$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

[국내논문] Genetic Algorithm based hyperparameter tuned CNN for identifying IoT intrusions

KSII Transactions on internet and information systems : TIIS, v.18 no.3, 2024년, pp.755 - 778  

Alexander. R (Department of Computing Technologies, SRM Institute of Science and Technology) ,  Pradeep Mohan Kumar. K (Department of Computing Technologies, SRM Institute of Science and Technology)

Abstract AI-Helper 아이콘AI-Helper

In recent years, the number of devices being connected to the internet has grown enormously, as has the intrusive behavior in the network. Thus, it is important for intrusion detection systems to report all intrusive behavior. Using deep learning and machine learning algorithms, intrusion detection ...

주제어

표/그림 (25)

AI 본문요약
AI-Helper 아이콘 AI-Helper

제안 방법

  • The probabilistic model genetic algorithm's overall chromosome structure thus consists of 13 genes and the concept of evolving the CNN model to the chromosome is borrowed from this work [36]. No significant changes have been made because the goal of our research was to adapt the evolutionary algorithm to deal with large-scale, multidimensional data in the IoT environment by using the Bayesian approach. The gene structure thus resembles the one described in [36], with the addition of the feature map CNN being the only variation made at this level.
  • The concept is examined using the CIC-IDS 2017 [21] and CIC-DDoS 2019 datasets, and the proposed methodology is compared to other cutting-edge techniques for higher accuracy and shorter latency.
  • The method proposed in this study better automates the hyperparameter selection by utilizing the CNN feature map and an enhanced genetic compact algorithm. For executing the categorization of IoT-IDS network traffic, the genetic algorithm is used to achieve the goal of obtaining a superior neural network with automatic adjustments.
  • As illustrated in the figure, traffic generated by various IoT devices and received in the fog network is handled by multiple subcomponents to determine the traffic's location. The proposed methodology is specifically deployed inside the detection module, where the regular IDS runs and takes care of the classification of the traffic.
  • This study expands on DeepNEAT's concept [19], in which the neural arrangement is transformed into a chromosome of the Extended Compact Genetic Algorithm(eCGA), in order to eliminate the issue of manually setting up the hyperparameter values and to provide a superior latency IDS
  • Though there is a wide variety of intrusion datasets are available for the public, to carry out this work specific two variations of the IoT-IDS dataset CIC-IDS2017 and CIC-IDS2018 dataset. The Canadian Institute for Cybersecurity dataset 2017 and 2018 is chosen because of its closeness towards the real IoT traffic data.

이론/모형

  • An algorithmic approach for performing hyperparameter tuning is proposed in [50], where the arithmetic optimization algorithm is enhanced to improve the candidate solution's performance. The AutoML technique is used along with the ensembled strategy for the ideal selection of hyperparameters for the supervised setup using the voting mechanism proposed in [51]. Though these approaches propose a strategy for hyperparameter tuning, their major limitation is their inability to handle varied forms and volumes of data, which makes them require human assistance at some stage.
  • The best characteristics are chosen for the classification task using a method called multi-objective particle swarm optimization with a Levy flight randomization component (MOPSO-Lévy), which is suggested in [35]
  • So to address the concerns of having low latency with a higher degree of parallelism, a novel approach using the Bayesian genetic technique is proposed to address the problem of manual ideal hyperparameter setting. The idea comes from the probabilistic model-building genetic algorithm (PMBGA) that operates based on the probability distribution recorded by the Bayesian network. This study expands on DeepNEAT's concept [19], in which the neural arrangement is transformed into a chromosome of the Extended Compact Genetic Algorithm(eCGA), in order to eliminate the issue of manually setting up the hyperparameter values and to provide a superior latency IDS.
본문요약 정보가 도움이 되었나요?

참고문헌 (51)

  1. Khan. R, Khan. S.U, Zaheer. R, and Khan. S, "Future internet: the internet of things architecture, possible applications and key challenges," in Proc. of 2012 10th international conference on frontiers of information technology, pp. 257-260, Dec. 2012. 

