OPTIMIZED ALTERNATING GRAPH-REGULARIZED NEURAL NETWORK FOR CYBER SECURITY THREATS DETECTION IN INTERNET OF THINGS

Authors

  • Vinay Dutt Jangampet Staff App-Ops Engineer, Intuit, United States. Author
  • Srinivas Reddy Pulyala Cybersecurity Architect, Smile Direct Club, United States. Author
  • Avinash Gupta Desetty Senior Splunk Engineer, Sony Corporation of America, United States. Author

Keywords:

Alternating Graph-regularized Neural Network, Edge-Aware Smoothing Sharpening Filtering, General Synchroextracting Chirplet Transformand Sea Horse Optimization Algorithm

Abstract

The Internet of Things, connects programmes, devices, data storage, and services that, since they are always offering services to the business, may create new opportunities for cyber-attacks. At the moment, there is a considerable risk of malware assaults and software piracy jeopardising IoT security. These dangers have potential to steal crucial information that harms company's finances, reputation. In this manuscript, Optimized Alternating Graph-regularized Neural Network for Cyber Security Threats Detection in IoT (AGRNN-CS-TD-IoT) is proposed. At first the input data gathered from Google Code Jam Dataset (GCJ). The collected input data is pre-processed using Edge-Aware Smoothing Sharpening Filtering (EASSF); then the processed data is feature extracted using General Synchroextracting Chirplet Transform (GSCT). Extracted features fed to Alternating Graph-Regularized Neural Network (AGRNN) for effectively classifying the Cyber security threats as Benign and Malicious. In general, Alternating Graph-Regularized Neural Network does not express adapting optimization strategies determine optimal parameters to ensure accurate cyber security threats. Hence, Sea Horse Optimization Algorithm (SHOA) utilized to optimize parameters of AGRNN to classify the cyber security threats more accurately. Then the proposed AGRNN-CS-TD-IoT is implemented in Python and performance metrics likes FI-measure, accuracy, error rate, precision, sensitivity, ROC and computational time are analysed. Performance of the AGRNN-CS-TD-IoT approach attains 22.52%, 29.40% and 21.02% higher Accuracy when analysed through existing techniques like Cyber Security Threats Detection in Internet of Things Utilizing Deep Learning Approach(CSD-IoT-DLA), Securing Critical Infrastructures: Deep-Learning-Based Threat Detection in IIoT (SCI-DLTD-IoT) and Edge-IIoT set: New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning(CSD-IoT-FL) methods respectively.

 

References

Ghimire, B. and Rawat, D.B., 2022. Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for internet of things. IEEE Internet of Things Journal, 9(11), pp.8229-8249.

Saheed, Y.K., Abiodun, A.I., Misra, S., Holone, M.K. and Colomo-Palacios, R., 2022. A machine learning-based intrusion detection for detecting internet of things network attacks. Alexandria Engineering Journal, 61(12), pp.9395-9409.

Ge, M., Syed, N.F., Fu, X., Baig, Z. and Robles-Kelly, A., 2021. Towards a deep learning-driven intrusion detection approach for Internet of Things. Computer Networks, 186, p.107784.

Kumar, P., Gupta, G.P. and Tripathi, R., 2021. Toward design of an intelligent cyber attack detection system using hybrid feature reduced approach for iot networks. Arabian Journal for Science and Engineering, 46, pp.3749-3778.

Popoola, S.I., Ande, R., Adebisi, B., Gui, G., Hammoudeh, M. and Jogunola, O., 2021. Federated deep learning for zero-day botnet attack detection in IoT-edge devices. IEEE Internet of Things Journal, 9(5), pp.3930-3944.

Kanna, P.R. and Santhi, P., 2021. Unified deep learning approach for efficient intrusion detection system using integrated spatial–temporal features. Knowledge-Based Systems, 226, p.107132.

Yungaicela-Naula, N.M., Vargas-Rosales, C. and Perez-Diaz, J.A., 2021. SDN-based architecture for transport and application layer DDoS attack detection by using machine and deep learning. IEEE Access, 9, pp.108495-108512.

Yungaicela-Naula, N.M., Vargas-Rosales, C. and Perez-Diaz, J.A., 2021. SDN-based architecture for transport and application layer DDoS attack detection by using machine and deep learning. IEEE Access, 9, pp.108495-108512.

Novaes, M.P., Carvalho, L.F., Lloret, J. and ProençaJr, M.L., 2021. Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments. Future Generation Computer Systems, 125, pp.156-167.

Kuzlu, M., Fair, C. and Guler, O., 2021. Role of artificial intelligence in the Internet of Things (IoT) cybersecurity. Discover Internet of things, 1, pp.1-14.

Fatani, A., AbdElaziz, M., Dahou, A., Al-Qaness, M.A. and Lu, S., 2021. IoT intrusion detection system using deep learning and enhanced transient search optimization. IEEE Access, 9, pp.123448-123464.

