الورقة الاولى مراجعة
الورقة الاولى مراجعة
الورقة الاولى مراجعة
Abstract
Today, the field of medicine and health includes one of the most widely used
types of wireless networks. The presence of IoT networks in health applications
has improved the quality of services and patient monitoring, but these wireless
networks are very vulnerable to attack, and it is very necessary to prevent and
detect intrusion. Machine learning methods are a suitable solution in detecting
types of interferences and can be strengthened at the stage of feature selection
and classification. Intrusion detection data in wireless networks has many
advantages and you need to select the appropriate features to increase detection
accuracy in the classification stage. Heuristic algorithms are a good solution in
feature selection, and in this paper, the combined optimization algorithm of
Archimedes and cosine is used to select features, and this algorithm is also used
to adjust the weights of the multilayer neural network. The results showed that
all the tested methods have higher classification accuracy than accuracy and
sensitivity, and the sensitivity value of the proposed method is lower than the
basic method but has a higher accuracy rate, and this indicates that the proposed
method for data attack has greater sensitivity, but in the classification accuracy
in which data is detected Non-attacking and attacking, the proposed method can
improve the accuracy of intrusion detection by more than 2%.
Pattern classification is one of the widely used areas in machine learning, and
this pattern classification can lead to its recognition in various applications. In
this paper, IoT networks are discussed, then different methods of attack in
networks, evolutionary algorithms, such as Archimedes and cosine algorithms,
as well as optimization, there is multiple construction, and we also reviewed the
research literature in this field.
According to the Industry 4.0 vision, the use of IoT in the industrial sector
improves production, efficiency, and security of industrial processes [8]. In
short, the Internet of Things is specifically related to the effective use of the
Internet of Things in industrial processes. IOT can be briefly described as a
four-layer architecture. In industry, this architecture includes physical, network,
middleware, and application layers, as shown in Figure 1. The physical layer
includes a large number of installed physical devices, sensors, computing
devices, mobile phones and other objects, and monitoring and automation
devices. The network layer includes many communication networks such as
wireless sensor networks, mobile networks, machine-to-machine interfaces, etc.
The middleware layer provides communication between the network layer and
the application layer. It contains cloud storage, application interface, and web
services. The application layer is the top layer of the IoT architecture. Its
mission is to facilitate industrial and service operations including smart
factories, smart buildings, smart healthcare, smart vehicles, robots, etc.
The purpose of using neural networks for attack detection is the ability to
generalize data (from incomplete data) and the ability to classify data as normal
or unreadable. An intrusion detection system based on neural networks is an
effective solution to unstructured network data. The attack detection accuracy of
this solution depends on the number of hidden layers and the training phase of
the neural network. [13] Fuzzy logic can be used to deal with inaccurate
descriptions of attacks, and to reduce the training time of a neural network,
fuzzy logic can be used with a neural network to quickly detect attacks. [13]
Some attacks are based on specific attacks. Association rules can be used to
create new signatures. With the newly generated signatures, specific attack
types can be recognized instantly. [13] A support vector machine is used to
detect attacks based on limited sample data, where the dimensions of the data
will not affect the accuracy. Evolutionary algorithms are used to define network
properties (to select optimal parameters) that can be applied in other techniques
to optimize and improve the accuracy of intrusion detection systems. Which can
be used to improve training of neural networks and tuning support vector device
parameters. [14,13]
related work
In this section, some research has been mentioned, especially in the field of
security in the Internet of Things. In fact, the effective routing and control of
large-scale systems in an IOT is a complex and challenging task. Computing
operating systems must be able to process and analyze big data securely and in a
timely manner [15], [16]. In addition, the system must have high capacity and
throughput to transmit data with minimal delay time and high reliability.
Algorithms and machine learning models have greatly improved the
performance of the industrial sector in terms of percentage reliability and safety.
These algorithms have great potential for investigating security challenges in
IoT systems [17], [18]. In the following, some recent research work related to
machine learning-based security schemes for IoT and IoT are presented.
