International Journal of Advanced Computer Research (IJACR) ISSN (P): 2249-7277 ISSN (O): 2277-7970 Vol - 13, Issue - 65, December 2023
  1. 1
    Google Scholar
  2. 4
    Impact Factor
Design of advanced intrusion detection system for multimodal fuzzy-based convolutional neural networks (mFCNN)

K. Suresh Kumar, T. Ananth Kumar and R. Nishanth

Abstract

The Internet of Things (IoT) develops a smart autonomous system capable of controlling and facilitating numerous human intervention activities such as inventory, electricity, traffic, and health management. It primarily operates by interconnecting networks and objects in various locations. Communication is carried out between devices to accomplish diverse missions in industrial, household, and healthcare applications. The involvement of the IoT in these applications renders the devices susceptible to cyber-attacks. In this work, an intelligent methodology was proposed to defend the devices against various security-related threats using modified deep learning algorithms. The intrusion detection system was designed using a hybrid model comprising multimodal fuzzy-based convolutional neural networks (mFCNN) in association with bidirectional long-short term memory (Bi-LSTM) and the enhanced code element embedding (ECEE) method. Here, the input for training is derived from real images, videos, and audio information retrieved from various sensors. Initially, the ECEE in each input frame is converted into suitable vectors. These vectors are then mapped to corresponding fixed-length vectors for embedding to achieve the most compressed representation. The Bi-LSTM is utilized for extracting relevant information related to spatial features, thus providing an effective intrusion detection mechanism. The mFCNN extracts the most critical temporal features by classifying contextual inputs using the captured videos and images. The experimental results demonstrate that the proposed hybrid model yields better results compared to existing methodologies, with the accuracy of protection benchmarked at 99.91%, which is higher than other baseline methods.

Keyword

Internet of Things (IoT), Cybersecurity, Deep learning algorithms, Intrusion detection systems, Hybrid neural networks.

Cite this article

Kumar KS, Kumar TA, Nishanth R

Refference

[1][1]Kuzlu M, Fair C, Guler O. Role of artificial intelligence in the internet of things (IoT) cybersecurity. Discover Internet of Things. 2021; 1:1-4.

[2][2]Rahman SA, Tout H, Talhi C, Mourad A. Internet of things intrusion detection: Centralized, on-device, or federated learning? IEEE Network. 2020; 34(6):310-7.

[3][3]Dang QV. Studying machine learning techniques for intrusion detection systems. In future data and security engineering: 6th international conference, Nha Trang City, Vietnam, proceedings,2019 (pp. 411-26). Springer International Publishing.

[4][4]Rajmohan R, Kumar TA, Julie EG, Robinson YH, Vimal S, Kadry S, et al. G-Sep:a deep learning algorithm for detection of long-term sepsis using bidirectional gated recurrent unit. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. 2022; 30(Supp01):1-29.

[5][5]Laghari AA, Wu K, Laghari RA, Ali M, Khan AA. A review and state of art of Internet of Things (IoT). Archives of Computational Methods in Engineering. 2021: 1-9.

[6][6]Kumar KS, Mani AR, Sundaresan S, Kumar TA, Robinson YH. Blockchain-based energy-efficient smart green city in IoT environments. In blockchain for smart cities 2021 (pp. 81-103). Elsevier.

[7][7]Magán-Carrión R, Urda D, Díaz-Cano I, Dorronsoro B. Towards a reliable comparison and evaluation of network intrusion detection systems based on machine learning approaches. Applied Sciences. 2020; 10(5):1775.

[8][8]Kumar A, Purohit V, Bharti V, Singh R, Singh SK. Medisecfed: Private and secure medical image classification in the presence of malicious clients. IEEE Transactions on Industrial Informatics. 2021; 18(8):5648-57.

[9][9]Rajmohan R, Pavithra M, Kumar TA, Manjubala P. Exploration of deep RNN architectures: LSTM and gru in medical diagnostics of cardiovascular and neuro diseases. In handbook of deep learning in biomedical engineering and health informatics 2021 (pp. 167-202). Apple Academic Press.

[10][10]Sundaresan S, Kumar KS, Kumar TA, Ashok V, Julie EG. Blockchain architecture for intelligent water management system in smart cities. In blockchain for smart cities 2021 (pp. 57-80). Elsevier.

[11][11]Hao S, Shi C, Cao L, Niu Z, Guo P. Learning deep relevance couplings for ad-hoc document retrieval. Expert Systems with Applications. 2021; 183:115335.

[12][12]Otoum Y, Liu D, Nayak A. DL-IDS: a deep learning–based intrusion detection framework for securing IoT. Transactions on Emerging Telecommunications Technologies. 2022; 33(3): e3803.

