Abstract
Internet of things (IoT) technology has gained a reputation in recent years due to its ease of use and adaptability. Due to the amount of sensitive and significant data exchanged over the global Internet, intrusion detection is a challenging task in the vast IoT network. A variety of hostile behaviors and attacks are now detected by intrusion detection systems (IDSs), which are difficult or impossible for a single method to identify. An Improved Binary Golden Jackal Optimization (IBGJO) algorithm and Long Short-Term Memory (LSTM) network are used in this paper to develop a new IDS model for IoT networks. Firstly, the GJO is improved by opposition-based learning (OBL). A binary mode of the improved GJO algorithm is used to select features from IDS data in order to determine the best subset selection. IBGJO uses OBL strategy to improve the performance of the GJO and prevents the algorithm from getting trap in local optima by controlling initial population. LSTM is used in the IBGJO-LSTM model to classify samples. Although high detection rates are achieved by machine learning techniques, the efficiency of these methods decreases with the increase in the size of the dataset. To overcome these problems, deep learning methods are more suitable for distinguishing samples from huge amount of data. The proposed model was assessed using the NSL-KDD and CICIDS2017 datasets. For CICIDS2017 and NSL-KDD, the proposed model was 98.21% accurate. The results show that the recognition accuracy of the proposed model is higher than the models BGJO-LSTM, Binary Whale Optimization Algorithm-LSTM (BWOA-LSTM) and Binary Sine Cosine Algorithm-LSTM (BSCA-LSTM). This is likely because the binary mode of the improved GJO algorithm is able to more effectively select the most relevant features from the IDS data and the LSTM is able to more accurately classify the samples. Also, the proposed model has a significantly higher percentage accuracy than Support Vector Machine (SVM), K-Nearest Neighbors (KNN), and Naive Bayes (NB).









Similar content being viewed by others
Data availability
Enquiries about data availability should be directed to the authors.
References
Kethineni, K., Pradeepini, G.: Intrusion detection in internet of things-based smart farming using hybrid deep learning framework. Cluster Comput. (2023). https://doi.org/10.1007/s10586-023-04052-4
Cao, B., et al.: A many-objective optimization model of industrial internet of things based on private blockchain. IEEE Netw. 34(5), 78–83 (2020)
Cheng, B., et al.: Situation-aware IoT service coordination using the event-driven SOA paradigm. IEEE Trans. Netw. Serv. Manage. 13(2), 349–361 (2016)
Alfandi, O., et al.: A survey on boosting IoT security and privacy through blockchain: exploration, requirements, and open issues. Cluster Comput. 24, 37–55 (2021)
Jain, D.K., Ding, W., Kotecha, K.: Training fuzzy deep neural network with honey badger algorithm for intrusion detection in cloud environment. Int. J. Mach. Learn. Cybernet. (2023). https://doi.org/10.1007/s13042-022-01758-6
Han, Y., et al.: Research on road environmental sense method of intelligent vehicle based on tracking check. IEEE Trans. Intell. Transp. Syst. (2022). https://doi.org/10.1109/TITS.2022.3183893
Liu, G.: Data collection in mi-assisted wireless powered underground sensor networks: Directions, recent advances, and challenges. IEEE Commun. Mag. 59(4), 132–138 (2021)
Xiong, Z., et al.: A comprehensive confirmation-based selfish node detection algorithm for socially aware networks. J. Signal Process. Syst. (2023). https://doi.org/10.1007/s11265-023-01868-6
Hazman, C., et al.: lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning. Cluster Comput. (2022). https://doi.org/10.1007/s10586-022-03810-0
Hassan, H.A., et al.: Intrusion detection systems for the internet of thing: a survey study. Wirel. Personal Commun. (2022). https://doi.org/10.1007/s11277-022-10069-6
Zhang, J., et al.: APMSA: Adversarial perturbation against model stealing attacks. IEEE Trans. Inf. Forensics Secur. 18, 1667–1679 (2023)
Javadpour, A., et al.: DMAIDPS: A distributed multi-agent intrusion detection and prevention system for cloud IoT environments. Cluster Comput. 26(1), 367–384 (2023)
Ni, Q., et al.: Continuous influence-based community partition for social networks. IEEE Trans. Netw. Sci. Eng. 9(3), 1187–1197 (2021)
Guo, F., et al.: Path extension similarity link prediction method based on matrix algebra in directed networks. Comput. Commun. 187, 83–92 (2022)
