Intrusion detection in internet of things using improved binary golden jackal optimization algorithm and LSTM | Cluster Computing Skip to main content
Log in

Intrusion detection in internet of things using improved binary golden jackal optimization algorithm and LSTM

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Internet of things (IoT) technology has gained a reputation in recent years due to its ease of use and adaptability. Due to the amount of sensitive and significant data exchanged over the global Internet, intrusion detection is a challenging task in the vast IoT network. A variety of hostile behaviors and attacks are now detected by intrusion detection systems (IDSs), which are difficult or impossible for a single method to identify. An Improved Binary Golden Jackal Optimization (IBGJO) algorithm and Long Short-Term Memory (LSTM) network are used in this paper to develop a new IDS model for IoT networks. Firstly, the GJO is improved by opposition-based learning (OBL). A binary mode of the improved GJO algorithm is used to select features from IDS data in order to determine the best subset selection. IBGJO uses OBL strategy to improve the performance of the GJO and prevents the algorithm from getting trap in local optima by controlling initial population. LSTM is used in the IBGJO-LSTM model to classify samples. Although high detection rates are achieved by machine learning techniques, the efficiency of these methods decreases with the increase in the size of the dataset. To overcome these problems, deep learning methods are more suitable for distinguishing samples from huge amount of data. The proposed model was assessed using the NSL-KDD and CICIDS2017 datasets. For CICIDS2017 and NSL-KDD, the proposed model was 98.21% accurate. The results show that the recognition accuracy of the proposed model is higher than the models BGJO-LSTM, Binary Whale Optimization Algorithm-LSTM (BWOA-LSTM) and Binary Sine Cosine Algorithm-LSTM (BSCA-LSTM). This is likely because the binary mode of the improved GJO algorithm is able to more effectively select the most relevant features from the IDS data and the LSTM is able to more accurately classify the samples. Also, the proposed model has a significantly higher percentage accuracy than Support Vector Machine (SVM), K-Nearest Neighbors (KNN), and Naive Bayes (NB).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data availability

Enquiries about data availability should be directed to the authors.

References

  1. Kethineni, K., Pradeepini, G.: Intrusion detection in internet of things-based smart farming using hybrid deep learning framework. Cluster Comput. (2023). https://doi.org/10.1007/s10586-023-04052-4

    Article  Google Scholar 

  2. Cao, B., et al.: A many-objective optimization model of industrial internet of things based on private blockchain. IEEE Netw. 34(5), 78–83 (2020)

    Google Scholar 

  3. Cheng, B., et al.: Situation-aware IoT service coordination using the event-driven SOA paradigm. IEEE Trans. Netw. Serv. Manage. 13(2), 349–361 (2016)

    Google Scholar 

  4. Alfandi, O., et al.: A survey on boosting IoT security and privacy through blockchain: exploration, requirements, and open issues. Cluster Comput. 24, 37–55 (2021)

    Google Scholar 

  5. Jain, D.K., Ding, W., Kotecha, K.: Training fuzzy deep neural network with honey badger algorithm for intrusion detection in cloud environment. Int. J. Mach. Learn. Cybernet. (2023). https://doi.org/10.1007/s13042-022-01758-6

    Article  Google Scholar 

  6. Han, Y., et al.: Research on road environmental sense method of intelligent vehicle based on tracking check. IEEE Trans. Intell. Transp. Syst. (2022). https://doi.org/10.1109/TITS.2022.3183893

    Article  Google Scholar 

  7. Liu, G.: Data collection in mi-assisted wireless powered underground sensor networks: Directions, recent advances, and challenges. IEEE Commun. Mag. 59(4), 132–138 (2021)

    Google Scholar 

  8. Xiong, Z., et al.: A comprehensive confirmation-based selfish node detection algorithm for socially aware networks. J. Signal Process. Syst. (2023). https://doi.org/10.1007/s11265-023-01868-6

    Article  Google Scholar 

  9. Hazman, C., et al.: lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning. Cluster Comput. (2022). https://doi.org/10.1007/s10586-022-03810-0

