Intelligent Secure Ecosystem Based on Metaheuristic and Functional Link Neural Network for Edge of Things

Internet of Things (IoT) has evolved for building smart environments in a distributed system, where the data produced by IoT devices are transmitted through Edge computing devices to streamline the flow of traffic from IoT devices to a distributed network. In such a scenario, the attacker introduces many attacks to the edge before forwarding them to distributed servers. This necessitates intrusion detection systems for such environments to mitigate security attacks. This paper has projected a basis for characterization of intrusive behaviors in a distributed system based on the functional link neural nets response weighted-average and teaching–learning metaheuristic with elitism on weight-space. The proposed technique makes use of teaching–learning metaheuristic optimization to obtain suitable parameters for the functional link neural net. Furthermore, the processing of duplicate parameters is successfully avoided by using mutation operation. In addition to this, in this paper the proposed method is found to be more efficient in terms of computational burden.

[1]  Hesham F. A. Hamed,et al.  Intrusion detection systems for IoT-based smart environments: a survey , 2018, Journal of Cloud Computing.

[2]  Y. Takefuji,et al.  Functional-link net computing: theory, system architecture, and functionalities , 1992, Computer.

[3]  Taekyoung Kwon,et al.  An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks , 2010, IEEE Transactions on Industrial Informatics.

[4]  Itzhak Levin,et al.  KDD-99 classifier learning contest LLSoft's results overview , 2000, SKDD.

[5]  Patrick Siarry,et al.  A survey on optimization metaheuristics , 2013, Inf. Sci..

[6]  Halina Kwasnicka,et al.  Nature Inspired Methods and Their Industry Applications—Swarm Intelligence Algorithms , 2018, IEEE Transactions on Industrial Informatics.

[7]  Igor Nai Fovino,et al.  A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems , 2011, IEEE Transactions on Industrial Informatics.

[8]  R. Venkata Rao,et al.  Teaching-learning-based optimization: A novel method for constrained mechanical design optimization problems , 2011, Comput. Aided Des..

[9]  Suleyman Tosun,et al.  Evolutionary task allocation in Internet of Things-based application domains , 2018, Future Gener. Comput. Syst..

[10]  Rachid Beghdad,et al.  Critical study of neural networks in detecting intrusions , 2008, Comput. Secur..

[11]  Janmenjoy Nayak,et al.  A TLBO based gradient descent learning-functional link higher order ANN: An efficient model for learning from non-linear data , 2018, J. King Saud Univ. Comput. Inf. Sci..

[12]  John Y. Hung,et al.  Denial of service attacks on network-based control systems: impact and mitigation , 2005, IEEE Transactions on Industrial Informatics.

[13]  Wolfgang Banzhaf,et al.  The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..

[14]  Vivek Patel,et al.  An elitist teaching-learning-based optimization algorithm for solving complex constrained optimization problems , 2012 .

[15]  Bing Chen,et al.  Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues , 2018, IEEE Access.

[16]  Adel Nadjaran Toosi,et al.  A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers , 2007, Comput. Commun..

[17]  Mohammad S. Obaidat,et al.  Security of e-Systems and Computer Networks , 2007 .

[18]  Chih-Fong Tsai,et al.  CANN: An intrusion detection system based on combining cluster centers and nearest neighbors , 2015, Knowl. Based Syst..

[19]  Bo Yang,et al.  Hybrid flexible neural‐tree‐based intrusion detection systems , 2007, Int. J. Intell. Syst..

[20]  Alyani Ismail,et al.  A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization , 2018, IEEE Access.

[21]  Gilberto Herrera-Ruiz,et al.  Hybrid Approach Based on GA and PSO for Parameter Estimation of a Full Power Quality Disturbance Parameterized Model , 2018, IEEE Transactions on Industrial Informatics.

[22]  Bernhard Pfahringer,et al.  Winning the KDD99 classification cup: bagged boosting , 2000, SKDD.

[23]  Tirtharaj Dash,et al.  A study on intrusion detection using neural networks trained with evolutionary algorithms , 2017, Soft Comput..

[24]  S. Geetha,et al.  A neuro-genetic based short-term forecasting framework for network intrusion prediction system , 2009, Int. J. Autom. Comput..

[25]  Ingoo Han,et al.  The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors , 2003, Expert Syst. Appl..

[26]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[27]  Alka Singh,et al.  Chebyshev Functional Expansion Based Artificial Neural Network Controller for Shunt Compensation , 2018, IEEE Transactions on Industrial Informatics.

[28]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.