Research article Special Issues

Enhancing cybersecurity in cloud-assisted Internet of Things environments: A unified approach using evolutionary algorithms and ensemble learning

  • Received: 16 January 2024 Revised: 08 April 2024 Accepted: 10 April 2024 Published: 06 May 2024
  • MSC : 11Y40

  • Internet of Things (IoT) security is an umbrella term for the strategies and tools that protect devices connected to the cloud, and the network they use to connect. The IoT connects different objects and devices through the internet to communicate with similarly connected machines or devices. An IoT botnet is a network of infected or cooperated IoT devices that can be remotely organized by cyber attackers for malicious purposes such as spreading malware, stealing data, distributed denial of service (DDoS) attacks, and engaging in other types of cybercrimes. The compromised devices can be included in any device connected to the internet and communicate data with, e.g., cameras, smart home appliances, routers, etc. Millions of devices can include an IoT botnet, making it an attractive tool for cyber attackers to launch attacks. Lately, cyberattack detection using deep learning (DL) includes training neural networks on different datasets to automatically detect patterns indicative of cyber threats, which provides an adaptive and proactive approach to cybersecurity. This study presents an evolutionary algorithm with an ensemble DL-based botnet detection and classification (EAEDL-BDC) approach. The goal of the study is to enhance cybersecurity in the cloud-assisted IoT environment via a botnet detection process. In the EAEDL-BDC technique, the primary stage of data normalization using Z-score normalization is performed. For the feature selection process, the EAEDL-BDC technique uses a binary pendulum search algorithm (BPSA). Moreover, a weighted average ensemble of three models, such as the modified Elman recurrent neural network (MERNN), gated recurrent unit (GRU), and long short-term memory (LSTM), are used. Additionally, the hyperparameter choice of the DL approaches occurs utilizing the reptile search algorithm (RSA). The experimental outcome of the EAEDL-BDC approach can be examined on the N-BaIoT database. The extensive comparison study implied that the EAEDL-BDC technique reaches a superior accuracy value of 99.53% compared to other approaches concerning distinct evaluation metrics.

    Citation: Mohammed Aljebreen, Hanan Abdullah Mengash, Khalid Mahmood, Asma A. Alhashmi, Ahmed S. Salama. Enhancing cybersecurity in cloud-assisted Internet of Things environments: A unified approach using evolutionary algorithms and ensemble learning[J]. AIMS Mathematics, 2024, 9(6): 15796-15818. doi: 10.3934/math.2024763

    Related Papers:

  • Internet of Things (IoT) security is an umbrella term for the strategies and tools that protect devices connected to the cloud, and the network they use to connect. The IoT connects different objects and devices through the internet to communicate with similarly connected machines or devices. An IoT botnet is a network of infected or cooperated IoT devices that can be remotely organized by cyber attackers for malicious purposes such as spreading malware, stealing data, distributed denial of service (DDoS) attacks, and engaging in other types of cybercrimes. The compromised devices can be included in any device connected to the internet and communicate data with, e.g., cameras, smart home appliances, routers, etc. Millions of devices can include an IoT botnet, making it an attractive tool for cyber attackers to launch attacks. Lately, cyberattack detection using deep learning (DL) includes training neural networks on different datasets to automatically detect patterns indicative of cyber threats, which provides an adaptive and proactive approach to cybersecurity. This study presents an evolutionary algorithm with an ensemble DL-based botnet detection and classification (EAEDL-BDC) approach. The goal of the study is to enhance cybersecurity in the cloud-assisted IoT environment via a botnet detection process. In the EAEDL-BDC technique, the primary stage of data normalization using Z-score normalization is performed. For the feature selection process, the EAEDL-BDC technique uses a binary pendulum search algorithm (BPSA). Moreover, a weighted average ensemble of three models, such as the modified Elman recurrent neural network (MERNN), gated recurrent unit (GRU), and long short-term memory (LSTM), are used. Additionally, the hyperparameter choice of the DL approaches occurs utilizing the reptile search algorithm (RSA). The experimental outcome of the EAEDL-BDC approach can be examined on the N-BaIoT database. The extensive comparison study implied that the EAEDL-BDC technique reaches a superior accuracy value of 99.53% compared to other approaches concerning distinct evaluation metrics.