    Article  Google Scholar 

  10. Hassan, H.A., et al.: Intrusion detection systems for the internet of thing: a survey study. Wirel. Personal Commun. (2022). https://doi.org/10.1007/s11277-022-10069-6

    Article  Google Scholar 

  11. Zhang, J., et al.: APMSA: Adversarial perturbation against model stealing attacks. IEEE Trans. Inf. Forensics Secur. 18, 1667–1679 (2023)

    Google Scholar 

  12. Javadpour, A., et al.: DMAIDPS: A distributed multi-agent intrusion detection and prevention system for cloud IoT environments. Cluster Comput. 26(1), 367–384 (2023)

    Google Scholar 

  13. Ni, Q., et al.: Continuous influence-based community partition for social networks. IEEE Trans. Netw. Sci. Eng. 9(3), 1187–1197 (2021)

    MathSciNet  Google Scholar 

  14. Guo, F., et al.: Path extension similarity link prediction method based on matrix algebra in directed networks. Comput. Commun. 187, 83–92 (2022)

    Google Scholar 

  15. Cao, K., et al.: Enhancing physical-layer security for iot with nonorthogonal multiple access assisted semi-grant-free transmission. IEEE Int. Things J. 9(24), 24669–24681 (2022)

    Google Scholar 

  16. Li, B., et al.: Dynamic event-triggered security control for networked control systems with cyber-attacks: A model predictive control approach. Inf. Sci. 612, 384–398 (2022)

    Google Scholar 

  17. Min, H., et al.: A fault diagnosis framework for autonomous vehicles with sensor self-diagnosis. Expert Syst. Appl. 224, 120002 (2023)

    Google Scholar 

  18. Rehman, E., et al.: Intrusion detection based on machine learning in the internet of things, attacks and counter measures. J. Supercomput. 78(6), 8890–8924 (2022)

    Google Scholar 

  19. Dai, X., et al.: Task co-offloading for d2d-assisted mobile edge computing in industrial internet of things. IEEE Trans. Industr. Inf. 19(1), 480–490 (2022)

    Google Scholar 

  20. Kumar, P., Gupta, G.P., Tripathi, R.: A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks. J. Ambient Intell. Humaniz. Comput. 12(10), 9555–9572 (2021)

    Google Scholar 

  21. Fu, X., et al.: The robust deep learning–based schemes for intrusion detection in internet of things environments. Ann. Telecommun. 76(5), 273–285 (2021)

    Google Scholar 

  22. Deng, X., et al.: Interpretable multi-modal image registration network based on disentangled convolutional sparse coding. IEEE Trans. Image Process. 32, 1078–1091 (2023)

    Google Scholar 

  23. Ma, X., et al.: Real-time assessment of asphalt pavement moduli and traffic loads using monitoring data from built-in sensors: optimal sensor placement and identification algorithm. Mech. Syst. Signal Process. 187, 109930 (2023)

    Google Scholar 

  24. Alweshah, M., et al.: Intrusion detection for the internet of things (IoT) based on the emperor penguin colony optimization algorithm. J. Ambient Intell. Humaniz. Comput. (2022). https://doi.org/10.1007/s12652-022-04407-6

    Article  Google Scholar 

  25. Chang, Y., Li, W., Yang, Z.: Network intrusion detection based on random forest and support vector machine. in IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC) 2017. (2017)

  26. Han, S., et al.: Practical and Robust Federated learning with highly scalable regression training. IEEE Trans. Neural Net. Learn. Syst. (2023). https://doi.org/10.1109/TNNLS.2023.3271859

    Article  Google Scholar 

  27. Chen, J., et al.: Disparity-based multiscale fusion network for transportation detection. IEEE Trans. Intell. Transp. Syst. 23(10), 18855–18863 (2022)

    Google Scholar 

  28. Ren, Y., et al.: TBSM: a traffic burst-sensitive model for short-term prediction under special events. Knowl. Based Syst. 240, 108120 (2022)