  2. Perera. C and Vasilakos. A.V, "A knowledge-based resource discovery for Internet of Things," Knowledge-Based Systems, 109, pp. 122-136, 2016. 

  3. Al-Fuqaha. A, Guizani. M, Mohammadi. M, Aledhari. M, and Ayyash. M, "Internet of things: A survey on enabling technologies, protocols, and applications," IEEE communications surveys & tutorials, 17(4), pp. 2347-2376, 2015. 

  4. Mid-Year Update: SonicWall Cyber Threat Report, 2022. [Online]. Available: https://www.sonicwall.com/resources/white-papers/mid-year-2022-sonicwall-cyber-threat-report/ 

  5. Forestiero. A, "Metaheuristic algorithm for anomaly detection in Internet of Things leveraging on a neural-driven multiagent system," Knowledge-Based Systems, 228, p. 107241, 2021. 

  6. Hassan. M, Huda. S, Sharmeen. S, Abawajy. J, and Fortino. G, "An adaptive trust boundary protection for IIoT networks using deep-learning feature-extraction-based semisupervised model," IEEE Transactions on Industrial Informatics, 17(4), pp. 2860-2870, 2021. 

  7. Vijayakumar. D.S and Ganapathy. S, "Machine Learning Approach to Combat False Alarms in Wireless Intrusion Detection System," Comput. Inf. Sci., 11(3), pp. 67-81, 2018. 

  8. Hindy. H, Bayne. E, Bures. M, Atkinson. R, Tachtatzis. C, and Bellekens. X, "Machine learning based IoT intrusion detection system: An MQTT case study (MQTT-IoT-IDS2020 dataset)," in Proc. of 12th International Networking Conference: INC, pp. 73-84, 2021. 

  9. Al-Omari. M, Rawashdeh. M, Qutaishat. F, Alshira'H. M, and Ababneh. N, "An intelligent tree-based intrusion detection model for cyber security," Journal of Network and Systems Management, 29, pp. 1-18, 2021. 

  10. Vijayakumar. D.S and Ganapathy. S, "Multistage ensembled classifier for wireless intrusion detection system," Wireless Personal Communications, 122(1), pp. 645-668, 2022. 

  11. de Araujo-Filho. P.F, Kaddoum. G, Campelo. D.R, Santos. A.G, Macedo. D, and Zanchettin. C, "Intrusion detection for cyber-physical systems using generative adversarial networks in fog environment," IEEE Internet of Things Journal, 8(8), pp. 6247-6256, 2021. 

  12. Chen. Y, Ashizawa. N, Yeo. C.K, Yanai. N, and Yean. S, "Multi-scale self-organizing map assisted deep autoencoding Gaussian mixture model for unsupervised intrusion detection," Knowledge-Based Systems, 224, pp. 107086, 2021. 

  13. Ravi. N and Shalinie. S.M, "Semisupervised-learning-based security to detect and mitigate intrusions in IoT network," IEEE Internet of Things Journal, 7(11), pp. 11041-11052, 2020. 

  14. Suganuma. M, Shirakawa. S, and Nagao. T, "A genetic programming approach to designing convolutional neural network architectures," in Proc. of the genetic and evolutionary computation conference, pp. 497-504, 2017. 

  15. Stanley. K.O and Miikkulainen. R, "Evolving neural networks through augmenting topologies," Evolutionary computation, 10(2), pp. 99-127, 2002. 

  16. Yao. X and Liu. Y, "A new evolutionary system for evolving artificial neural networks," IEEE transactions on neural networks, 8(3), pp. 694-713, 1997. 

  17. Angeline. P.J, Saunders. G.M, and Pollack. J.B, "An evolutionary algorithm that constructs recurrent neural networks," IEEE transactions on Neural Networks, 5(1), pp. 54-65, 1994. 

  18. Miikkulainen. R, Liang. J, Meyerson. E, Rawal. A, Fink. D, Francon. O, Raju. B, Shahrzad. H, Navruzyan. A, Duffy. N, and Hodjat. B, "Evolving deep neural networks," in Artificial intelligence in the age of neural networks and brain computing, Academic Press, 2019, pp. 293-312. 