    加载中


    [1] J. K. Samriya, C. Chakraborty, A. Sharma, M. Kumar, Adversarial ML-Based Secured Cloud Architecture for Consumer Internet of Things of Smart Healthcare, IEEE Transactions on Consumer Electronics, 2023. https://doi.org/10.1109/TCE.2023.3341696 doi: 10.1109/TCE.2023.3341696
    [2] Y. Djenouri, D. Djenouri, A. Belhadi, G. Srivastava, J. C. W. Lin, Emergent deep learning for anomaly detection in the Internet of everything, IEEE Internet of Things Journal, 2021.
    [3] M. A. Rahman, M. S. Hossain, A deep learning assisted software defined security architecture for 6G wireless networks: ⅡoT perspective, IEEE Wirel. Commun., 29 (2022), 52–59. https://doi.org/10.1109/MWC.006.2100438 doi: 10.1109/MWC.006.2100438
    [4] S. Bhingarkar, S. T. Revathi, C. S. Kolli, H. K. Mewada, An effective optimization enabled deep learning based Malicious behaviour detection in cloud computing, Int. J. Intell. Robot., 7 (2023), 575–588. https://doi.org/10.1007/s41315-022-00239-x doi: 10.1007/s41315-022-00239-x
    [5] N. Kansal, B. Bhushan, S. Sharma, Architecture, security vulnerabilities, and the proposed countermeasures in Agriculture-Internet-of-Things (AIoT) Systems, Int. Things Anal. Agricul., 3 (2022), 329–353. https://doi.org/10.1007/978-981-16-6210-2_16 doi: 10.1007/978-981-16-6210-2_16
    [6] Q. Aslan, M. Ozkan-Okay, D. Gupta, Intelligent behavior-based malware detection system on cloud computing environment, IEEE Access, 9 (2021), 83252–83271. https://doi.org/10.1109/ACCESS.2021.3087316 doi: 10.1109/ACCESS.2021.3087316
    [7] B. B. Gupta, A. Gaurav, V. Arya, P. Kim, A Deep CNN-based Framework for Distributed Denial of Services (DDoS) Attack Detection in Internet of Things (IoT), In Proceedings of the 2023 International Conference on Research in Adaptive and Convergent Systems, 2023, 1–6. https://doi.org/10.1145/3599957.3606239 doi: 10.1145/3599957.3606239
    [8] A. Lakhan, M. A. Mohammed, A. N. Rashid, S. Kadry, K. H. Abdulkareem, J. Nedoma, et al., Restricted Boltzmann machine assisted secure serverless edge system for internet of medical things, IEEE J. Biomed. Health, 27 (2022), 673–683. https://doi.org/10.1109/JBHI.2022.3178660 doi: 10.1109/JBHI.2022.3178660
    [9] R. Zhou, X. Zhang, X. Wang, G. Yang, H. N. Dai, M. Liu, Device-Oriented Keyword-Searchable Encryption Scheme for Cloud-Assisted Industrial IoT, IEEE Internet Things, 9 (2021), 17098–17109. https://doi.org/10.1109/JIOT.2021.3124807 doi: 10.1109/JIOT.2021.3124807
    [10] N. Kumar, V. Goel, R. Ranjan, M. Altuwairiqi, H. Alyami, S. A. Asakipaam, A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City, Secur. Commun. Netw., 2023. https://doi.org/10.1155/2023/8168075 doi: 10.1155/2023/8168075
    [11] S. M. Alshahrani, F. S. Alrayes, H. Alqahtani, J. S. Alzahrani, M. Maray, S. Alazwari, et al., IoT-Cloud assisted botnet detection using Rat Swarm Optimizer with deep learning, Comput., Mater. Con., 74 (2023). https://doi.org/10.32604/cmc.2023.032972 doi: 10.32604/cmc.2023.032972
    [12] K. Haseeb, I. U. Din, A. Almogren, I. Ahmed, M. Guizani, Intelligent and secure edge-enabled computing model for sustainable cities using green internet of things, Sustain. Cities Soc., 68 (2021), 102779. https://doi.org/10.1016/j.scs.2021.102779 doi: 10.1016/j.scs.2021.102779
    [13] R. S. Prabhu, A. Prema, E. Perumal, A novel cloud security enhancement scheme to defend against DDoS attacks by using deep learning strategy, In 2022 6th international conference on electronics, communication and aerospace technology, IEEE, 2022,698–704. https://doi.org/10.1109/ICECA55336.2022.10009177
    [14] F. Alrowais, M. M. Eltahir, S. S. Aljameel, R. Marzouk, G. P. Mohammed, A. S. Salama, Modeling of botnet detection using chaotic binary Pelican Optimization Algorithm with deep learning on Internet of Things Environment, IEEE Access, 11 (2023), 130618–130626. https://doi.org/10.1109/ACCESS.2023.3332690 doi: 10.1109/ACCESS.2023.3332690