Farhanakian and Haikonen [19] proposed a deep self-encryption model for
network attack detection. The researchers used the KDD-CUP 99 dataset to
evaluate their proposed scheme. Attack detection accuracy is 94.71%. Their
experimental results prove that their model performs better than that of the deep
belief network. [20] proposed an asymmetric deep encoder (NDAE) that learns
features in an unsupervised manner. The authors applied their proposed model
to a tensor-based graphics processing unit (GPU) and evaluated the model using
the NSL-KDD dataset. The attack detection accuracy was 89.22%. Ali and
colleagues [21] introduced a fast learning network by combining a particle
swarm optimization method. The authors implemented their proposed scheme
using the KDD 99 dataset. The attack prediction accuracy of the proposed
model was 98.92%. Although their model provides satisfactory performance,
the complexity of their model is high and is not suitable for devices with limited
resources. Al-Makhafi and colleagues [22] presented a new hybrid genetic
algorithm and support a vector machine with a scheme based on particle swarm
optimization for DoS attack detection. The researchers implemented their
proposed scheme using the KDD 99 dataset and achieved an accuracy of
96.38%.
Bara and colleagues [27] presented a cloud-based deep learning framework for
phishing and secondary attacks. For phishing attacks and secondary attacks,
their empirical results were 94.30% and 94.80% accurate values, respectively.
Zeng and colleagues [28] presented an extreme learning method based on linear
diagnostic analysis for IoT interference detection. The researchers evaluated the
accuracy of the proposed scheme using the NSL-KDD dataset. The accuracy of
their approach was 92.35%. Singh and colleagues [29] presented a comparative
analysis of machine learning-based wavelet techniques for IoT attack detection.
Iracitano and colleagues [30] presented an intelligent intrusion detection scheme
based on self-encoding. The researchers evaluated their scheme using the NSL-
KDD dataset. Their experimental results provide better performance than
conventional deep shallow networks.
Yan and colleagues [31] proposed a new hinge classification algorithm for
detecting cyberattacks. The researchers compared the performance of the
proposed scheme with decision tree algorithms and logistic regression model.
Eskandari and colleagues [23] presented a smart scheme for intrusion detection.
They provided discussions about publishing the plan in IOT portals. Using their
proposed scheme, they successfully detected the malicious traffic, port
scanning, and exhaustive search attack. Saharkhaizan et al [33] proposed a
mixed IDS model for remote local (R2L) and user root (U2R) attacks. They
successfully detected both attacks in IoT networks using the NSL-KDD dataset.
In short, most of the researchers presented their schemes for detecting attacks
targeting some specific IoT applications. They mostly evaluated their models
using the KDD Cup 99 and NSL-KDD wave datasets. These datasets have been
in use for a long time and are targeted at specific IoT applications. Therefore,
according to the modern security needs of IOT networks, new data sets are
needed. One limitation of the research described is that most researchers did not
discuss the compatibility of their proposed models with devices with limited
resources. The main objective of this thesis is to overcome these challenges by
presenting a new machine learning-based scheme for attack detection using an
emerging dataset related to IoT security.
The following is a summary of intrusion detection and intrusion prevention
system technologies, noting some of the features and limitations.
Support for vector machine- • Attacks can be properly • Only separate features can
based detection classified if limited sample be categorized. Therefore,
data are given. pre-processing of these
• It can handle a huge features is required.
number of features.
• Used to select the best • It's a complicated method.
Diagnosis is based on
features for detection.
evolutionary algorithms
• It is an effective solution • It has a high computational
hybrid technologies for the correct classification cost.
of rules.
Step 2: Update the size and density based on the following relationship [34]:
where volbest and denbest represent the size and density associated with the
best body found up to that point, and the rand is a uniformly distributed random
number.
The TF is gradually increased over time until it reaches one. Here, t and tmax
are the number of iterations and the maximum number of iterations. This
parameter affects the exploration and extraction process in this algorithm.
t +1
d =exp ( t max −t
t max
−)( )
t
t max
(5)
In the above relationship, d^(t + 1) decreases with time, which increases the
mining power.
If TF < 0.5, a collision occurs between objects, and a random object (the
master) is selected and generated.
denmr + vol mr∗acc mr
acc ti +1= t+1 t +1 (6)
den i ∗vol i
where deni, voli, and acci are the density, magnitude, and acceleration of object
i. While accmr, denmr, and volmr are the acceleration, density, and volume of
the random object.
