Deep Learning Model with Normalized Bayesian Optimizer for Anomaly Classification in IoT Security

International Journal of Electronics and Communication Engineering
© 2024 by SSRG - IJECE Journal
Volume 11 Issue 8
Year of Publication : 2024
Authors : Jisha Jose, J. E. Judith
pdf
How to Cite?

Jisha Jose, J. E. Judith, "Deep Learning Model with Normalized Bayesian Optimizer for Anomaly Classification in IoT Security," SSRG International Journal of Electronics and Communication Engineering, vol. 11,  no. 8, pp. 185-199, 2024. Crossref, https://doi.org/10.14445/23488549/IJECE-V11I8P119

Abstract:

The Internet of Things (IoT) stands as a pivotal facilitator of technology, garnering considerable attention from the global scientific community. Nevertheless, the proliferation of IoT devices and the vast amounts of data they accumulate pose a significant vulnerability to an array of security threats and susceptibilities. The growing adoption of IoT infrastructure has given rise to challenges, including node failures, heightened threats, and increased susceptibility to attacks, anomalies, and potential security breaches. Addressing and mitigating these issues constitute a pivotal domain within the overarching realm of IoT. The current study presents a novel approach for anomaly classification in IoT Security by employing a Convolutional Neural Network (CNN) with feature optimization via the Normalized Bayesian Optimization Algorithm (NBOA). This research strives to enhance anomaly detection accuracy beyond the limitations of conventional CNN models. The proposed CNN is trained using meticulously optimized features extracted from the extensive IoT23 dataset, which is provided in CSV format. The utilization of this dataset results in notably superior performance, contributing to the overall effectiveness of the proposed anomaly detection approach. The proposed model attains an impressive accuracy of 98.69%, outperforming standard CNN models. The methodology entails leveraging NBOA for fine-tuning feature selection, thereby augmenting the model's ability to discern anomalies based on input values.

Keywords:

IoT, Deep Learning model (DL), Bayesian optimization, Anomaly detection, Classification.

References:

