D. T., & Dutkiewicz, E. (2020). Deep transfer learning for IoT attack detection. IEEE Access, 8, 107335-107344.

[19] B. U. A. Stephen, B. C. Uzoewulu, P. M. Asuquo, & S. Ozuomba, “Diabetes and hypertension mobile health systems: A review of general challenges and advancements,” Journal of Engineering and Applied Science, vol. 70, no. 1, p. 78, 2023, doi: unavailable.

[20] A. Y. Hussein, P. Falcarin, & A. T. Sadiq, “Enhancement performance of random forest algorithm via one hot encoding for IoT IDS,” Periodicals of Engineering and Natural Sciences, vol. 9, no. 3, pp. 579-591, 2021, doi: unavailable.

[21] D. H. Mustafa, & I. M. Husien, “Adaptive DBSCAN with Grey Wolf Optimizer for Botnet Detection,” International Journal of Intelligent Engineering and Systems, vol. 16, no. 4, pp. 409–421, 2023, doi: 10.22266/ijies2023.0831.33.

[22] M. Ahmed, & I. Husien, “Hybrid Machine Learning Approach for Accurate Heart Disease Prediction,” International Journal of Intelligent Engineering and Systems, vol. 17, no. 4, pp. 728–737, 2024, doi: 10.22266/IJIES2024.0831.55.

[23] T. Ige, C. Kiekintveld, A. Piplai, A. Wagler, O. Kolade, & B. Matti, “Towards an in-depth evaluation of the performance, suitability and plausibility of few-shot meta transfer learning on an unknown out-of-distribution cyber-attack detection,” 2024, doi: unavailable.

[24] A. Berqia, H. Bouijij, A. Merimi, & A. Ouaggane, “Detecting DDoS attacks using machine learning in IoT environment,” in 2024 International Conference on Intelligent Systems and Computer Vision (ISCV), IEEE, 2024, pp. 1-8, doi: 10.1109/ISCV.2024.9456205.

[25] S. H. Rafique, A. Abdallah, N. S. Musa, & T. Murugan, “Machine learning and deep learning techniques for internet of things network anomaly detection—current research trends,” Sensors, vol. 24, no. 6, p. 1968, 2024, doi: 10.3390/s24061968.

[26] M. A. Ferrag, M. Ndhlovu, N. Tihanyi, L. C. Cordeiro, M. Debbah, T. Lestable, & N. S. Thandi, “Revolutionizing cyber threat detection with large language models: A privacy-preserving BERT-based lightweight model for IoT/IIoT devices,” IEEE Access, 2024, doi: unavailable.

[27] Y. Lin, “Enhanced Detection of Anomalous Network Behavior in Cloud-Driven Big Data Systems Using Deep Learning Models,” Journal of Theory and Practice of Engineering Science, vol. 4, no. 08, pp. 1-11, 2024, doi: unavailable.

[28] S. Chandio, J. A. Laghari, M. A. Bhayo, M. A. Koondhar, Y. S. Kim, B. B. Graba, and E. Touti, “Machine Learning-Based Multiclass Anomaly Detection and Classification in Hybrid Active Distribution Networks,” IEEE Access, 2024, doi: unavailable.

[29] P. Suebsombut, A. Sekhari, P. Sureephong, A. Belhi, and A. Bouras, "Field data forecasting using LSTM and Bi-LSTM approaches," Applied Sciences, vol. 11, no. 24, p. 11820, 2021, doi: 10.3390/app112411820.

[30] X. Fan and R. Yang, "A network intrusion detection method based on improved Bi-LSTM in Internet of Things environment," International Journal of Information Technologies and Systems Approach (IJITSA), vol. 16, no. 3, pp. 1–14, 2023, doi: 10.4018/IJITSA.321738.

[31] B. Kaur, S. Dadkhah, F. Shoeleh, E. C. P. Neto, P. Xiong, S. Iqbal, ... and A. A. Ghorbani, “Internet of Things (IoT) Security Dataset Evolution: Challenges and Future Directions,” Internet of Things, vol. 22, p. 100780, 2023, doi: 10.1016/j.iot.2023.100780.

[32] A. Zohourian, S. Dadkhah, E. C. P. Neto, H. Mahdikhani, P. K. Danso, H. Molyneaux, and A. A. Ghorbani, “IoT Zigbee Device Security: A Comprehensive Review,” Internet of Things, vol. 22, p. 100791, 2023, doi: 10.1016/j.iot.2023.100791.

[33] R. Lu, K. Heung, A. H. Lashkari, and A. A. Ghorbani, “A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT,” IEEE Access, vol. 5, pp. 3302-3312, 2017, doi: 10.1109/ACCESS.2017.2684183.

[34] F. Ghorbani, A. Ahmadi, M. Kia, Q. Rahman, and M. Delrobaei, “A Decision-Aware Ambient Assisted Living System with IoT Embedded Device for In-Home Monitoring of Older Adults,” Sensors, vol. 23, no. 5, p. 2673, 2023, doi: 10.3390/s23052673.

[35] J. Sangeetha and U. Kumaran, “A Hybrid Optimization Algorithm Using BiLSTM Structure for Sentiment Analysis,” Measurement: Sensors, vol. 25, p. 100619, 2023, doi: 10.1016/j.measen.2023.100619.

[36] S. Mirjalili and A. Lewis, “The Whale Optimization Algorithm,” Advances in Engineering Software, vol. 95, pp. 51-67, 2016, doi: 10.1016/j.advengsoft.2016.01.008.

[37] Li, Y., Meng, C., Tian, J., Fang, Z., & Cao, H. (2024). Data-Driven Customer Online Shopping Behavior Analysis and Personalized Marketing Strategy. Journal of Organizational and End User Computing (JOEUC), 36(1), 1-22.

[38] M. Marjani, F. Nasaruddin, A. Gani, A. Karim, I. A. T. Hashem, A. Siddiqa, and I. Yaqoob, “Big IoT Data Analytics: Architecture, Opportunities, and Open Research Challenges,” IEEE Access, vol. 5, pp. 5247-5261, 2017, doi: 10.1109/ACCESS.2017.2689040.

[37] Sayed, G. I., Darwish, A., & Hassanien, A. E. (2020). Binary whale optimization algorithm and binary moth flame optimization with clustering algorithms for clinical breast cancer diagnoses. Journal of Classification, 37(1), 66-96.‏

[38] Osman, Ismail Namiq, and Idress Mohammed Husien. "Comparison of Sentiment Analysis Techniques for Twitter posts classification." 2022 International Conference on Data Science and Intelligent Computing (ICDSIC). IEEE, 2022.

[39] Abdalrada, Ahmad, Ali Fahem Neamah, and Hayder Murad. "Predicting Diabetes Disease Occurrence Using Logistic Regression: An Early Detection Approach." Iraqi Journal For Computer Science and Mathematics 5.1 (2024): 160-167.‏

[40] Anwer, Zainab Alwan, Ahmad Shaker Abdalrada, and Ihtiram Raza Khan. "Assessing Institutional Performance Using Machine Learning Algorithms." Wasit Journal of Computer and Mathematics Science 3.3 (2024).

Downloads

Published

2024-12-30

Issue

Section

Computer

How to Cite

[1]
H. Abbas Mohammad, “Hybrid Deep Learning Techniques for Improved Anomaly Detection in IoT Environments”, WJCMS, vol. 3, no. 4, pp. 62–77, Dec. 2024, doi: 10.31185/wjcms.323.