If TF > 0.5, there is no collision between the objects, then the following relation
is used, where accbest is the acceleration of the best object.
where u and l are the normalized range and are set to 0.9 and 0.1, respectively.
acc i is also the percentage of the step that changes each step.
t +1
If body i is far from the global optimum, then the acceleration will be large -
this means that the acceleration will be in the exploration phase; Otherwise, in
the exploitation phase, the exploration and exploitation phase will fluctuate. In
the normal operating phase, the acceleration coefficient starts out with a large
value and decreases over time.
If Tf < 0.5:
If Tf > 0.5:
T increases with time and is directly related to the transfer factor and is defined
using T = C3 * Tf. T increases with time in the range [C3 × 0.3, 1], taking the
best position as the initial value. T starts with a low ratio, which leads to a large
difference between the best position and the current position, so the random
movement step size will be large. As research continues, this percentage is
gradually increased to reduce the difference between the best position and the
current position. This leads to striking the right balance between exploration and
exploitation. F is a flag that shows the direction of motion and is calculated
from the following equation [36]:
{
F= +1 if p ≤ 0.5
−1if p> 0.5
where P=2*rand- C4(11)
Step 8 - Hershey's assessment is stored with the fitness function xbest, denbest,
volbest and accbest.
Step 9- If the iterations are completed, the end of the algorithm and the best
answer in step 6 are stored in memory, then go to step 2 and the iterations are
numbered.
(b) Pay special attention to the initial values to avoid local preference and better
convergence
(d) No need for gradation (derivation) information for the search space
cosine sine improvement algorithm to be
The sine and cosine optimization algorithm was designed with inspiration from
the motion of sine and cosine waves and was able to show that it can have
problems of exploration and extraction in optimization and global optimization
of the problem. This algorithm has a strong extraction mechanism because the
best solution always represents the destination of the search waves, so the
search waves do not deviate from the original optimal of the problem. In fact,
the oscillating behavior of the cosine algorithm allows it to search the search
space on the optimal problem in high dimensions and to obtain a good precision
for the best [35]:
Do the following steps until you reach the final number of repetitions:
The coordinates of pti for the best solution found, considered as the destination.
If r 1is less than 1, then the movement is performed towards the destination
point, and if it is greater than 1, then the movement is performed away from the
destination point.
Figure 3 Effect of coefficient r 1on wave motion in sine and cosine algorithm
[35].
Figure 4: The effect of the coefficient r 2on the motion of waves in the sine
and cosine algorithm [35].
In rapper methods, the goal is to identify subsets of features that improve the
performance of a predetermined learning model. These methods have two
phases. Phase 1: The feature selection phase in which subsets of the main
feature set are selected using the accuracy of the classifier on the training data
as the criterion. Phase 2: Learning and testing, where the classifier is learned
using the best subset of features and training data, and tested using the test data.
Therefore, the Rapper method uses the predictive power of machine learning to
calculate the usefulness of a subset of features.
There are a number of different regulations in this field, which may be subject
to an open title for the purpose of selecting and making use of it. Please note
that these regulations are based on the best accounting considerations in Table
2. Enumerate the batches of the competition for individuals and in the manner
of the cluster in its parameters Nc enumerate the cluster of these, C of the
envelopes of each of the ast and two in all of the procedures Np of the collection
of the assemblage. [36]
Clearing O (C × N P 2 )
Clustering O (C × N C × N P)
2. Time complexity: the time required to find the answer subset of features.
The “---” in the last column means we can't say anything about accuracy. With
the exception of classifier error, the accuracy of other evaluation functions
depends on the data set used and the classifier used after the feature is defined
to classify the classes.
Table 4Comparison of different Erysipelas [18]
Evaluation
the generality Time complexity precision
function type
Distance criterion has it down ---
Information
has it down ---
standard
Dependency
has it down ---
criteria
Compatibility
has it medium ---
criteria
Classifier error does not have Top Very much
References
[1] Nguyen, H.-D., Pham, V.-D., Nguyen, Q.-H., Pham, V.-M., Pham, M. H., Vu, V.
M., & Bui, Q.-T,” An optimal search for neural network parameters using the
Salp swarm optimization algorithm”, a landslide application. Remote Sensing
Letters, 11(4), 353–362.2020.
