EconPapers    
Economics at your fingertips  
 

A Hybrid Deep Learning Model with Self-Improved Optimization Algorithm for Detection of Security Attacks in IoT Environment

Amit Sagu, Nasib Singh Gill, Preeti Gulia, Jyotir Moy Chatterjee and Ishaani Priyadarshini ()
Additional contact information
Amit Sagu: Department of Computer Science & Applications, Maharshi Dayanand University, Rohtak 124001, India
Nasib Singh Gill: Department of Computer Science & Applications, Maharshi Dayanand University, Rohtak 124001, India
Preeti Gulia: Department of Computer Science & Applications, Maharshi Dayanand University, Rohtak 124001, India
Jyotir Moy Chatterjee: Department of Information Technology, Lord Buddha Education Foundation, Kathmandu 44600, Nepal
Ishaani Priyadarshini: School of Information, University of California, Berkeley, CA 94720-5800, USA

Future Internet, 2022, vol. 14, issue 10, 1-15

Abstract: With the growth of the Internet of Things (IoT), security attacks are also rising gradually. Numerous centralized mechanisms have been introduced in the recent past for the detection of attacks in IoT, in which an attack recognition scheme is employed at the network’s vital point, which gathers data from the network and categorizes it as “Attack” or “Normal”. Nevertheless, these schemes were unsuccessful in achieving noteworthy results due to the diverse necessities of IoT devices such as distribution, scalability, lower latency, and resource limits. The present paper proposes a hybrid model for the detection of attacks in an IoT environment that involves three stages. Initially, the higher-order statistical features (kurtosis, variance, moments), mutual information (MI), symmetric uncertainty, information gain ratio (IGR), and relief-based features are extracted. Then, detection takes place using Gated Recurrent Unit (GRU) and Bidirectional Long Short-Term Memory (Bi-LSTM) to recognize the existence of network attacks. For improving the classification accuracy, the weights of Bi-LSTM are optimally tuned via a self-upgraded Cat and Mouse Optimizer (SU-CMO). The improvement of the employed scheme is established concerning a variety of metrics using two distinct datasets which comprise classification accuracy, and index, f-measure and MCC. In terms of all performance measures, the proposed model outperforms both traditional and state-of-the-art techniques.

Keywords: Bi-LSTM; GRU; IoT; optimization; security attack detection (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2022
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/1999-5903/14/10/301/pdf (application/pdf)
https://www.mdpi.com/1999-5903/14/10/301/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:14:y:2022:i:10:p:301-:d:947075

Access Statistics for this article

Future Internet is currently edited by Ms. Grace You

More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jftint:v:14:y:2022:i:10:p:301-:d:947075