TR
EN
A Novel Hybrid IoT Based IDS Using Binary Grey Wolf Optimizer (BGWO) and Naive Bayes (NB)
Abstract
One of the main objectives of intelligent environments is to enhance the quality of human life standard in terms of efficiency and comfort. The Internet of Things (IoT) model has newly evolved into the technology for establishing smart environments. IoT refers to physical things or devices which are able to exchange information with other devices. It is used in various fields such as smart home, smart city, industrial control, automobile industry, agriculture, intelligent transportation, home automation and appliances, healthcare, and many other fields. Moreover, it assures innovative business paradigms and advanced user experience. Privacy and security are counted as the key problems in any real-world intelligent environment for the IoT paradigm. Therefore, to implement the security of the IoT systems is becoming the first priority and big area of interest in the successful distribution of IoT networks. The open holes of security in IoT related systems create security risks that impact the smart applications. Mirai botnet is an example of one of the novel attacks that launched recently. The network of IoT is protected with authentication and encryption, but it can’t be mitigated against malicious and harmful attacks. Thus, IoT based Intrusion Detection System (IDS) is required to detect the attacks. In this paper, a novel hybrid IoT based IDS using Binary Grey wolf optimizer (BGWO) and Naive Bayes (NB) is presented to defend and secure intrusions on the IoT network. BGWO is used as feature selection and NB as a classification method. The results are compared with other optimization algorithms. The BoT-IoT data set is used as an experimental data set.
Keywords
Kaynakça
- Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer networks, 54(15), 2787-2805.
- Benabdessalem, R., Hamdi, M., & Kim, T. H. (2014, December). A survey on security models, techniques, and tools for the internet of things. In 2014 7th International Conference on Advanced Software Engineering and Its Applications (pp. 44-48). IEEE.
- Olasupo, T. O. (2019). Wireless communication modeling for the deployment of tiny IoT devices in rocky and mountainous environments. IEEE Sensors Letters, 3(7), 1-4. Roy, S. K., Misra, S., & Raghuwanshi, N. S. (2019). SensPnP: Seamless integration of heterogeneous sensors with IoT devices. IEEE Transactions on Consumer Electronics, 65(2), 205-214.
- Yang, Y., Zheng, X., Guo, W., Liu, X., & Chang, V. (2019). Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system. Information Sciences, 479, 567-592.
- Meneghello, F., Calore, M., Zucchetto, D., Polese, M., & Zanella, A. (2019). IoT: Internet of Threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet of Things Journal, 6(5), 8182-8201.
- Evans, D. (2011). The internet of things: How the next evolution of the internet is changing everything. CISCO white paper, 1(2011), 1-11. Yuan, X., Li, C., & Li, X. (2017, May). DeepDefense: identifying DDoS attack via deep learning. In 2017 IEEE International Conference on Smart Computing (SMARTCOMP) (pp. 1-8). IEEE.
- Greenberg, A. (2016). The Jeep hackers are back to prove car hacking can get much worse. Wired Magazine, 8.
- Raywood, D. (2016). Defcon: Thermostat control hacked to host ransomware.
Ayrıntılar
Birincil Dil
İngilizce
Konular
Mühendislik
Bölüm
Araştırma Makalesi
Yayımlanma Tarihi
5 Ekim 2020
Gönderilme Tarihi
3 Ekim 2020
Kabul Tarihi
5 Ekim 2020
Yayımlandığı Sayı
Yıl 2020