[2] Tubishat, M., Idris, N., Shuib, L., Abushariah, M. A. M., & Mirjalili,
S,” nImproved salp swarm algorithm based on opposition based learning and
novel local search algorithm for feature selection”, Expert Systems with
Applications, 113122.2019.
[3] H. Shah-Mansouri and V. W. Wong, "Hierarchical fog-cloud computing for IoT
systems: A computation offloading game," IEEE Internet of Things Journal, vol.
5, no. 4, pp. 3246-3257, 2018.
[4] N Cheng, F Lyu, W Quan, C Zhou,” Space/aerial-assisted computing offloading
for IoT applications: A learning-based approach”, IEEE Journal on Selected
Areas in Communications vol. 3, no. 3, pp. 56-s70, 2019.
[5] H Guo, J Liu, J Zhang, W Sun,” Mobile-edge computation offloading for
ultradense IoT networks”, IEEE Internet of Things, vol. 8, no. 1, p. 11-22, 2018.
[6] W Du, Z Ren, A Chen, H Liu,” A Knowledge Transfer-Based Evolutionary
Algorithm for Multimodal Optimization”, in: Evolutionary Computation ,pp.
207–234,2021.
[7] PR Sekhar, B Sujatha,” A Literature Review on Feature Selection using
Evolutionary Algorithms7 2020,” th International Conference on Smart
Structures and Systems ( CSSS) ,pp. 14–21,2020.
[8] N Neggaz, AA Ewees, M Abd Elaziz,” Boosting salp swarm algorithm by sine
cosine algorithm and disrupt operator for feature selection”, Expert
Systems,pp. 57–68,2020.
[9] L Abualigah, AJ Dulaimi,” A novel feature selection method for data mining
tasks using hybrid sine cosine algorithm and genetic algorithm”, Cluster
Computing,pp. 301–321,2021.
[10] Y Wan, A Ma, Y Zhong, X Hu,” Multiobjective hyperspectral feature selection
based on discrete sine cosine algorithm”,IEEE Transactions,pp. 14–21,2020.
[11] Mainetti L, Patrono L, Rametta P .” Capturing behavioral changes of elderly
people through unobtrusive sensing technologies”. In: 2016 24th International
conference on software, telecommunications and computer networks
(SoftCOM). IEEE.S2016.
[12] Chavda P et al ,” Early detection of cardiac disease using machine learning”.
Available at SSRN S3370813.S2019.
[13] Hamim M et al .”IoT based remote health monitoring system for patients and
elderly people”. In: 2019 International conference on robotics, electrical and
signal processing techniques (ICREST). IEEE.S2019.
[14] JianingChen,JunWu ,HaoranLiang,ShahidMumtaz,JianhuaLi,Kostromitin
Konstantin, Ali Kashif Bashir, and Raheel Nawaz. Collaborative trust
blockchain based unbiased control transfer mechanism for industrial
automation. IEEE Transactions on Industry Applications, 5: 85–91,2019.
[15] William Grant Hatcher and Wei Yu. A survey of deep learning: platforms,
applications and emergingre search trends. IEEEAccess,6: 24411–24432, 2018.
[16] Mehrzad LavaDAni, Stefan Forsström, Ulf Jennehag, and Tingting Zhang.
Combining fog computing with sensor mote machine learning for industrial iot.
Sensors, 18(5): 1532, 2018.
[17] Fahimeh Farahnakian and Jukka Heikkonen. A deep auto-encoder based
approach for intrusion detection system. In 2018 20th International Conference
on Advanced Communication Technology (ICACT) , pages 178–183. IEEE,
2018.
[18] Nathan Shone, Tran Nguyen Ngoc, Vu Dinh Phai, and Qi Shi. A deep learning
approach to network intrusion detection. IEEE Transactions on Emerging
Topics in Computational Intelligence, 2(1): 41–50, 2018.
[19] Mohammed Hasan Ali, Bahaa Abbas Dawood Al Mohammed, Alyani Ismail,
and Mohamad Fadli Zolkipli. A new intrusion detection system based on fast
learning network and particle swarm optimization. IEEE Access, 6: a20255–
20261, 2018.
