Augmented whale feature selection for IoT attacks: Structure, analysis and applications

Abstract Smart connected appliances expand the boundaries of the conventional Internet into the new Internet of Things (IoT). IoT started to hold a significant role in our life, and in several fields as in transportation, industry, smart homes, and cities. However, one of the critical issues is how to protect IoT environments and prevent intrusions. Attacks detection systems aim to identify malicious patterns and threats that cannot be detected by traditional security countermeasures. In literature, feature selection or dimensionality reduction has been profoundly studied and applied to the design of intrusion detection systems. In this paper, we present a novel wrapper feature selection approach based on augmented Whale Optimization Algorithm (WOA), which adopted in the context of IoT attacks detection and handles the high dimensionality of the problem. In our approach, we introduce the use of both V-shaped and S-shaped transfer functions into WOA and compare the superior variant with other well-known evolutionary optimizers. The experiments are conducted using N-BaIoT dataset; wherein, five datasets were sampled from the original dataset. The dataset represents real IoT traffic, which is drawn from the UCI repository. The experimental results show that WOA based on V-shaped transfer function combined with elitist tournament binarization method is superior over S-shaped transfer function and outperforms other well-regarded evolutionary optimizers based on the obtained average accuracy, fitness, number of features, running time and convergence curves. Hence, we can conclude that the proposed approach can be deployed in IoT intrusion detection systems.

[1]  Hossam Faris,et al.  Asynchronous accelerating multi-leader salp chains for feature selection , 2018, Appl. Soft Comput..

[2]  Patrick Siarry,et al.  A survey on optimization metaheuristics , 2013, Inf. Sci..

[3]  Ferat Sahin,et al.  A survey on feature selection methods , 2014, Comput. Electr. Eng..

[4]  Jon Atli Benediktsson,et al.  Feature Selection Based on Hybridization of Genetic Algorithm and Particle Swarm Optimization , 2015, IEEE Geoscience and Remote Sensing Letters.

[5]  Muhammad Kamran Siddiqui,et al.  Study of biological networks using graph theory , 2017, Saudi journal of biological sciences.

[6]  Hesham F. A. Hamed,et al.  Intrusion detection systems for IoT-based smart environments: a survey , 2018, Journal of Cloud Computing.

[7]  Hossam Faris,et al.  A Modified Multi-objective Particle Swarm Optimizer-Based Lévy Flight: An Approach Toward Intrusion Detection in Internet of Things , 2020, Arabian Journal for Science and Engineering.

[8]  Seyed Mohammad Mirjalili,et al.  Whale optimization approaches for wrapper feature selection , 2018, Appl. Soft Comput..

[9]  Hossam M. Zawbaa,et al.  Feature selection based on antlion optimization algorithm , 2015, 2015 Third World Conference on Complex Systems (WCCS).

[10]  Abdelmadjid Boukra,et al.  GAB-BBO: Adaptive Biogeography Based Feature Selection Approach for Intrusion Detection , 2017, Int. J. Comput. Intell. Syst..

[11]  Chengye Li,et al.  Gaussian mutational chaotic fruit fly-built optimization and feature selection , 2020, Expert Syst. Appl..

[12]  S. Mercy Shalinie,et al.  Design of cognitive fog computing for intrusion detection in Internet of Things , 2018, Journal of Communications and Networks.

[13]  Huiling Chen,et al.  An efficient double adaptive random spare reinforced whale optimization algorithm , 2020, Expert Syst. Appl..

[14]  Jin Song Dong,et al.  Binary Harris Hawks Optimizer for High-Dimensional, Low Sample Size Feature Selection , 2019, Algorithms for Intelligent Systems.

[15]  K. Muneeswaran,et al.  Firefly algorithm based feature selection for network intrusion detection , 2019, Comput. Secur..

[16]  Hao Chen,et al.  Advanced orthogonal learning-driven multi-swarm sine cosine optimization: Framework and case studies , 2020, Expert Syst. Appl..

[17]  Russell C. Eberhart,et al.  A discrete binary version of the particle swarm algorithm , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[18]  Adeel Akram,et al.  Using Genetic Algorithm to Minimize False Alarms in Insider Threats Detection of Information Misuse in Windows Environment , 2014 .

[19]  Hossein Gharaee,et al.  A new feature selection IDS based on genetic algorithm and SVM , 2016, 2016 8th International Symposium on Telecommunications (IST).

[20]  Hossam Faris,et al.  Efficient Hybrid Nature-Inspired Binary Optimizers for Feature Selection , 2019, Cognitive Computation.

[21]  El-Ghazali Talbi,et al.  Metaheuristics - From Design to Implementation , 2009 .

[22]  Xiangyang Wang,et al.  Feature selection based on rough sets and particle swarm optimization , 2007, Pattern Recognit. Lett..