  19. Nayak. J, Naik. B, Dash. P.B, Vimal. S, and Kadry. S, "Hybrid Bayesian optimization hyper tuned catboost approach for malicious access and anomaly detection in IoT nomaly framework," Sustainable Computing: Informatics and Systems, 36, p. 100805, 2022. 

  20. Masum. M, Shahriar. H, Haddad. H, Faruk. M.J.H, Valero. M, Khan. M.A, Rahman. M.A, Adnan. M.I, Cuzzocrea. A, and Wu. F, "Bayesian hyperparameter optimization for deep neural network-based network intrusion detection," in Proc. of 2021 IEEE International Conference on Big Data, pp. 5413-5419, Dec. 2021. 

  21. Sharafaldin. I, Lashkari. A.H, and Ghorbani. A.A, "Toward generating a new intrusion detection dataset and intrusion traffic characterization," in Proc. of ICISSp, 1, pp. 108-116, 2018. 

  22. Ren. Y, Zhang. L, and Suganthan. P.N, "Ensemble classification and regression-recent developments, applications and future directions," IEEE Computational intelligence magazine, 11(1), pp. 41-53, 2016. 

  23. Jabbar. M.A and Aluvalu. R, "RFAODE: A novel ensemble intrusion detection system," Procedia computer science, 115, pp. 226-234, 2017. 

  24. Gaikwad. D.P and Thool. R.C, "Intrusion detection system using bagging ensemble method of machine learning," in Proc. of 2015 international conference on computing communication control and automation, pp. 291-295, Feb. 2015. 

  25. Moustafa. N, Turnbull. B, and Choo. K.K.R, "An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things," IEEE Internet of Things Journal, 6(3), pp. 4815-4830, 2018. 

  26. McLaughlin. N, del Rincon. J.M, Kang. B, Yerima. S, and Miller. P, "Deep android malware detection," in Proc. of the Seventh ACM on Conference on Data and Application Security and Privacy, pp. 301-308, 2017. 

  27. Maghrebi. H, Portigliatti. T, and Prouff. E, "Breaking cryptographic implementations using deep learning techniques," in Proc. of Security, Privacy, and Applied Cryptography Engineering: 6th International Conference, SPACE, pp. 3-26, Dec. 2016. 

  28. Brun. O, Yin. Y, Gelenbe. E, Kadioglu. Y.M, Augusto-Gonzalez. J, and Ramos. M, "Deep learning with dense random neural networks for detecting attacks against IoT-connected home environments," Procedia Computer Science, vol. 134, pp. 458-463, Feb. 2018. 

  29. Diro. A.A and Chilamkurti. N, "Distributed attack detection scheme using deep learning approach for Internet of Things," Future Generation Computer Systems, 82, pp. 761-768, 2018. 

  30. Torres. P, Catania. C, Garcia. S, and Garino. C.G, "An analysis of recurrent neural networks for botnet detection behavior," in Proc. of 2016 IEEE biennial congress of Argentina (ARGENCON), pp. 1-6, 2016. 

  31. Atiga. J, Mbarki. N.E, Ejbali. R, and Zaied. M, "Faulty node detection in wireless sensor networks using a recurrent neural network," in Proc. of Tenth international conference on machine vision (ICMV 2017), Vol. 10696, pp. 711-716, 2018. 

  32. Vu. L, Nguyen. Q.U, Nguyen. D.N, Hoang. D.T, and Dutkiewicz. E, "Learning latent representation for iot anomaly detection," IEEE Transactions on Cybernetics, 52(5), pp. 3769-3782, 2022. 

  33. Abdel-Basset. M, Chang. V, Hawash. H, Chakrabortty. R.K, and Ryan. M, "Deep-IFS: Intrusion detection approach for industrial internet of things traffic in fog environment," IEEE Transactions on Industrial Informatics, 17(11), pp. 7704-7715, 2020. 

  34. Imrana. Y, Xiang. Y, Ali. L, and Abdul-Rauf. Z, "A bidirectional LSTM deep learning approach for intrusion detection," Expert Systems with Applications, 185, p. 115524, 2021. 

  35. Habib. M, Aljarah. I, and Faris. H, "A modified multi-objective particle swarm optimizer-based Levy flight: An approach toward intrusion detection in Internet of Things," Arabian Journal for Science and Engineering, 45, pp. 6081-6108, 2020. 

  36. Chen. Y, Lin. Q, Wei. W, Ji. J, Wong. K.C, and Coello. C.A.C, "Intrusion detection using multi-objective evolutionary convolutional neural network for Internet of Things in Fog computing," Knowledge-Based Systems, 244, p. 108505, 2022. 

  37. Zhu. Y, Liang. J, Chen. J, and Ming. Z, "An improved NSGA-III algorithm for feature selection used in intrusion detection," Knowledge-Based Systems, 116, pp. 74-85, 2017. 

  38. Y.H. Yang, H.Z. Huang, Q.N. Shen, Z.H. Wu, and Y. Zhang, "Research on intrusion detection based on incremental GHSOM," Chinese J. Comput. 37(5), pp. 1216-1224, 2014 

  39. LeCun. Y and Bengio. Y, "Convolutional networks for images, speech, and time series," The handbook of brain theory and neural networks, 3361(10), p. 1995, 1995. 

  40. Kim. J, Shin. Y, and Choi. E, "An intrusion detection model based on a convolutional neural network," Journal of Multimedia Information System, 6(4), pp. 165-172, 2019. 

  41. Kursawe. F, "A variant of evolution strategies for vector optimization," in Proc. of Parallel Problem Solving from Nature: 1st Workshop, pp. 193-197, June. 2005. 

  42. Panigrahi. R and Borah. S, "A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems," International Journal of Engineering & Technology, 7(3.24), pp. 479-482, 2018. 

  43. Assis. M.V, Carvalho. L.F, Lloret. J, and Proenca Jr. M.L, "A GRU deep learning system against attacks in software defined networks," Journal of Network and Computer Applications, 177, p. 102942, 2021. 

  44. Vinayakumar. R, Soman. K.P, and Poornachandran. P, "A comparative analysis of deep learning approaches for network intrusion detection systems (N-IDSs): deep learning for N-IDSs," International Journal of Digital Crime and Forensics (IJDCF), 11(3), pp. 65-89, 2019. 

  45. Gamage. S and Samarabandu. J, "Deep learning methods in network intrusion detection: A survey and an objective comparison," Journal of Network and Computer Applications, 169, p. 102767, 2020. 

  46. Lv. Z, Qiao. L, Li. J, and Song. H, "Deep-learning-enabled security issues in the internet of things," IEEE Internet of Things Journal, 8(12), pp. 9531-9538, 2020. 

  47. Muhammad. G, Hossain. M.S, and Garg. S, "Stacked autoencoder-based intrusion detection system to combat financial fraudulent," IEEE Internet of Things Journal, vol. 10, no. 3, pp. 2071-2078, 2023. 

  48. Altunay. H.C and Albayrak. Z, "A hybrid CNN+ LSTM based intrusion detection system for industrial IoT networks," Engineering Science and Technology, an International Journal, 38, p. 101322, 2023. 

  49. Altunay. H.C and Albayrak. Z, "Network Intrusion Detection Approach Based on Convolutional Neural Network," Avrupa Bilim ve Teknoloji Dergisi, (26), pp. 22-29, 2021. 

  50. Kavitha. S, Uma Maheswari. N, and Venkatesh. R, "Intelligent Intrusion Detection System using Enhanced Arithmetic Optimization Algorithm with Deep Learning Model," Tehnicki vjesnik, 30(4), pp. 1217-1224, 2023. 

  51. Khan. M.A, Iqbal. N, Jamil. H, and Kim. D.H, "An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection," Journal of Network and Computer Applications, 212, p. 103560, 2023. 

관련 콘텐츠

오픈액세스(OA) 유형

GOLD

오픈액세스 학술지에 출판된 논문

이 논문과 함께 이용한 콘텐츠

저작권 관리 안내
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로