| تعداد نشریات | 33 |
| تعداد شمارهها | 805 |
| تعداد مقالات | 7,794 |
| تعداد مشاهده مقاله | 14,158,144 |
| تعداد دریافت فایل اصل مقاله | 9,201,408 |
Optimized Hybrid Fuzzy NFSC Approach for Enhanced Scalable and Efficient Anomaly Detection in Secure IoT- Systems with Low-Latency | ||
| Iranian Journal of Fuzzy Systems | ||
| دوره 22، شماره 5، آذر و دی 2025، صفحه 181-202 اصل مقاله (1.03 M) | ||
| نوع مقاله: Research Paper | ||
| شناسه دیجیتال (DOI): 10.22111/ijfs.2025.51473.9092 | ||
| نویسندگان | ||
| Syed Umar* 1؛ Nilesh T. Gole2؛ Poorna Chandra Reddy Alla3؛ V S Narayana Tinnaluri4 | ||
| 1Rajkot | ||
| 2Department of Computer Science and Engineering, Vidarbha Institute of Technology, Nagpur, India. | ||
| 3Department of Computer Engineering, Marwadi University, Rajkot. Gujarat, India | ||
| 4Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Andhra Pradesh – 522302, India. | ||
| چکیده | ||
| The rapid growth and widespread integration of the Internet of Things (IoT) across various domains have enabled systems to autonomously send, receive, and analyze data. Despite its significant benefits for improving quality of life and service efficiency, IoT still faces considerable challenges related to security and privacy. An anomaly-based Intrusion Detection System (IDS) can provide security for IoT networks against various cyber-attacks. This study proposes an anomaly-based IDS to prevent cyber-attacks in IoT environments. In this research, we propose a novel optimized ensemble deep learning-based approach for anomaly-based IDS classification. The proposed approach includes several innovative aspects: initially, raw data are pre-processed, and essential features are extracted using CoffeeNet. The approach employs the Binary Bamboo Forest Growth Optimization Algorithm (BBFGOA) to reduce data characteristics and enhance anomaly detection effectiveness. We use the Optimized Fuzzy NFSC approach an ensemble of the Sharpened Cosine Similarity-based Neural Network (SCS-Net) and a rule-based Deep Fuzzy System with Nonlinear Fuzzy Feature Transform (NFFS-DFS)—to categorize network flows as benign or malicious across multiple categories. The Partial Reinforcement Optimization Algorithm (PRO) is used to tune the hyperparameters in the Fuzzy NFSC approach. Additionally, we employ a Conditional Tabular Generative Adversarial Network (CTGAN) to address the class imbalance issue. The proposed anomaly detection approach is evaluated and analyzed using four benchmark datasets to validate its effectiveness. The evaluation's results demonstrate that the approach enhances detection performance, with a 99.43% F1-score, 99.61% accuracy, 99.45% precision, and 99.38% recall. The findings also show that employing an oversampling technique improves minority sample identification rates, which raises overall accuracy. The suggested approach works better than current techniques since it takes less time to train and detect. | ||
| کلیدواژهها | ||
| Internet of Things (IoT)؛ anomaly-based IDS؛ CoffeeNet؛ Optimized Fuzzy NFSC؛ Partial Reinforcement Optimization algorithm (PROA)؛ Conditional Tabular Generative Adversarial Network (CTGAN) | ||
| مراجع | ||
|