[23]  Robert C. Atkinson,et al.  Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).

[24]  Hossein Nezamabadi-pour,et al.  GSA: A Gravitational Search Algorithm , 2009, Inf. Sci..

[25]  Shuai Han,et al.  A Novel Hybrid Prediction Model for Hourly Gas Consumption in Supply Side Based on Improved Whale Optimization Algorithm and Relevance Vector Machine , 2019, IEEE Access.

[26]  Ali Dehghantanha,et al.  Internet of Things security and forensics: Challenges and opportunities , 2018, Future Gener. Comput. Syst..

[27]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[28]  Hossam Faris,et al.  Time-varying hierarchical chains of salps with random weight networks for feature selection , 2020, Expert Syst. Appl..

[29]  Kalyanmoy Deb,et al.  Messy Genetic Algorithms: Motivation, Analysis, and First Results , 1989, Complex Syst..

[30]  D. Jiang,et al.  Physical simulation of construction and control of two butted-well horizontal cavern energy storage using large molded rock salt specimens , 2019, Energy.

[31]  Yuval Elovici,et al.  N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders , 2018, IEEE Pervasive Computing.

[32]  Hossein Moayedi,et al.  Teaching–learning-based metaheuristic scheme for modifying neural computing in appraising energy performance of building , 2020, Engineering with Computers.

[33]  Hossam Faris,et al.  Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection , 2019, Journal of Ambient Intelligence and Humanized Computing.

[34]  Hossam Faris,et al.  An efficient binary Salp Swarm Algorithm with crossover scheme for feature selection problems , 2018, Knowl. Based Syst..

[35]  J. Ross Quinlan,et al.  Induction of Decision Trees , 1986, Machine Learning.

[36]  Alyani Ismail,et al.  A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization , 2018, IEEE Access.

[37]  Zhifeng Zhao,et al.  AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks , 2018, IEEE Internet of Things Journal.

[38]  Ashutosh Tiwari,et al.  The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence , 2016, 2016 IEEE Congress on Evolutionary Computation (CEC).

[39]  Qiao Weibiao Differential Scanning Calorimetry and Electrochemical Tests for the Analysis of Delamination of 3PE Coatings , 2019, International Journal of Electrochemical Science.

[40]  Manas Ranjan Patra,et al.  A Layered Approach to Network Intrusion Detection Using Rule Learning Classifiers with Nature-Inspired Feature Selection , 2018 .

[41]  Zong Woo Geem,et al.  A New Heuristic Optimization Algorithm: Harmony Search , 2001, Simul..

[42]  José García,et al.  Putting Continuous Metaheuristics to Work in Binary Search Spaces , 2017, Complex..

[43]  J. Daemen,et al.  Discontinuous fatigue of salt rock with low-stress intervals , 2019, International Journal of Rock Mechanics and Mining Sciences.

[44]  Mengjie Zhang,et al.  Particle Swarm Optimization for Feature Selection in Classification: A Multi-Objective Approach , 2013, IEEE Transactions on Cybernetics.

[45]  Wei Gao,et al.  Nano properties analysis via fourth multiplicative ABC indicator calculating , 2017, Arabian Journal of Chemistry.

[46]  Hossam Faris,et al.  An evolutionary gravitational search-based feature selection , 2019, Inf. Sci..

[47]  Andrew Lewis,et al.  The Whale Optimization Algorithm , 2016, Adv. Eng. Softw..

[48]  Wei Gao,et al.  Partial multi-dividing ontology learning algorithm , 2018, Inf. Sci..

[49]  Wei Gao,et al.  An independent set degree condition for fractional critical deleted graphs , 2019, Discrete & Continuous Dynamical Systems - S.

[50]  Yining Wang,et al.  The Forecasting of PM2.5 Using a Hybrid Model Based on Wavelet Transform and an Improved Deep Learning Algorithm , 2019, IEEE Access.

[51]  Zhe Yang,et al.  Modified Dolphin Swarm Algorithm Based on Chaotic Maps for Solving High-Dimensional Function Optimization Problems , 2019, IEEE Access.

[52]  John Geraghty,et al.  Genetic Algorithm Performance with Different Selection Strategies in Solving TSP , 2011 .

[53]  Hossam Faris,et al.  Binary dragonfly optimization for feature selection using time-varying transfer functions , 2018, Knowl. Based Syst..

[54]  Ezz El-Din Hemdan,et al.  Cybercrimes Investigation and Intrusion Detection in Internet of Things Based on Data Science Methods , 2018 .

[55]  Hossam Faris,et al.  Evolutionary Population Dynamics and Grasshopper Optimization approaches for feature selection problems , 2017, Knowl. Based Syst..

