FOREX Press I. J. of Electrical & Electronics Research
Support Open Access

Research Article |

Hybrid Deep-Generative Adversarial Network Based Intrusion Detection Model for Internet of Things Using Binary Particle Swarm Optimization

Author(s): Balaji S1 and Dr. S. Sankaranarayanan2

Publisher : FOREX Publication

Published : 10 November 2022

e-ISSN : 2347-470X

Page(s) : 948-953




Balaji S*, Research Scholar, Department of Computer Science and Engineering, School of Computing, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Tamil Nadu, India; Email: balajinithin19@gmail.com

Dr. S. Sankaranarayanan, Associate Professor, Department of Computer Science and Engineering, School of Computing, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Tamil Nadu, India; Email: sankarme2007@gmail.com

    [1] Mengmeng Ge, Xiping Fu, Naeem Syed, Zubair Baig, Gideon Teo, Antonio Robles-Kelly, “Deep Learning-based Intrusion Detection for IoT Networks” IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC), pp.1-10,2019.[Cross Ref]
    [2] K.V.V.N.L. Sai Kiran, R.N. Kamakshi Devisetty, N. Pavan Kalyan, K. Mukundini, R. Karthi, Building an Intrusion Detection System for IoT Environment using Machine Learning Techniques, Procedia Computer Science, Volume 171,2020, Pages 2372-2379. [Cross Ref]
    [3] A. Remesh, D. Muralidharan, N. Raj, J. Gopika and P. K. Binu, "Intrusion Detection System for IoT Devices," 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), 2020, pp. 826-830, doi: 10.1109/ICESC48915.2020.9155999.[Cross Ref]
    [4] Yi-Wen Chen; Jang-Ping Sheu; Yung-Ching Kuo; Nguyen Van Cuong Design and Implementation of IoT DDoS Attacks Detection System based on Machine Learning, European Conference on Networks and Communications (EuCNC),2020[Cross Ref]
    [5] Mayur Rahul, Namita Tiwari “A New Hybrid Approach for Efficient Emotion Recognition using Deep Learning” International Journal of Electrical and Electronics Research (IJEER), vol 10(1),Forex publication, 2022[Cross Ref]
    [6] Tanzila Saba, Amjad Rehman, Tariq Sadad, Hoshang Kolivand, Saeed Ali Bahaj, Anomaly-based intrusion detection system for IoT networks through deep learning model, Computers and Electrical Engineering, Volume 99,2022.[Cross Ref]
    [7] Tsimenidis, S., Lagkas, T. & Rantos, K. Deep Learning in IoT Intrusion Detection. J Netw Syst Manage 30, 8 (2022). https://doi.org/10.1007/s10922-021-09621-9.[Cross Ref]
    [8] Z. K. Maseer, R. Yusof, S. A. Mostafa, N. Bahaman, O. Musa et al., "Deepiot.ids: hybrid deep learning for enhancing iot network intrusion detection," Computers, Materials & Continua, vol. 69, no.3, pp. 3945–3966, 2021.[Cross Ref]
    [9] Yanqing Yang , Kangfeng Zheng , Chunhua Wu , Xinxin Niu and Yixian Yang ,“Building an Effective Intrusion Detection System Using the Modified Density Peak Clustering Algorithm and Deep Belief Networks”,2019.[Cross Ref]
    [10] Dr. S. Smys, Dr. Abul Basar, Dr. Haoxiang Wang, “Hybrid Intrusion Detection System for Internet of Things (IoT)”, Journal of ISMAC, Vol.02, No.04 Pp: 190-199, 2020.[Cross Ref]
    [11] Snehal Deshmukh-Bhosale, Santosh S. Sonavane,“A Real-Time Intrusion Detection System for Wormhole Attack in the RPL based Internet of Things “ Procedia Manufacturing- The 12th International Conference Interdisciplinarity in Engineering,Vol. 32,pp. 840–847,2019.[Cross Ref]
