A Hybrid Deep Learning Model with Self-Improved Optimization Algorithm for Detection of Security Attacks in IoT Environment
Amit Sagu,
Nasib Singh Gill,
Preeti Gulia,
Jyotir Moy Chatterjee and
Ishaani Priyadarshini ()
Additional contact information
Amit Sagu: Department of Computer Science & Applications, Maharshi Dayanand University, Rohtak 124001, India
Nasib Singh Gill: Department of Computer Science & Applications, Maharshi Dayanand University, Rohtak 124001, India
Preeti Gulia: Department of Computer Science & Applications, Maharshi Dayanand University, Rohtak 124001, India
Jyotir Moy Chatterjee: Department of Information Technology, Lord Buddha Education Foundation, Kathmandu 44600, Nepal
Ishaani Priyadarshini: School of Information, University of California, Berkeley, CA 94720-5800, USA
Future Internet, 2022, vol. 14, issue 10, 1-15
Abstract:
With the growth of the Internet of Things (IoT), security attacks are also rising gradually. Numerous centralized mechanisms have been introduced in the recent past for the detection of attacks in IoT, in which an attack recognition scheme is employed at the network’s vital point, which gathers data from the network and categorizes it as “Attack” or “Normal”. Nevertheless, these schemes were unsuccessful in achieving noteworthy results due to the diverse necessities of IoT devices such as distribution, scalability, lower latency, and resource limits. The present paper proposes a hybrid model for the detection of attacks in an IoT environment that involves three stages. Initially, the higher-order statistical features (kurtosis, variance, moments), mutual information (MI), symmetric uncertainty, information gain ratio (IGR), and relief-based features are extracted. Then, detection takes place using Gated Recurrent Unit (GRU) and Bidirectional Long Short-Term Memory (Bi-LSTM) to recognize the existence of network attacks. For improving the classification accuracy, the weights of Bi-LSTM are optimally tuned via a self-upgraded Cat and Mouse Optimizer (SU-CMO). The improvement of the employed scheme is established concerning a variety of metrics using two distinct datasets which comprise classification accuracy, and index, f-measure and MCC. In terms of all performance measures, the proposed model outperforms both traditional and state-of-the-art techniques.
Keywords: Bi-LSTM; GRU; IoT; optimization; security attack detection (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2022
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/1999-5903/14/10/301/pdf (application/pdf)
https://www.mdpi.com/1999-5903/14/10/301/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:14:y:2022:i:10:p:301-:d:947075
Access Statistics for this article
Future Internet is currently edited by Ms. Grace You
More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().