    [15] M. I. Ahmed, G. Kannan, S. R. Polamuri, LSITA: An Integrated Framework for Leveraging Security of Internet of Things Application with Remote Patient Monitoring System, 2022. https://doi.org/10.21203/rs.3.rs-1948226/v1
    [16] M. Aljebreen, F. S. Alrayes, S. S. Aljameel, M. K. Saeed, Political Optimization Algorithm with a hybrid deep learning assisted Malicious URL detection model, Sustainability, 15 (2023), 16811. https://doi.org/10.3390/su152416811 doi: 10.3390/su152416811
    [17] T. Wang, Q. Yang, X. Shen, T. R. Gadekallu, W. Wang, K. Dev, A privacy-enhanced retrieval technology for the cloud-assisted internet of things, IEEE T. Ind. Inform., 18 (2021), 4981–4989. https://doi.org/10.1109/TII.2021.3103547 doi: 10.1109/TII.2021.3103547
    [18] V. D. Padma, K. Venkata, An adaptive lightweight hybrid encryption scheme for securing the healthcare data in cloud-assisted Internet of Things, Wireless Pers. Commun., 130 (2023), 2959–2980. https://doi.org/10.1007/s11277-023-10411-6 doi: 10.1007/s11277-023-10411-6
    [19] L. Friedman, O. V. Komogortsev, Assessment of the effectiveness of seven biometric feature normalization techniques, IEEE T. Inf. Foren. Sec., 14 (2019), 2528–2536. https://doi.org/10.1109/TIFS.2019.2904844 doi: 10.1109/TIFS.2019.2904844
    [20] B. Crawford, F. Cisternas-Caneo, K. Sepúlveda, R. Soto, A. Paz, A. Peña, et al., B-PSA: A binary Pendulum Search Algorithm for the feature selection problem, Computers, 12 (2023), 249. https://doi.org/10.3390/computers12120249 doi: 10.3390/computers12120249
    [21] H. Gunasekaran, K. Ramalakshmi, D. K. Swaminathan, M. Mazzara, GIT-Net: An ensemble deep learning-based GI tract classification of endoscopic images, Bioengineering, 10 (2023), 809. https://doi.org/10.3390/bioengineering10070809 doi: 10.3390/bioengineering10070809
    [22] M. Vellaisamy, L. I. Freitas, Detection of human stress using optimized feature selection and classification in ECG signals, Math. Probl. Eng., 2023. https://doi.org/10.1155/2023/3356347 doi: 10.1155/2023/3356347
    [23] R. Keyimu, W. Tuerxun, Y. Feng, B. Tu, Hospital outpatient volume prediction model based on gated recurrent unit optimized by the modified cheetah optimizer, IEEE Access, 2023. https://doi.org/10.1109/ACCESS.2023.3339613 doi: 10.1109/ACCESS.2023.3339613
    [24] J. Sun, R. Cao, M. Zhou, W. Hussain, B. Wang, J. Xue, et al., A hybrid deep neural network for classification of schizophrenia using EEG Data, Sci. Rep., 11 (2021), 4706. https://doi.org/10.1038/s41598-021-83350-6 doi: 10.1038/s41598-021-83350-6
    [25] M. Salb, L. Jovanovic, N. Bacanin, M. Antonijevic, M. Zivkovic, N. Budimirovic, et al., Enhancing Internet of Things network security using hybrid CNN and XGBoost model tuned via modified Reptile Search Algorithm, Appl. Sci., 13 (2023), 12687. https://doi.org/10.3390/app132312687 doi: 10.3390/app132312687
    [26] Y. Meidan, M. Bohadana, Y. Mathov, Y. Mirsky, A. Shabtai, D. Breitenbacher, et al., N-BaIoT—Network-based detection of IoT botnet attacks using deep autoencoders, IEEE Pervas. Comput., 17 (2018), 12–22. https://doi.org/10.1109/MPRV.2018.03367731 doi: 10.1109/MPRV.2018.03367731
    [27] L. Almuqren, H. Alqahtani, S. S. Aljameel, A. S. Salama, I. Yaseen, A. A. Alneil, Hybrid Metaheuristics with Machine Learning based Botnet Detection in Cloud Assisted Internet of Things Environment, IEEE Access, 2023. https://doi.org/10.1109/ACCESS.2023.3322369 doi: 10.1109/ACCESS.2023.3322369
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(188) PDF downloads(12) Cited by(0)

Article outline

Figures and Tables

Figures(13)  /  Tables(5)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog