دورية أكاديمية

A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models

التفاصيل البيبلوغرافية
العنوان: A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
المؤلفون: Osama Bassam J. Rabie, Shitharth Selvarajan, Tawfiq Hasanin, Abdulrhman M. Alshareef, C. K. Yogesh, Mueen Uddin
المصدر: Scientific Reports, Vol 14, Iss 1, Pp 1-20 (2024)
بيانات النشر: Nature Portfolio, 2024.
سنة النشر: 2024
المجموعة: LCC:Medicine
LCC:Science
مصطلحات موضوعية: Medicine, Science
الوصف: Abstract The Internet of Things (IoT) is extensively used in modern-day life, such as in smart homes, intelligent transportation, etc. However, the present security measures cannot fully protect the IoT due to its vulnerability to malicious assaults. Intrusion detection can protect IoT devices from the most harmful attacks as a security tool. Nevertheless, the time and detection efficiencies of conventional intrusion detection methods need to be more accurate. The main contribution of this paper is to develop a simple as well as intelligent security framework for protecting IoT from cyber-attacks. For this purpose, a combination of Decisive Red Fox (DRF) Optimization and Descriptive Back Propagated Radial Basis Function (DBRF) classification are developed in the proposed work. The novelty of this work is, a recently developed DRF optimization methodology incorporated with the machine learning algorithm is utilized for maximizing the security level of IoT systems. First, the data preprocessing and normalization operations are performed to generate the balanced IoT dataset for improving the detection accuracy of classification. Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. It also supports increasing the training speed and reducing the error rate of the classifier. Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. Here, the proposed DRF-DBRF security model's performance is validated and tested using five different and popular IoT benchmarking datasets. Finally, the results are compared with the previous anomaly detection approaches by using various evaluation parameters.
نوع الوثيقة: article
وصف الملف: electronic resource
اللغة: English
تدمد: 2045-2322
Relation: https://doaj.org/toc/2045-2322
DOI: 10.1038/s41598-024-51154-z
URL الوصول: https://doaj.org/article/7eb08c08e8884ee284cc90d2a7adba8f
رقم الأكسشن: edsdoj.7eb08c08e8884ee284cc90d2a7adba8f
قاعدة البيانات: Directory of Open Access Journals
الوصف
تدمد:20452322
DOI:10.1038/s41598-024-51154-z