Cao, K., et al.: Enhancing physical-layer security for iot with nonorthogonal multiple access assisted semi-grant-free transmission. IEEE Int. Things J. 9(24), 24669–24681 (2022)
Li, B., et al.: Dynamic event-triggered security control for networked control systems with cyber-attacks: A model predictive control approach. Inf. Sci. 612, 384–398 (2022)
Min, H., et al.: A fault diagnosis framework for autonomous vehicles with sensor self-diagnosis. Expert Syst. Appl. 224, 120002 (2023)
Rehman, E., et al.: Intrusion detection based on machine learning in the internet of things, attacks and counter measures. J. Supercomput. 78(6), 8890–8924 (2022)
Dai, X., et al.: Task co-offloading for d2d-assisted mobile edge computing in industrial internet of things. IEEE Trans. Industr. Inf. 19(1), 480–490 (2022)
Kumar, P., Gupta, G.P., Tripathi, R.: A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks. J. Ambient Intell. Humaniz. Comput. 12(10), 9555–9572 (2021)
Fu, X., et al.: The robust deep learning–based schemes for intrusion detection in internet of things environments. Ann. Telecommun. 76(5), 273–285 (2021)
Deng, X., et al.: Interpretable multi-modal image registration network based on disentangled convolutional sparse coding. IEEE Trans. Image Process. 32, 1078–1091 (2023)
Ma, X., et al.: Real-time assessment of asphalt pavement moduli and traffic loads using monitoring data from built-in sensors: optimal sensor placement and identification algorithm. Mech. Syst. Signal Process. 187, 109930 (2023)
Alweshah, M., et al.: Intrusion detection for the internet of things (IoT) based on the emperor penguin colony optimization algorithm. J. Ambient Intell. Humaniz. Comput. (2022). https://doi.org/10.1007/s12652-022-04407-6
Chang, Y., Li, W., Yang, Z.: Network intrusion detection based on random forest and support vector machine. in IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC) 2017. (2017)
Han, S., et al.: Practical and Robust Federated learning with highly scalable regression training. IEEE Trans. Neural Net. Learn. Syst. (2023). https://doi.org/10.1109/TNNLS.2023.3271859
Chen, J., et al.: Disparity-based multiscale fusion network for transportation detection. IEEE Trans. Intell. Transp. Syst. 23(10), 18855–18863 (2022)
Ren, Y., et al.: TBSM: a traffic burst-sensitive model for short-term prediction under special events. Knowl. Based Syst. 240, 108120 (2022)
Li, Y., Ghoreishi, S., Issakhov, A.: Improving the accuracy of network intrusion detection system in medical IoT systems through butterfly optimization algorithm. Wireless Pers. Commun. 126(3), 1999–2017 (2022)
Guan, Z., et al.: DeepMIH: Deep invertible network for multiple image hiding. IEEE Trans. Pattern Anal. Mach. Intell. 45(1), 372–390 (2022)
Chopra, N., Mohsin Ansari, M.: Golden jackal optimization: a novel nature-inspired optimizer for engineering applications. Expert Syst. Appl. 198, 116924 (2022)
Rezaie, M., et al.: Model parameters estimation of the proton exchange membrane fuel cell by a modified Golden Jackal optimization. Sustain. Energy Technol. Assess. 53, 102657 (2022)
Li, B., et al.: A distributionally robust optimization based method for stochastic model predictive control. IEEE Trans. Autom. Control. 67(11), 5762–5776 (2021)
Lindemann, B., et al.: A survey on anomaly detection for technical systems using LSTM networks. Comput. Ind. 131, 103498 (2021)
Abdullah, M.A., et al.: HCL-classifier: CNN and LSTM based hybrid malware classifier for internet of things (IoT). Future Gener. Computer Syst. 142, 41–58 (2023)
Shanmuganathan, V., Suresh, A.: LSTM-Markov based efficient anomaly detection algorithm for IoT environment. Appl. Soft Comput. (2023). https://doi.org/10.1016/j.asoc.2023.110054
Munagala, N.V.L.M.K., et al.: A smart IoT-enabled heart disease monitoring system using meta-heuristic-based Fuzzy-LSTM model. Biocybern. Biomed.l Eng. 42(4), 1183–1204 (2022)
Sharafaldin, I., Habibi, A., Lashkari, Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. in International Conference on Information Systems Security and Privacy. (2018)
Ahmed, M., Naser Mahmood, A., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016)
Hassan, I.H., et al.: An improved binary manta ray foraging optimization algorithm based feature selection and random forest classifier for network intrusion detection. Intell. Syst. Appl. 16, 200114 (2022)
