Water Moth Search Algorithm-based Deep Training for Intrusion Detection in IoT
- 13 October 2021
- journal article
- research article
- Published by River Publishers in Journal of Web Engineering
- Vol. 20 (6), 1781-1812
- https://doi.org/10.13052/jwe1540-9589.2064
Abstract
The economic growth and information technology leads to the development of Internet of Things (IoT) industry and has become the emerging field of research. Several intrusion detection techniques are introduced but the detection of intrusion and malicious activities poses a challenging task. This paper devises a novel method, namely the Water Moth Search algorithm (WMSA) algorithm, for training Deep Recurrent Neural Network (Deep RNN) to detect malicious network activities. The WMSA algorithm is newly devised by combining Water Wave optimization (WWO) and the Moth Search Optimization (MSO). The pre-processing is employed for the removal of redundant data. Then, the feature selection is devised using the Wrapper approach, then using the selected features; the Deep RNN classifier effectively detects the intrusion using the selected features. The proposed WMSA-based Deep RNN showed improved results with maximal accuracy, specificity, and sensitivity of 0.96, 0.973 and 0.960.Keywords
This publication has 25 references indexed in Scilit:
- A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone NetworksIEEE Transactions on Emerging Topics in Computing, 2016
- Moth search algorithm: a bio-inspired metaheuristic algorithm for global optimization problemsMemetic Computing, 2016
- A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion DetectionIEEE Communications Surveys & Tutorials, 2015
- Water wave optimization: A new nature-inspired metaheuristicComputers & Operations Research, 2015
- Security, privacy and trust in Internet of Things: The road aheadComputer Networks, 2015
- SVELTE: Real-time intrusion detection in the Internet of ThingsAd Hoc Networks, 2013
- Anomaly-based network intrusion detection: Techniques, systems and challengesComputers & Security, 2009
- Critical study of neural networks in detecting intrusionsComputers & Security, 2008
- A new intrusion detection system using support vector machines and hierarchical clusteringThe VLDB Journal, 2006
- Wrappers for feature subset selectionArtificial Intelligence, 1997