    [12] Alekha Kumar Mishra, Asis Kumar Tripathy, Deepak Puthal, and Laurence T. Yang, “Analytical Model for Sybil Attack Phases in Internet of Things, IEEE Internet of Things Journal,Vol.6 ,No.1,pp.379-387,2019.[Cross Ref]
    [13] Dr Anil Kumar Yaramala1 ,Dr Sohail Imran Khan “Application of Internet of Things (IoT) and Artificial Intelligence in Unmanned Aerial Vehicles” International Journal of Electrical and Electronics Research (IJEER), vol 10(2),Forex publication, 2022.[Cross Ref]
    [14] Guangjie Han , Xun Li, Jinfang Jiang , Lei Shu and Jaime Lloret,” Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack inWireless Sensor Networks”,IEEE The Computer Journal , Volume: 58, No: 6, 2015.[Cross Ref]
    [15] Christian Cervantes, Diego Poplade, Michele Nogueira and Aldri Santos,“Detection of Sinkhole Attacks for Supporting Secure Routing on 6LoWPAN for Internet of Things”, IFIP/IEEE International Symposium on Integrated Network Management (IM2015): Mini-Conference,2015.[Cross Ref]
    [16] Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Rajeev Kumar Kanth, Seppo Virtanen and Jouni Isoaho”Distributed Internal Anomaly Detection System for Internet-of-Things” 13th IEEE Annual Consumer Communications & Networking Conference (CCNC),2016.[Cross Ref]
    [17] Ulya Sabeel, Shahram Shah Heydari (2021) “Building an Intrusion Detection System to Detect Atypical Cyberattack Flows “, IEEEACCESS 2021. [Cross Ref]
    [18] Ghanshyam Prasad Dubey, Dr. Rakesh Kumar Bhujade “Investigating the Impact of Feature Reduction Through Information Gain and Correlation on the Performance of Error Back Propagation Based IDS” International Journal of Electrical and Electronics Research (IJEER), vol 9(3),Forex publication, 2021.[Cross Ref]
    [19] Ramadan RA, Emara A-H, Al-Sarem M, Elhamahmy M. Internet of Drones Intrusion Detection Using Deep Learning. Electronics. 2021; 10(21):2633. https://doi.org/10.3390/electronics10212633[Cross Ref]
    [20] Aidin Ferdowsi and Walid Saad “Generative Adversarial Networks for Distributed Intrusion Detection in the Internet of Things”,IEEE Global Communications conference. [Cross Ref]
    [21] An-Da Li, Bing Xue, Mengjie Zhang,”Improved binary particle swarm optimization for feature selection with new initialization and search space reduction strategies”, Applied Soft Computing, Volume 106,2021,https://doi.org/10.1016/j.asoc.2021.107302.[Cross Ref]
    [22] Sulaiman, A.; Sadiq, M.; Mehmood, Y.; Akram, M.; Ali, G.A. Fitness-Based Acceleration Coefficients Binary Particle Swarm Optimization (FACBPSO) to Solve the Discounted Knapsack Problem. Symmetry 2022, 14, 1208.https://doi.org/10.3390/sym1.[Cross Ref]
    [23] Farah Jemili and Hajer Bouras “Intrusion Detection Based on Big Data Fuzzy Analytics”open data , DOI: 10.5772/intechopen.99636, 2021.[Cross Ref]
    [24] Pushparaj Nimbalkar, Deepak Kshirsagar, Feature selection for intrusion detection system in Internet-of-Things (IoT), ICT Express, Volume 7, Issue 2,2021, Pages 177-181.[Cross Ref]

Balaji S, Dr. S. Sankaranarayanan (2022), Hybrid Deep-Generative Adversarial Network Based Intrusion Detection Model for Internet of Things Using Binary Particle Swarm Optimization. IJEER 10(4), 948-953. DOI: 10.37391/IJEER.100432.