Cargando…

Addressing Internet of Things security by enhanced sine cosine metaheuristics tuned hybrid machine learning model and results interpretation based on SHAP approach

An ever increasing number of electronic devices integrated into the Internet of Things (IoT) generates vast amounts of data, which gets transported via network and stored for further analysis. However, besides the undisputed advantages of this technology, it also brings risks of unauthorized access...

Descripción completa

Detalles Bibliográficos
Autores principales: Dobrojevic, Milos, Zivkovic, Miodrag, Chhabra, Amit, Sani, Nor Samsiah, Bacanin, Nebojsa, Mohd Amin, Maifuza
Formato: Online Artículo Texto
Lenguaje:English
Publicado: PeerJ Inc. 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10319270/
https://www.ncbi.nlm.nih.gov/pubmed/37409075
http://dx.doi.org/10.7717/peerj-cs.1405
_version_ 1785068212690354176
author Dobrojevic, Milos
Zivkovic, Miodrag
Chhabra, Amit
Sani, Nor Samsiah
Bacanin, Nebojsa
Mohd Amin, Maifuza
author_facet Dobrojevic, Milos
Zivkovic, Miodrag
Chhabra, Amit
Sani, Nor Samsiah
Bacanin, Nebojsa
Mohd Amin, Maifuza
author_sort Dobrojevic, Milos
collection PubMed
description An ever increasing number of electronic devices integrated into the Internet of Things (IoT) generates vast amounts of data, which gets transported via network and stored for further analysis. However, besides the undisputed advantages of this technology, it also brings risks of unauthorized access and data compromise, situations where machine learning (ML) and artificial intelligence (AI) can help with detection of potential threats, intrusions and automation of the diagnostic process. The effectiveness of the applied algorithms largely depends on the previously performed optimization, i.e., predetermined values of hyperparameters and training conducted to achieve the desired result. Therefore, to address very important issue of IoT security, this article proposes an AI framework based on the simple convolutional neural network (CNN) and extreme machine learning machine (ELM) tuned by modified sine cosine algorithm (SCA). Not withstanding that many methods for addressing security issues have been developed, there is always a possibility for further improvements and proposed research tried to fill in this gap. The introduced framework was evaluated on two ToN IoT intrusion detection datasets, that consist of the network traffic data generated in Windows 7 and Windows 10 environments. The analysis of the results suggests that the proposed model achieved superior level of classification performance for the observed datasets. Additionally, besides conducting rigid statistical tests, best derived model is interpreted by SHapley Additive exPlanations (SHAP) analysis and results findings can be used by security experts to further enhance security of IoT systems.
format Online
Article
Text
id pubmed-10319270
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher PeerJ Inc.
record_format MEDLINE/PubMed
spelling pubmed-103192702023-07-05 Addressing Internet of Things security by enhanced sine cosine metaheuristics tuned hybrid machine learning model and results interpretation based on SHAP approach Dobrojevic, Milos Zivkovic, Miodrag Chhabra, Amit Sani, Nor Samsiah Bacanin, Nebojsa Mohd Amin, Maifuza PeerJ Comput Sci Adaptive and Self-Organizing Systems An ever increasing number of electronic devices integrated into the Internet of Things (IoT) generates vast amounts of data, which gets transported via network and stored for further analysis. However, besides the undisputed advantages of this technology, it also brings risks of unauthorized access and data compromise, situations where machine learning (ML) and artificial intelligence (AI) can help with detection of potential threats, intrusions and automation of the diagnostic process. The effectiveness of the applied algorithms largely depends on the previously performed optimization, i.e., predetermined values of hyperparameters and training conducted to achieve the desired result. Therefore, to address very important issue of IoT security, this article proposes an AI framework based on the simple convolutional neural network (CNN) and extreme machine learning machine (ELM) tuned by modified sine cosine algorithm (SCA). Not withstanding that many methods for addressing security issues have been developed, there is always a possibility for further improvements and proposed research tried to fill in this gap. The introduced framework was evaluated on two ToN IoT intrusion detection datasets, that consist of the network traffic data generated in Windows 7 and Windows 10 environments. The analysis of the results suggests that the proposed model achieved superior level of classification performance for the observed datasets. Additionally, besides conducting rigid statistical tests, best derived model is interpreted by SHapley Additive exPlanations (SHAP) analysis and results findings can be used by security experts to further enhance security of IoT systems. PeerJ Inc. 2023-06-30 /pmc/articles/PMC10319270/ /pubmed/37409075 http://dx.doi.org/10.7717/peerj-cs.1405 Text en © 2023 Dobrojevic et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
spellingShingle Adaptive and Self-Organizing Systems
Dobrojevic, Milos
Zivkovic, Miodrag
Chhabra, Amit
Sani, Nor Samsiah
Bacanin, Nebojsa
Mohd Amin, Maifuza
Addressing Internet of Things security by enhanced sine cosine metaheuristics tuned hybrid machine learning model and results interpretation based on SHAP approach
title Addressing Internet of Things security by enhanced sine cosine metaheuristics tuned hybrid machine learning model and results interpretation based on SHAP approach
title_full Addressing Internet of Things security by enhanced sine cosine metaheuristics tuned hybrid machine learning model and results interpretation based on SHAP approach
title_fullStr Addressing Internet of Things security by enhanced sine cosine metaheuristics tuned hybrid machine learning model and results interpretation based on SHAP approach
title_full_unstemmed Addressing Internet of Things security by enhanced sine cosine metaheuristics tuned hybrid machine learning model and results interpretation based on SHAP approach
title_short Addressing Internet of Things security by enhanced sine cosine metaheuristics tuned hybrid machine learning model and results interpretation based on SHAP approach
title_sort addressing internet of things security by enhanced sine cosine metaheuristics tuned hybrid machine learning model and results interpretation based on shap approach
topic Adaptive and Self-Organizing Systems
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10319270/
https://www.ncbi.nlm.nih.gov/pubmed/37409075
http://dx.doi.org/10.7717/peerj-cs.1405
work_keys_str_mv AT dobrojevicmilos addressinginternetofthingssecuritybyenhancedsinecosinemetaheuristicstunedhybridmachinelearningmodelandresultsinterpretationbasedonshapapproach
AT zivkovicmiodrag addressinginternetofthingssecuritybyenhancedsinecosinemetaheuristicstunedhybridmachinelearningmodelandresultsinterpretationbasedonshapapproach
AT chhabraamit addressinginternetofthingssecuritybyenhancedsinecosinemetaheuristicstunedhybridmachinelearningmodelandresultsinterpretationbasedonshapapproach
AT saninorsamsiah addressinginternetofthingssecuritybyenhancedsinecosinemetaheuristicstunedhybridmachinelearningmodelandresultsinterpretationbasedonshapapproach
AT bacaninnebojsa addressinginternetofthingssecuritybyenhancedsinecosinemetaheuristicstunedhybridmachinelearningmodelandresultsinterpretationbasedonshapapproach
AT mohdaminmaifuza addressinginternetofthingssecuritybyenhancedsinecosinemetaheuristicstunedhybridmachinelearningmodelandresultsinterpretationbasedonshapapproach