[56]  James E. Baker,et al.  Adaptive Selection Methods for Genetic Algorithms , 1985, International Conference on Genetic Algorithms.

[57]  John H. Holland,et al.  Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .

[58]  Taufik Abrão,et al.  Network Anomaly Detection System using Genetic Algorithm and Fuzzy Logic , 2018, Expert Syst. Appl..

[59]  Aderemi Oluyinka Adewumi,et al.  Efficient Feature Selection Technique for Network Intrusion Detection System Using Discrete Differential Evolution and Decision , 2017, Int. J. Netw. Secur..

[60]  Nima Jafari Navimipour,et al.  Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm , 2019, ICT Express.

[61]  Hossam Faris,et al.  A multi-verse optimizer approach for feature selection and optimizing SVM parameters based on a robust system architecture , 2017, Neural Computing and Applications.

[62]  Hossein Nezamabadi-pour,et al.  BGSA: binary gravitational search algorithm , 2010, Natural Computing.

[63]  Qian Zhang,et al.  An efficient chaotic mutative moth-flame-inspired optimizer for global optimization tasks , 2019, Expert Syst. Appl..

[64]  Broderick Crawford,et al.  Binarization Methods for Shuffled Frog Leaping Algorithms That Solve Set Covering Problems , 2015, CSOC.

[65]  Bing Xu,et al.  An intrusion detection method for internet of things based on suppressed fuzzy clustering , 2018, EURASIP Journal on Wireless Communications and Networking.

[66]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[67]  Imran A. Zualkernan,et al.  Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[68]  Hossam Faris,et al.  Multi-objective Particle Swarm Optimization for Botnet Detection in Internet of Things , 2019, Algorithms for Intelligent Systems.

[69]  Yu Xue,et al.  An Evolutionary Computation Based Feature Selection Method for Intrusion Detection , 2018, Secur. Commun. Networks.

[70]  Julie Greensmith,et al.  Securing the Internet of Things with Responsive Artificial Immune Systems , 2015, GECCO.

[71]  Pengjun Wang,et al.  Efficient multi-population outpost fruit fly-driven optimizers: Framework and advances in support vector machines , 2020, Expert Syst. Appl..

[72]  Aboul Ella Hassanien,et al.  Binary grey wolf optimization approaches for feature selection , 2016, Neurocomputing.

[73]  Mohamed Elhoseny,et al.  Feature selection based on artificial bee colony and gradient boosting decision tree , 2019, Appl. Soft Comput..

[74]  Hossam Faris,et al.  Bat-inspired algorithms with natural selection mechanisms for global optimization , 2018, Neurocomputing.

[75]  Qian Zhang,et al.  Multi-strategy boosted mutative whale-inspired optimization approaches , 2019, Applied Mathematical Modelling.

[76]  Vipin Kumar,et al.  Introduction to Data Mining , 2022, Data Mining and Machine Learning Applications.

[77]  Duoqian Miao,et al.  A rough set approach to feature selection based on ant colony optimization , 2010, Pattern Recognit. Lett..

[78]  Zhe Yang,et al.  Solving Large-Scale Function Optimization Problem by Using a New Metaheuristic Algorithm Based on Quantum Dolphin Swarm Algorithm , 2019, IEEE Access.

[79]  José M. Molina López,et al.  Applying VorEAl for IoT Intrusion Detection , 2018, HAIS.

[80]  H. Moayedi,et al.  Employing artificial bee colony and particle swarm techniques for optimizing a neural network in prediction of heating and cooling loads of residential buildings , 2020 .

[81]  Andrew Lewis,et al.  S-shaped versus V-shaped transfer functions for binary Particle Swarm Optimization , 2013, Swarm Evol. Comput..

[82]  Franz Pernkopf,et al.  Bayesian network classifiers versus selective k-NN classifier , 2005, Pattern Recognit..

[83]  Hossam Faris,et al.  An enhanced associative learning-based exploratory whale optimizer for global optimization , 2019, Neural Computing and Applications.

[84]  Hongbin Zhang,et al.  Feature selection using tabu search method , 2002, Pattern Recognit..

[85]  Broderick Crawford,et al.  Two swarm intelligence algorithms for the Set Covering Problem , 2014, 2014 9th International Conference on Software Engineering and Applications (ICSOFT-EA).

[86]  Wei Liu,et al.  Research on the Stability and Treatments of Natural Gas Storage Caverns With Different Shapes in Bedded Salt Rocks , 2020, IEEE Access.

[87]  Thomas Bäck,et al.  Selective Pressure in Evolutionary Algorithms: A Characterization of Selection Mechanisms , 1994, International Conference on Evolutionary Computation.

[88]  Broderick Crawford,et al.  Analyzing the effects of binarization techniques when solving the set covering problem through swarm optimization , 2017, Expert Syst. Appl..