Alkahtani, H. and Aldhyani, T.H., 2021. Intrusion detection system to advance internet of things infrastructure-based deep learning algorithms. Complexity, 2021, pp.1-18.

Sahu, A.K., Sharma, S., Tanveer, M. and Raja, R., 2021. Internet of Things attack detection using hybrid Deep Learning Model. Computer Communications, 176, pp.146-154.

Kumar, P., Gupta, G.P. and Tripathi, R., 2021. An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks. Computer Communications, 166, pp.110-124.

Thakur, S., Chakraborty, A., De, R., Kumar, N. and Sarkar, R., 2021. Intrusion detection in cyber-physical systems using a generic and domain specific deep autoencoder model. Computers & Electrical Engineering, 91, p.107044.

Ullah, F., Naeem, H., Jabbar, S., Khalid, S., Latif, M.A., Al-Turjman, F. and Mostarda, L., 2019. Cyber security threats detection in internet of things using deep learning approach. IEEE access, 7, pp.124379-124389.

Yu, K., Tan, L., Mumtaz, S., Al-Rubaye, S., Al-Dulaimi, A., Bashir, A.K. and Khan, F.A., 2021. Securing critical infrastructures: deep-learning-based threat detection in IIoT. IEEE Communications Magazine, 59(10), pp.76-82.

Ferrag, M.A., Friha, O., Hamouda, D., Maglaras, L. and Janicke, H., 2022. Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access, 10, pp.40281-40306.

Saheed, Y.K. and Arowolo, M.O., 2021. Efficient cyber attack detection on the internet of medical things-smart environment based on deep recurrent neural network and machine learning algorithms. IEEE Access, 9, pp.161546-161554.

Anthi, E., Williams, L., Rhode, M., Burnap, P. and Wedgbury, A., 2021. Adversarial attacks on machine learning cybersecurity defences in industrial control systems. Journal of Information Security and Applications, 58, p.102717.

Elsisi, M., Tran, M.Q., Mahmoud, K., Mansour, D.E.A., Lehtonen, M. and Darwish, M.M., 2021. Towards secured online monitoring for digitalized GIS against cyber-attacks based on IoT and machine learning. Ieee Access, 9, pp.78415-78427.

Prabhakar, P., Arora, S., Khosla, A., Beniwal, R.K., Arthur, M.N., Arias-Gonzáles, J.L. and Areche, F.O., 2022. Cyber Security of Smart Metering Infrastructure Using Median Absolute Deviation Methodology. Security and Communication Networks, 2022.

https://www.kaggle.com/datasets/jur1cek/gcj-dataset

Deng, G., Galetto, F., Al–nasrawi, M. and Waheed, W., 2021. A guided edge-aware smoothing-sharpening filter based on patch interpolation model and generalized gamma distribution. IEEE Open Journal of Signal Processing, 2, pp.119-135.

Meng, Z., Lv, M., Liu, Z. and Fan, F., 2021. General synchroextracting chirplet transform: Application to the rotor rub-impact fault diagnosis. Measurement, 169, p.108523.

Chen, Z., Wu, Z., Lin, Z., Wang, S., Plant, C. and Guo, W., 2023. AGNN: Alternating Graph-Regularized Neural Networks to Alleviate Over-Smoothing. IEEE Transactions on Neural Networks and Learning Systems.

Özbay, F.A., 2023. A modified seahorse optimization algorithm based on chaotic maps for solving global optimization and engineering problems. Engineering Science and Technology, an International Journal, 41, p.101408.

Jangampet, Vinay Dutt, Avinash Gupta Desetty, and Srinivas Reddy Pulyala. “A Comprehensive Analysis of Cybersecurity Threats in Small and Large Enterprises: Mitigation Strategies and Best Practices.” https://www.ijarst.in, November 2023. https://www.ijarst.in/public/uploads/paper/244441701311914.pdf.

Desetty, Avinash Gupta, Srinivas Reddy Pulyala, and Vinay Dutt Jangampet. “Protecting Critical Infrastructure from Cyber Attacks: A Multifaceted Approach.” https://www.ijarst.in, August 2023. https://www.ijarst.in/public/uploads/paper/622751701751637.pdf.

Jangampet, Vinay Dutt, Srinivas Reddy Pulyala, and Avinash Gupta Desetty. “The Privacy Paradox: Balancing Cybersecurity Measures with Individual Liberties in the Digital Era.” https://ijarst.in, July 2020. https://ijarst.in/public/uploads/paper/400951701751987.pdf

Downloads

Published

2023-12-20

How to Cite

OPTIMIZED ALTERNATING GRAPH-REGULARIZED NEURAL NETWORK FOR CYBER SECURITY THREATS DETECTION IN INTERNET OF THINGS. (2023). INTERNATIONAL JOURNAL OF INFORMATION SECURITY (IJIS), 2(1), 1-12. https://lib-index.com/index.php/IJIS/article/view/IJIS_02_01_001