Multi-objective Particle Swarm Optimization for Botnet Detection in Internet of Things

Nowadays, the world witnesses an immense growth in Internet of things devices. Such devices are found in smart homes, wearable devices, retail, health care, industry, and transportation. As we are entering Internet of things (IoT) digital era, IoT devices not only hack our world, but also start to hack our personal life. The widespread IoT has created a rich platform for potential IoT cyberattacks. Data mining and machine learning techniques have significant roles in the field of IoT botnet detection. The aim of this chapter is to develop detection model based on multi-objective particle swarm optimization (MOPSO) for identifying the malicious behaviors in IoT network traffic. The performance of MOPSO is verified against multi-objective non-dominating sorting genetic algorithm (NSGA-II), common traditional machine learning algorithms, and some conventional filter-based feature selection methods. As per the obtained results, MOPSO is competitive and outperforms NSGA-II, traditional machine learning methods, and filter-based methods in most of the studied datasets.

[1]  Ferat Sahin,et al.  A survey on feature selection methods , 2014, Comput. Electr. Eng..

[2]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[3]  José M. Molina López,et al.  Applying VorEAl for IoT Intrusion Detection , 2018, HAIS.

[4]  Ibrahim Aljarah,et al.  MapReduce intrusion detection system based on a particle swarm optimization clustering algorithm , 2013, 2013 IEEE Congress on Evolutionary Computation.

[5]  Andrew Lewis,et al.  S-shaped versus V-shaped transfer functions for binary Particle Swarm Optimization , 2013, Swarm Evol. Comput..

[6]  Hossam Faris,et al.  Asynchronous accelerating multi-leader salp chains for feature selection , 2018, Appl. Soft Comput..

[7]  Jalal A. Nasiri,et al.  KNN-based least squares twin support vector machine for pattern classification , 2018, Applied Intelligence.

[8]  Xin-She Yang,et al.  A New Metaheuristic Bat-Inspired Algorithm , 2010, NICSO.

[9]  Hossam Faris,et al.  Feature Selection Using Salp Swarm Algorithm with Chaos , 2018, ISMSI '18.

[10]  Jack Whitter-Jones Security review on the Internet of Things , 2018, 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC).

[11]  Jong Hyuk Park,et al.  Semi-supervised learning based distributed attack detection framework for IoT , 2018, Appl. Soft Comput..

[12]  Mengjie Zhang,et al.  Particle Swarm Optimization for Feature Selection in Classification: A Multi-Objective Approach , 2013, IEEE Transactions on Cybernetics.

[13]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[14]  Mustafa Zuhaer Nayef Al-Dabagh,et al.  Face Recognition System Based on Kernel Discriminant Analysis, K-Nearest Neighbor and Support Vector Machine , 2018 .

[15]  Meena Kowshalya,et al.  Detection of Sybil's across communities over Social Internet of Things , 2016 .

[16]  C. R. Rene Robin,et al.  An exponent based error detection mechanism against DXDOS attack for improving the security in cloud , 2018, Cluster Computing.

[17]  Hongbin Zhang,et al.  Feature selection using tabu search method , 2002, Pattern Recognit..

[18]  Liang Xiao,et al.  IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.

[19]  Ronald L. Rivest,et al.  Introduction to Algorithms , 1990 .

[20]  Kishore Angrishi,et al.  Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV) : IoT Botnets , 2017, ArXiv.

[21]  Hossam Faris,et al.  A Hybrid Approach Based on Particle Swarm Optimization and Random Forests for E-Mail Spam Filtering , 2016, ICCCI.

[22]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[23]  Graham Kendall,et al.  A multi-objective particle swarm optimization algorithm based on dynamic boundary search for constrained optimization , 2018, Appl. Soft Comput..

[24]  Bing Xu,et al.  An intrusion detection method for internet of things based on suppressed fuzzy clustering , 2018, EURASIP Journal on Wireless Communications and Networking.

[25]  Ítalo S. Cunha,et al.  The Evolution of Bashlite and Mirai IoT Botnets , 2018, 2018 IEEE Symposium on Computers and Communications (ISCC).

[26]  Hossam Faris,et al.  An efficient binary Salp Swarm Algorithm with crossover scheme for feature selection problems , 2018, Knowl. Based Syst..

