Cargando…

Enhancing Intrusion Detection Systems for IoT and Cloud Environments Using a Growth Optimizer Algorithm and Conventional Neural Networks

Intrusion detection systems (IDS) play a crucial role in securing networks and identifying malicious activity. This is a critical problem in cyber security. In recent years, metaheuristic optimization algorithms and deep learning techniques have been applied to IDS to improve their accuracy and effi...

Descripción completa

Detalles Bibliográficos
Autores principales: Fatani, Abdulaziz, Dahou, Abdelghani, Abd Elaziz, Mohamed, Al-qaness, Mohammed A. A., Lu, Songfeng, Alfadhli, Saad Ali, Alresheedi, Shayem Saleh
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10181590/
https://www.ncbi.nlm.nih.gov/pubmed/37177634
http://dx.doi.org/10.3390/s23094430
_version_ 1785041610585669632
author Fatani, Abdulaziz
Dahou, Abdelghani
Abd Elaziz, Mohamed
Al-qaness, Mohammed A. A.
Lu, Songfeng
Alfadhli, Saad Ali
Alresheedi, Shayem Saleh
author_facet Fatani, Abdulaziz
Dahou, Abdelghani
Abd Elaziz, Mohamed
Al-qaness, Mohammed A. A.
Lu, Songfeng
Alfadhli, Saad Ali
Alresheedi, Shayem Saleh
author_sort Fatani, Abdulaziz
collection PubMed
description Intrusion detection systems (IDS) play a crucial role in securing networks and identifying malicious activity. This is a critical problem in cyber security. In recent years, metaheuristic optimization algorithms and deep learning techniques have been applied to IDS to improve their accuracy and efficiency. Generally, optimization algorithms can be used to boost the performance of IDS models. Deep learning methods, such as convolutional neural networks, have also been used to improve the ability of IDS to detect and classify intrusions. In this paper, we propose a new IDS model based on the combination of deep learning and optimization methods. First, a feature extraction method based on CNNs is developed. Then, a new feature selection method is used based on a modified version of Growth Optimizer (GO), called MGO. We use the Whale Optimization Algorithm (WOA) to boost the search process of the GO. Extensive evaluation and comparisons have been conducted to assess the quality of the suggested method using public datasets of cloud and Internet of Things (IoT) environments. The applied techniques have shown promising results in identifying previously unknown attacks with high accuracy rates. The MGO performed better than several previous methods in all experimental comparisons.
format Online
Article
Text
id pubmed-10181590
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-101815902023-05-13 Enhancing Intrusion Detection Systems for IoT and Cloud Environments Using a Growth Optimizer Algorithm and Conventional Neural Networks Fatani, Abdulaziz Dahou, Abdelghani Abd Elaziz, Mohamed Al-qaness, Mohammed A. A. Lu, Songfeng Alfadhli, Saad Ali Alresheedi, Shayem Saleh Sensors (Basel) Article Intrusion detection systems (IDS) play a crucial role in securing networks and identifying malicious activity. This is a critical problem in cyber security. In recent years, metaheuristic optimization algorithms and deep learning techniques have been applied to IDS to improve their accuracy and efficiency. Generally, optimization algorithms can be used to boost the performance of IDS models. Deep learning methods, such as convolutional neural networks, have also been used to improve the ability of IDS to detect and classify intrusions. In this paper, we propose a new IDS model based on the combination of deep learning and optimization methods. First, a feature extraction method based on CNNs is developed. Then, a new feature selection method is used based on a modified version of Growth Optimizer (GO), called MGO. We use the Whale Optimization Algorithm (WOA) to boost the search process of the GO. Extensive evaluation and comparisons have been conducted to assess the quality of the suggested method using public datasets of cloud and Internet of Things (IoT) environments. The applied techniques have shown promising results in identifying previously unknown attacks with high accuracy rates. The MGO performed better than several previous methods in all experimental comparisons. MDPI 2023-04-30 /pmc/articles/PMC10181590/ /pubmed/37177634 http://dx.doi.org/10.3390/s23094430 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Fatani, Abdulaziz
Dahou, Abdelghani
Abd Elaziz, Mohamed
Al-qaness, Mohammed A. A.
Lu, Songfeng
Alfadhli, Saad Ali
Alresheedi, Shayem Saleh
Enhancing Intrusion Detection Systems for IoT and Cloud Environments Using a Growth Optimizer Algorithm and Conventional Neural Networks
title Enhancing Intrusion Detection Systems for IoT and Cloud Environments Using a Growth Optimizer Algorithm and Conventional Neural Networks
title_full Enhancing Intrusion Detection Systems for IoT and Cloud Environments Using a Growth Optimizer Algorithm and Conventional Neural Networks
title_fullStr Enhancing Intrusion Detection Systems for IoT and Cloud Environments Using a Growth Optimizer Algorithm and Conventional Neural Networks
title_full_unstemmed Enhancing Intrusion Detection Systems for IoT and Cloud Environments Using a Growth Optimizer Algorithm and Conventional Neural Networks
title_short Enhancing Intrusion Detection Systems for IoT and Cloud Environments Using a Growth Optimizer Algorithm and Conventional Neural Networks
title_sort enhancing intrusion detection systems for iot and cloud environments using a growth optimizer algorithm and conventional neural networks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10181590/
https://www.ncbi.nlm.nih.gov/pubmed/37177634
http://dx.doi.org/10.3390/s23094430
work_keys_str_mv AT fataniabdulaziz enhancingintrusiondetectionsystemsforiotandcloudenvironmentsusingagrowthoptimizeralgorithmandconventionalneuralnetworks
AT dahouabdelghani enhancingintrusiondetectionsystemsforiotandcloudenvironmentsusingagrowthoptimizeralgorithmandconventionalneuralnetworks
AT abdelazizmohamed enhancingintrusiondetectionsystemsforiotandcloudenvironmentsusingagrowthoptimizeralgorithmandconventionalneuralnetworks
AT alqanessmohammedaa enhancingintrusiondetectionsystemsforiotandcloudenvironmentsusingagrowthoptimizeralgorithmandconventionalneuralnetworks
AT lusongfeng enhancingintrusiondetectionsystemsforiotandcloudenvironmentsusingagrowthoptimizeralgorithmandconventionalneuralnetworks
AT alfadhlisaadali enhancingintrusiondetectionsystemsforiotandcloudenvironmentsusingagrowthoptimizeralgorithmandconventionalneuralnetworks
AT alresheedishayemsaleh enhancingintrusiondetectionsystemsforiotandcloudenvironmentsusingagrowthoptimizeralgorithmandconventionalneuralnetworks