    Google Scholar 

  29. Li, Y., Ghoreishi, S., Issakhov, A.: Improving the accuracy of network intrusion detection system in medical IoT systems through butterfly optimization algorithm. Wireless Pers. Commun. 126(3), 1999–2017 (2022)

    Google Scholar 

  30. Guan, Z., et al.: DeepMIH: Deep invertible network for multiple image hiding. IEEE Trans. Pattern Anal. Mach. Intell. 45(1), 372–390 (2022)

    Google Scholar 

  31. Chopra, N., Mohsin Ansari, M.: Golden jackal optimization: a novel nature-inspired optimizer for engineering applications. Expert Syst. Appl. 198, 116924 (2022)

    Google Scholar 

  32. Rezaie, M., et al.: Model parameters estimation of the proton exchange membrane fuel cell by a modified Golden Jackal optimization. Sustain. Energy Technol. Assess. 53, 102657 (2022)

    Google Scholar 

  33. Li, B., et al.: A distributionally robust optimization based method for stochastic model predictive control. IEEE Trans. Autom. Control. 67(11), 5762–5776 (2021)

    MathSciNet  Google Scholar 

  34. Lindemann, B., et al.: A survey on anomaly detection for technical systems using LSTM networks. Comput. Ind. 131, 103498 (2021)

    Google Scholar 

  35. Abdullah, M.A., et al.: HCL-classifier: CNN and LSTM based hybrid malware classifier for internet of things (IoT). Future Gener. Computer Syst. 142, 41–58 (2023)

    Google Scholar 

  36. Shanmuganathan, V., Suresh, A.: LSTM-Markov based efficient anomaly detection algorithm for IoT environment. Appl. Soft Comput. (2023). https://doi.org/10.1016/j.asoc.2023.110054

    Article  Google Scholar 

  37. Munagala, N.V.L.M.K., et al.: A smart IoT-enabled heart disease monitoring system using meta-heuristic-based Fuzzy-LSTM model. Biocybern. Biomed.l Eng. 42(4), 1183–1204 (2022)

    Google Scholar 

  38. Sharafaldin, I., Habibi, A., Lashkari, Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. in International Conference on Information Systems Security and Privacy. (2018)

  39. Ahmed, M., Naser Mahmood, A., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016)

    Google Scholar 

  40. Hassan, I.H., et al.: An improved binary manta ray foraging optimization algorithm based feature selection and random forest classifier for network intrusion detection. Intell. Syst. Appl. 16, 200114 (2022)

    Google Scholar 

  41. Kunhare, N., Tiwari, R., Dhar, J.: Intrusion detection system using hybrid classifiers with meta-heuristic algorithms for the optimization and feature selection by genetic algorithm. Comput. Electr. Eng. 103, 108383 (2022)

    Google Scholar 

  42. Kumar, R., Malik, A., Ranga, V.: An intellectual intrusion detection system using hybrid hunger games search and remora optimization algorithm for IoT wireless networks. Knowl. Based Syst. 256, 109762 (2022)

    Google Scholar 

  43. Alazab, M., et al.: A new intrusion detection system based on moth–flame optimizer algorithm. Expert Syst. Appl. 210, 118439 (2022)

    Google Scholar 

  44. Almomani, O.: A feature selection model for network intrusion detection system based on PSO, GWO, FFA and GA algorithms. Symmetry. 12(6), 1046 (2020)

    Google Scholar 

  45. Nazir, A., Khan, R.A.: A novel combinatorial optimization based feature selection method for network intrusion detection. Computers & Secur. 102, 102164 (2021)

    Google Scholar 

  46. Liu, X., et al.: A scenario-generic neural machine translation data augmentation method. Electronics 12, 2320 (2023). https://doi.org/10.3390/electronics12102320

    Article  Google Scholar 

  47. Asgharzadeh, H., et al.: Anomaly-based intrusion detection system in the internet of things using a convolutional neural network and multi-objective enhanced Capuchin search algorithm. J. Parallel Distrib. Comput. 175, 1–21 (2023)