[1] Antar Shaddad Abdul-Qawyet al., “The Internet of Things (IoT): An Overview,” International Journal of Engineering Research and Applications, vol. 5, no. 12, pp. 71-82, 2015.
[Google Scholar] [Publisher Link]
[2] Joseph Louis, and Phillip S. Dunston, “Integrating IoT Into Operational Workflows for Real-Time and Automated Decision-Making in Repetitive Construction Operations,” Automation in Construction, vol. 94, pp. 317-327, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Vignesh Govindraj, Mithileysh Sathiyanarayanan, and Babangida Abubakar, “Customary Homes to Smart Homes Using Internet of Things (IoT) and Mobile Application,” 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon), Bengaluru, India, pp. 1059-1063, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Sharath Anand, and Sudhir K. Routray, “Issues and Challenges in Healthcare Narrowband IoT,” 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore, India, pp. 486-489, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Ashwini Deshpande, Prajakta Pitale, and Sangita Sanap, “Industrial Automation Using Internet of Things (IOT),” International Journal of Advanced Research in Computer Engineering & Technology, vol. 5, no. 2, pp. 266-269, 2016.
[Google Scholar]
[6] Viraaji Mothukuri et al., “Federated-Learning-based Anomaly Detection for IoT Security Attacks,” IEEE Internet of Things Journal, vol. 9, no. 4, pp. 2545-2554, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Sundar Krishnan, Ashar Neyaz, and Qingzhong Liu, “IoT Network Attack Detection using Supervised Machine Learning,” International Journal of Artificial Intelligence and Expert Systems, vol. 10, no. 2, pp. 18-32, 2021.
[Google Scholar] [Publisher Link]
[8] Giampaolo Casolla et al., “Exploring Unsupervised Learning Techniques for the Internet of Things,” IEEE Transactions on Industrial Informatics, vol. 16, no. 4, pp. 2621-2628, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Shailendra Rathore, and Jong Hyuk Park, “Semi-Supervised Learning Based Distributed Attack Detection Framework for IoT,” Applied Soft Computing, vol. 72, pp. 79-89, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Francesco Cauteruccio et al., “A Framework for Anomaly Detection and Classification in Multiple IoT Scenarios,” Future Generation Computer Systems, vol. 114, pp. 322-335, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Tom Lawrence, and Li Zhang, “IoTNet: An Efficient and Accurate Convolutional Neural Network for IoT Devices,” Sensors, vol. 19, no. 24, pp. 1-27, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Krishna Chaitanya Atmakuri, and Y. Venkata Raghava Rao, “An IOT Based Novel Approach to Predict Air Quality Index (AQI) Using Optimized Bayesian Networks,” Journal of Mechanics of Continua and Mathematical Sciences, vol. 14, no. 2, pp. 482-497, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Sanjay Chakraborty et al., “Detection and Classification of Novel Attacks and Anomaly in IoT Network Using Rule Based Deep Learning Model,” arXiv, pp. 1-11, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Monika Vishwakarma, and Nishtha Kesswani, “A New Two-Phase Intrusion Detection System with Naïve Bayes Machine Learning for Data Classification and Elliptic Envelop Method for Anomaly Detection,” Decision Analytics Journal, vol. 7, pp. 1-8, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Harshit Shah et al., “Deep Learning-Based Malicious Smart Contract and Intrusion Detection System for IoT Environment,” Mathematics, vol. 11, no. 2, pp. 1-22, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Nouman Shamim et al., “Efficient Approach for Anomaly Detection in IoT Using System Calls,” Sensors, vol. 23, no. 2, pp. 1-24, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Albara Awajan, “A Novel Deep Learning-Based Intrusion Detection System for IoT Networks,” Computers, vol. 12, no. 2, pp. 1-17, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Mansi Bhavsar et al., “Anomaly-Based Intrusion Detection System for IoT Application,” Discover Internet of Things, vol. 3, pp. 1-23, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Laura Vigoya et al., “Application of Machine Learning Algorithms for the Validation of a New CoAP-IoT Anomaly Detection Dataset,” Applied Sciences, vol. 13, no. 7, pp. 1-25, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Indrajit Mukherjee, Nilesh Kumar Sahu, and Sudip Kumar Sahana, “Simulation and Modeling for Anomaly Detection in IoT Network Using Machine Learning,” International Journal of Wireless Information Networks, vol. 30, no. 2, pp. 173-189, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Ammar Odeh, and Anas Abu Taleb, “Ensemble-Based Deep Learning Models for Enhancing IoT Intrusion Detection,” Applied Sciences, vol. 13, no. 21, pp. 1-20, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Abbas Yazdinejad et al., “An Ensemble Deep Learning Model for Cyber Threat Hunting in Industrial Internet of Things,” Digital Communications and Networks, vol. 9, no. 1, pp. 101-110, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Chaimae Hazman et al., “lIDS-SIoEL: Intrusion Detection Framework for IoT-Based Smart Environments Security Using Ensemble Learning,” Cluster Computing, vol. 26, no. 6, pp. 4069-4083, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Badar Alwasel et al., “Leveraging Graph-Based Representations to Enhance Machine Learning Performance in IIoT Network Security and Attack Detection,” Applied Sciences, vol. 13, no. 13, pp. 1-16, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Rania A. Elsayed et al., “Securing IoT and SDN Systems Using Deep-Learning Based Automatic Intrusion Detection,” Ain Shams Engineering Journal, vol. 14, no. 10, pp. 1-13, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Tanzila Saba et al., “Anomaly-Based Intrusion Detection System for IoT Networks through Deep Learning Model,” Computers and Electrical Engineering, vol. 99, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Kim-Hung Le et al., “IMIDS: An Intelligent Intrusion Detection System against Cyber Threats in IoT,” Electronics, vol. 11, no. 4, pp. 1- 16, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Unsub Shafiq et al., “Transfer Learning Auto-Encoder Neural Networks for Anomaly Detection of DDoS Generating IoT Devices,” Security and Communication Networks, vol. 2022, no. 1, pp. 1-14, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Ola Salman et al., “A Machine Learning Based Framework for IoT Device Identification and Abnormal Traffic Detection,” Transactions on Emerging Telecommunications Technologies, vol. 33, no. 3, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Imtiaz Ullah, and Qusay H. Mahmoud, “Design and Development of RNN Anomaly Detection Model for IoT Networks,” IEEE Access, vol. 10, pp. 62722-62750, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Kabita Sahoo et al., “Exploratory Data Analysis Using Python,” International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 12, pp. 4727-4735, 2019.
[Google Scholar] [Publisher Link]
[32] Andreas Damianou, and Neil D. Lawrence, “Deep Gaussian Processes,” Proceedings of the Sixteenth International Conference on Artificial Intelligence and Statistics, pp. 207-215, 2013.
[Google Scholar] [Publisher Link]
[33] Muhammad Almas Khan et al., “Voting Classifier-Based Intrusion Detection for IoT Networks,” Advances on Smart and Soft Computing, pp. 313-328, 2022.
[CrossRef] [Google Scholar] [Publisher Link]