[20] Mehdi Moukhafi, Khalid El Yassini, and Seddik Bri. A novel hybrid ga and svm
with pso feature selection for intrusion detection system. Int. J. Adv. Sci. Res.
Eng. , 4: 129–134, 2018.
[21] R Vijayanand, D Devaraj, and B Kannapiran. A novel intrusion detection
system for wireless mesh network with hybrid feature selection technique based
on ga and mi. Journal of Intelligent & Fuzzy Systems, 34(3): 1243– 1250,
a2018.
[22] L Khalvati, M Keshtgary, and N Rikhtegar. Intrusion detection based on a novel
hybrid learning approach. Journal of AI and data mining, 6(1): 157– 162, 2018.
[23] JQ James, Yunhe Hou, and Victor OK Li. Online false data injection attack
detection with wavelet transform and deep neural networks. IEEE Transactions
on Industrial Informatics, 14(7): 3271–3280, 2018.
[24] Hadi Larijani, Abbas Javed, Nhamoinesu Mtetwa, Jawad Ahmad, et al.
Intrusion detection using swarm intelligence. In2019UK/ChinaEmerging
Technologies (UCET) , pages 1–5. IEEE, a2019.
[25] Gonzalo De La Torre Parra, Paul Rad, Kim-Kwang Raymond Choo, and Nicole
Beebe. Detecting internet of things attacks using distributed deep learning.
Journal of Network and Computer Applications, page 102662, a2020.
[26] Dehua Zheng, Zhen Hong, Ning Wang, and Ping Chen. An improved ldaba
sedelm classification for intrusion dete ctionalg orithminiot application.
Sensors, 20(6): 1706-1712 2020.
[27] Taranveer Singh and Neeraj Kumar. Machine learning models for intrusion
detection in iot environment: A comprehensive review. Computer
Communications,15-24. 2020.
[28] Cosimo Ieracitano, Ahsan Adeel, Francesco Carlo Morabito, and Amir
HuDAin. A novel statistical analysis and autoencoder driven intelligent
intrusion detection approach. Neurocomputing, 387: 51–62, 2020.
[29] Xiaodan Yan, Yang Xu, Xiaofei Xing, Baojiang Cui, Zihao Guo, and
TaibiaoGuo. Trust worthy network anomaly dete ction based on an adaptive
learning rate and momentum in IOT. IEEE Transactions on Industrial
Informatics, a31–42,2020.
[30] Mojtaba Eskandari, Zaffar Haider Janjua, Massimo Vecchio, and Fabio
Antonelli. Passban ids: An intelligent anomaly based intrusion detection system
for iot edge devices. IEEE Internet of Things Journal, 47–53, 2020.
[31] Mahdis Saharkhizan, Amin Azmoodeh, Hamed HaddadPajouh, Ali
Dehghantanha, Reza M Parizi, and Gautam Srivastava. A hybrid deep
generativelocalmetriclearningmethodforintrusiondetection. InHandbookof Big
Data Privacy. 343–357, 2020.
[32] R Vinayakumar, Mamoun Alazab, Sriram Srinivasan, Quoc-Viet Pham, Soman
Kotti Padannayil, and K Simran. A visualized botnet detection system based
deep learning for the internet of things networks of smart cities. IEEE
Transactions on Industry Applications, 46–57, 2020.
[33] Nagarathna Ravi and S Mercy Shalinie. Learning driven detection and
mitigation of ddos attack in iot via sdn-cloud architecture. IEEE Internet of
Things Journal, 112–124, 2020.
[34] Hashim, F. A., Hussain, K., Houssein, E. H., Mabrouk, M. S., & Al-Atabany, W.
(2020). Archimedes optimization algorithm: a new metaheuristic algorithm for
solving optimization problems. Applied Intelligence, 273, 114287.
[35] Seyedali Mirjalili. (2016). SCA: A Sine Cosine Algorithm for solving
optimization problems”, Knowledge-Based Systems , pp. 1–6.
[36] R Hans, H Kaur,” Hybrid binary Sine Cosine Algorithm and Ant Lion
Optimization (SCALO) approaches for feature selection problem”,Journal of
Computational Materials Science ,pp. 6–21,2020.