    Google Scholar 

  48. Ramana, T.V., et al.: Ambient intelligence approach: Internet of things based decision performance analysis for intrusion detection. Comput. Commun. 195, 315–322 (2022)

    Google Scholar 

  49. Saran, N., Kesswani, N.: A comparative study of supervised machine learning classifiers for intrusion detection in internet of things. Procedia Comput. Sci. 218, 2049–2057 (2023)

    Google Scholar 

  50. Kasongo, S.M.: An advanced intrusion detection system for IIoT based on GA and tree based algorithms. IEEE Access. 9, 113199–113212 (2021)

    Google Scholar 

  51. Roopak, M., Tian, G.Y., Chambers, J.: An intrusion detection system against ddos attacks in IoT networks. in 10th Annual Computing and Communication Workshop and Conference (CCWC) 2020. (2020)

  52. Diro, A., Chilamkurti, N.: Leveraging LSTM networks for attack detection in fog-to-things communications. IEEE Commun. Mag. 56(9), 124–130 (2018)

    Google Scholar 

  53. Jain, S., Pawar, P.M., Muthalagu, R.: Hybrid intelligent intrusion detection system for internet of things. Telemat. Informat. Rep. 8, 100030 (2022)

    Google Scholar 

  54. Song, Y., et al.: Identifying performance anomalies in fluctuating cloud environments: a robust correlative-GNN-based explainable approach. Future Gener. Computer Sys. 145, 77–86 (2023)

    Google Scholar 

  55. Basati, A., Faghih, M.M.: PDAE: Efficient network intrusion detection in IoT using parallel deep auto-encoders. Inf. Sci. 598, 57–74 (2022)

    Google Scholar 

  56. Zhou, Y., et al.: Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput. Netw. 174, 107247 (2020)

    Google Scholar 

  57. Dwivedi, S., Vardhan, M., Tripathi, S.: An effect of chaos grasshopper optimization algorithm for protection of network infrastructure. Comput. Netw. 176, 107251 (2020)

    Google Scholar 

  58. Bukhari, O., et al.: Anomaly detection using ensemble techniques for boosting the security of intrusion detection system. Procedia Comput. Sci. 218, 1003–1013 (2023)

    Google Scholar 

  59. Lu, C., et al.: An improved iterated greedy algorithm for the distributed hybrid flowshop scheduling problem. Eng. Optim., 1–19 (2023)

  60. Hu, J., et al.: Consensus control of general linear multiagent systems with antagonistic interactions and communication noises. IEEE Trans. Autom. Control. 64(5), 2122–2127 (2018)

    MathSciNet  Google Scholar 

  61. Zhou, X., Zhang, L.: SA-FPN: An effective feature pyramid network for crowded human detection. Appl. Intell. 52(11), 12556–12568 (2022)

    Google Scholar 

  62. Zhong, Q., et al.: Co-design of adaptive memory event-triggered mechanism and aperiodic intermittent controller for nonlinear networked control systems. IEEE Trans. Circuits Syst. II Express Briefs. 69(12), 4979–4983 (2022)

    Google Scholar 

  63. Mirjalili, S., Lewis, A.: The whale optimization algorithm. Adv. Eng. Softw. 95, 51–67 (2016)

    Google Scholar 

  64. Mirjalili, S.: SCA: A sine cosine algorithm for solving optimization problems. Knowl. Based Syst. 96, 120–133 (2016)

    Google Scholar 

Download references

Funding

The authors have not disclosed any funding.

Author information

Authors and Affiliations

Authors

Contributions

“AVH wrote the main manuscript text and HR and AV prepared figures and simulations. AG and BA reviewed the manuscript.”

Corresponding author

Correspondence to Ali Ghaffari.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s Note

Springer nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hanafi, A.V., Ghaffari, A., Rezaei, H. et al. Intrusion detection in internet of things using improved binary golden jackal optimization algorithm and LSTM. Cluster Comput 27, 2673–2690 (2024). https://doi.org/10.1007/s10586-023-04102-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-023-04102-x

Keywords