Kunhare, N., Tiwari, R., Dhar, J.: Intrusion detection system using hybrid classifiers with meta-heuristic algorithms for the optimization and feature selection by genetic algorithm. Comput. Electr. Eng. 103, 108383 (2022)
Kumar, R., Malik, A., Ranga, V.: An intellectual intrusion detection system using hybrid hunger games search and remora optimization algorithm for IoT wireless networks. Knowl. Based Syst. 256, 109762 (2022)
Alazab, M., et al.: A new intrusion detection system based on moth–flame optimizer algorithm. Expert Syst. Appl. 210, 118439 (2022)
Almomani, O.: A feature selection model for network intrusion detection system based on PSO, GWO, FFA and GA algorithms. Symmetry. 12(6), 1046 (2020)
Nazir, A., Khan, R.A.: A novel combinatorial optimization based feature selection method for network intrusion detection. Computers & Secur. 102, 102164 (2021)
Liu, X., et al.: A scenario-generic neural machine translation data augmentation method. Electronics 12, 2320 (2023). https://doi.org/10.3390/electronics12102320
Asgharzadeh, H., et al.: Anomaly-based intrusion detection system in the internet of things using a convolutional neural network and multi-objective enhanced Capuchin search algorithm. J. Parallel Distrib. Comput. 175, 1–21 (2023)
Ramana, T.V., et al.: Ambient intelligence approach: Internet of things based decision performance analysis for intrusion detection. Comput. Commun. 195, 315–322 (2022)
Saran, N., Kesswani, N.: A comparative study of supervised machine learning classifiers for intrusion detection in internet of things. Procedia Comput. Sci. 218, 2049–2057 (2023)
Kasongo, S.M.: An advanced intrusion detection system for IIoT based on GA and tree based algorithms. IEEE Access. 9, 113199–113212 (2021)
Roopak, M., Tian, G.Y., Chambers, J.: An intrusion detection system against ddos attacks in IoT networks. in 10th Annual Computing and Communication Workshop and Conference (CCWC) 2020. (2020)
Diro, A., Chilamkurti, N.: Leveraging LSTM networks for attack detection in fog-to-things communications. IEEE Commun. Mag. 56(9), 124–130 (2018)
Jain, S., Pawar, P.M., Muthalagu, R.: Hybrid intelligent intrusion detection system for internet of things. Telemat. Informat. Rep. 8, 100030 (2022)
Song, Y., et al.: Identifying performance anomalies in fluctuating cloud environments: a robust correlative-GNN-based explainable approach. Future Gener. Computer Sys. 145, 77–86 (2023)
Basati, A., Faghih, M.M.: PDAE: Efficient network intrusion detection in IoT using parallel deep auto-encoders. Inf. Sci. 598, 57–74 (2022)
Zhou, Y., et al.: Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput. Netw. 174, 107247 (2020)
Dwivedi, S., Vardhan, M., Tripathi, S.: An effect of chaos grasshopper optimization algorithm for protection of network infrastructure. Comput. Netw. 176, 107251 (2020)
Bukhari, O., et al.: Anomaly detection using ensemble techniques for boosting the security of intrusion detection system. Procedia Comput. Sci. 218, 1003–1013 (2023)
Lu, C., et al.: An improved iterated greedy algorithm for the distributed hybrid flowshop scheduling problem. Eng. Optim., 1–19 (2023)
Hu, J., et al.: Consensus control of general linear multiagent systems with antagonistic interactions and communication noises. IEEE Trans. Autom. Control. 64(5), 2122–2127 (2018)
Zhou, X., Zhang, L.: SA-FPN: An effective feature pyramid network for crowded human detection. Appl. Intell. 52(11), 12556–12568 (2022)
Zhong, Q., et al.: Co-design of adaptive memory event-triggered mechanism and aperiodic intermittent controller for nonlinear networked control systems. IEEE Trans. Circuits Syst. II Express Briefs. 69(12), 4979–4983 (2022)
Mirjalili, S., Lewis, A.: The whale optimization algorithm. Adv. Eng. Softw. 95, 51–67 (2016)
Mirjalili, S.: SCA: A sine cosine algorithm for solving optimization problems. Knowl. Based Syst. 96, 120–133 (2016)
Funding
The authors have not disclosed any funding.
Author information
Authors and Affiliations
Contributions
“AVH wrote the main manuscript text and HR and AV prepared figures and simulations. AG and BA reviewed the manuscript.”
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher’s Note
Springer nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Hanafi, A.V., Ghaffari, A., Rezaei, H. et al. Intrusion detection in internet of things using improved binary golden jackal optimization algorithm and LSTM. Cluster Comput 27, 2673–2690 (2024). https://doi.org/10.1007/s10586-023-04102-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-023-04102-x