[27]  Hesham F. A. Hamed,et al.  Intrusion detection systems for IoT-based smart environments: a survey , 2018, Journal of Cloud Computing.

[28]  R. Butler,et al.  Challenges and opportunities , 2018, Worldwide Hospitality and Tourism Themes.

[29]  Russell C. Eberhart,et al.  A new optimizer using particle swarm theory , 1995, MHS'95. Proceedings of the Sixth International Symposium on Micro Machine and Human Science.

[30]  Hossam Faris,et al.  A multi-verse optimizer approach for feature selection and optimizing SVM parameters based on a robust system architecture , 2017, Neural Computing and Applications.

[31]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[32]  Hossam Faris,et al.  An intelligent system for spam detection and identification of the most relevant features based on evolutionary Random Weight Networks , 2019, Inf. Fusion.

[33]  Hossam Faris,et al.  Optimizing Feedforward neural networks using Krill Herd algorithm for E-mail spam detection , 2015, 2015 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT).

[34]  Kim-Kwang Raymond Choo,et al.  An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things , 2019, IEEE Internet of Things Journal.

[35]  M. A. Kashem,et al.  An Effective Lightweight Cryptographic Algorithm to Secure Resource-Constrained Devices , 2018 .

[36]  N. Malarvizhi,et al.  Secure and optimal authentication framework for cloud management using HGAPSO algorithm , 2018, Cluster Computing.

[37]  Hossam Faris,et al.  Evolutionary Population Dynamics and Grasshopper Optimization approaches for feature selection problems , 2017, Knowl. Based Syst..

[38]  Hossam Faris,et al.  Dragonfly Algorithm: Theory, Literature Review, and Application in Feature Selection , 2019, Nature-Inspired Optimizers.

[39]  Ibrahim Aljarah,et al.  Towards a scalable intrusion detection system based on parallel PSO clustering using mapreduce , 2013, GECCO.

[40]  Hossam Faris,et al.  Binary grasshopper optimisation algorithm approaches for feature selection problems , 2019, Expert Syst. Appl..

[41]  Georgios Kambourakis,et al.  DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.

[42]  Marin Emilov Pamukov,et al.  Negative Selection and Neural Network Based Algorithm for Intrusion Detection in IoT , 2018, 2018 41st International Conference on Telecommunications and Signal Processing (TSP).

[43]  Hossam Faris,et al.  Simultaneous Feature Selection and Support Vector Machine Optimization Using the Grasshopper Optimization Algorithm , 2018, Cognitive Computation.

[44]  Majdi M. Mafarja,et al.  Hybrid binary ant lion optimizer with rough set and approximate entropy reducts for feature selection , 2018, Soft Comput..

[45]  R. Kesavamoorthy,et al.  Swarm intelligence based autonomous DDoS attack detection and defense using multi agent system , 2018, Cluster Computing.

[46]  Hossam Faris,et al.  Binary dragonfly optimization for feature selection using time-varying transfer functions , 2018, Knowl. Based Syst..

[47]  Ezz El-Din Hemdan,et al.  Cybercrimes Investigation and Intrusion Detection in Internet of Things Based on Data Science Methods , 2018 .

[48]  Syed Hassan Ahmed,et al.  NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks , 2018, The Journal of Supercomputing.

[49]  Nasir Ghani,et al.  A Machine Learning Model for Classifying Unsolicited IoT Devices by Observing Network Telescopes , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).

[50]  Zhifeng Zhao,et al.  AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks , 2018, IEEE Internet of Things Journal.

[51]  Mengjie Zhang,et al.  Evaluation of particle swarm optimization based centroid classifier with different distance metrics , 2008, 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence).

[52]  Carlos A. Coello Coello,et al.  Handling multiple objectives with particle swarm optimization , 2004, IEEE Transactions on Evolutionary Computation.

[53]  Yuval Elovici,et al.  N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders , 2018, IEEE Pervasive Computing.

[54]  Ayman El-Sayed,et al.  Predicting kidney transplantation outcome based on hybrid feature selection and KNN classifier , 2019, Multimedia Tools and Applications.

[55]  FreundYoav,et al.  Large Margin Classification Using the Perceptron Algorithm , 1999 .