[13][13]Xu L, Zhou X, Tao Y, Liu L, Yu X, Kumar N. Intelligent security performance prediction for IoT-enabled healthcare networks using an improved CNN. IEEE Transactions on Industrial Informatics. 2021; 18(3):2063-74.

[14][14]Elsayed MS, Le-Khac NA, Dev S, Jurcut AD. Machine-learning techniques for detecting attacks in SDN. In 7th international conference on computer science and network technology 2019 (pp. 277-81). IEEE.

[15][15]Binbusayyis A, Vaiyapuri T. Unsupervised deep learning approach for network intrusion detection combining convolutional autoencoder and one-class SVM. Applied Intelligence. 2021; 51(10):7094-108.

[16][16]Kumar TA, Rajmohan R, Adithya M, Sunder R. A novel security scheme using deep learning based low overhead localised flooding algorithm for wireless sensor networks. International Journal of Data Science. 2021; 6(1):19-32.

[17][17]Sharma R, Vashisht V, Singh U. Performance analysis of evolutionary technique based partitional clustering algorithms for wireless sensor networks. In soft computing: theories and applications: proceedings of SoCTA 2018 (pp. 171-80). Springer Singapore.

[18][18]Pontes CF, De Souza MM, Gondim JJ, Bishop M, Marotta MA. A new method for flow-based network intrusion detection using the inverse Potts model. IEEE Transactions on Network and Service Management. 2021; 18(2):1125-36.

[19][19]Martins I, Resende JS, Sousa PR, Silva S, Antunes L, Gama J. Host-based IDS: a review and open issues of an anomaly detection system in IoT. Future Generation Computer Systems. 2022; 133:95-113.

[20][20]He R, Schneider C, Ai B, Wang G, Zhong Z, Dupleich DA, et al. Propagation channels of 5G millimeter-wave vehicle-to-vehicle communications: recent advances and future challenges. IEEE Vehicular Technology Magazine. 2019; 15(1):16-26.

[21][21]Feng YH, Dai YJ, Wang RZ, Ge TS. Insights into desiccant-based internally-cooled dehumidification using porous sorbents: From a modeling viewpoint. Applied Energy. 2022; 311:118732.

[22][22]Zhou Z, Wang J, Ye Y. Exact BER analysis of differential chaos shift keying communication system in fading channels. Wireless Personal Communications. 2010; 53:299-310.

[23][23]Angjelichinoski M, Trillingsgaard KF, Popovski P. A statistical learning approach to ultra-reliable low latency communication. IEEE Transactions on Communications. 2019; 67(7):5153-66.

[24][24]Tegos SA, Diamantoulakis PD, Karagiannidis GK. On the performance of uplink rate-splitting multiple access. IEEE Communications Letters. 2022; 26(3):523-7.

[25][25]Arumugam D, Govindaraju K, Tamilarasan AK. AIIoT-based smart framework for screening specific learning disabilities. In machine learning for critical internet of medical things: applications and use cases 2022 (pp. 103-24). Cham: Springer International Publishing.

[26][26]Kumar TA, John A, Kumar CR. 2. IoT technology and applications. Internet of Things. 2020:43-62.

[27][27]Alhussein M, Muhammad G, Hossain MS, Amin SU. Cognitive IoT-cloud integration for smart healthcare: case study for epileptic seizure detection and monitoring. Mobile Networks and Applications. 2018; 23:1624-35.

[28][28]Samuel TA, Pavithra M, Mohan RR. LIFI-based radiation-free monitoring and transmission device for hospitals/public places. In multimedia and sensory input for augmented, mixed, and virtual reality 2021 (pp. 195-205). IGI Global.

[29][29]Cao C, Liu X, Yang Y, Yu Y, Wang J, Wang Z, et al. Look and think twice: Capturing top-down visual attention with feedback convolutional neural networks. In proceedings of the IEEE international conference on computer vision 2015 (pp. 2956-64).

[30][30]Khan FA, Gumaei A, Derhab A, Hussain A. A novel two-stage deep learning model for efficient network intrusion detection. IEEE Access. 2019; 7:30373-85.

[31][31]Alqahtani M, Gumaei A, Mathkour H, Maher Ben Ismail M. A genetic-based extreme gradient boosting model for detecting intrusions in wireless sensor networks. Sensors. 2019; 19(20):4383.

[32][32]Derhab A, Guerroumi M, Gumaei A, Maglaras L, Ferrag MA, Mukherjee M, et al. Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security. Sensors. 2019; 19(14):3119.