[1] A. Abusitta, G. H. S. de Carvalho, O. A. Wahab, T. Halabi, B. C. M. Fung, S. Al Mamoori, Deep learning-enabled anomaly detection for IoT systems, Internet of Things, 21 (2023), 100656. https://doi.org/10.1016/j.iot. 2022.100656 [2] R. Alghamdi, M. Bellaiche, A cascaded federated deep learning based framework for detecting wormhole attacks in IoT networks, Computers and Security, 125 (2023), 103014. https://doi.org/10.1016/j.cose.2022.103014 [3] Z. Alwaisi, T. Kumar, E. Harjula, S. Soderi, Securing constrained IoT systems: A lightweight machine learning approach for anomaly detection and prevention, Internet of Things, 28 (2024), 101398. https://doi.org/10. 1016/j.iot.2024.101398 [4] H. Asgharzadeh, A. Ghaffari, M. Masdari, F. S. Gharehchopogh, Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm, Journal of Parallel and Distributed Computing, 175 (2023), 1-21. https://doi.org/10.1016/j.jpdc.2022.12.009 [5] T. Assy, Y. Mostafa, A. Abd El-khaleq, M. Mashaly, Anomaly-based intrusion detection system using onedimensional convolutional neural network, Procedia Computer Science, 220 (2023), 78-85. https://doi.org/10. 1016/j.procs.2023.03.013 [6] S. Bacha, A. Aljuhani, K. B. Abdellafou, O. Taouali, N. Liouane, M. Alazab, Anomaly-based intrusion detection system in IoT using kernel extreme learning machine, Journal of Ambient Intelligence and Humanized Computing, 15(1) (2024), 231-242. https://doi.org/10.1007/s12652-022-03887-w [7] M. P. S. Bhatia, S. R. Sangwan, Soft computing for anomaly detection and prediction to mitigate IoTbased real-time abuse, Personal and Ubiquitous Computing, 28(1) (2024), 123-133. https://doi.org/10.1007/ s00779-021-01567-8 [8] M. Bhavsar, K. Roy, J. Kelly, O. Olusola, Anomaly-based intrusion detection system for IoT application, Discover Internet of things, 3(1) (2023), 5. https://doi.org/10.1007/s43926-023-00034-5 [9] I. D. Borlea, R. E. Precup, F. Dragan, A. B. Borlea, Centroid update approach to K-means clustering, Advances in Electrical and Computer Engineering, 17(4) (2017). https://doi.org/10.4316/AECE.2017.04001 [10] P. Deng, Y. Huang, Edge-featured multi-hop attention graph neural network for intrusion detection system, Computers and Security, 148 (2025), 104132. https://doi.org/10.1016/j.cose.2024.104132
[11] A. Govindaram, Flbc-ids: A federated learning and blockchain-based intrusion detection system for secure iot environments, Multimedia Tools and Applications, 84(17) (2025), 17229-17251. https://doi.org/10.1007/ s11042-024-19777-6 [12] N. Hamdi, Federated learning-based intrusion detection system for internet of things, International Journal of Information Security, 22(6) (2023), 1937-1948. https://doi.org/10.1007/s10207-023-00727-6 [13] M. J. Idrissi, H. Alami, A. El Mahdaouy, A. El Mekki, S. Oualil, Z. Yartaoui, I. Berrada, Fed-anids: Federated learning for anomaly-based network intrusion detection systems, Expert Systems with Applications, 234 (2023), 121000. https://doi.org/10.1016/j.eswa.2023.121000 [14] Z. Li, P. Wang, Z. Wang, D. C. Zhan, Flowgananomaly: Flow-based anomaly network intrusion detection with adversarial learning, Chinese Journal of Electronics, 33(1) (2024), 58-71. https://doi.org/10.23919/cje.2022. 00.173 [15] M. H. L. Louk, B. A. Tama, Dual-IDS: A bagging-based gradient boosting decision tree model for network anomaly intrusion detection system, Expert Systems with Applications, 213 (2023), 119030. https://doi.org/10.1016/j. eswa.2022.119030 [16] L. Narengbam, S. Dey, Harris hawk optimization trained artificial neural network for anomaly based intrusion detection system, Concurrency and Computation: Practice and Experience, 35(23) (2023), e7771. https://doi. org/10.1002/cpe.7771 [17] T. Saba, A. Rehman, T. Sadad, H. Kolivand, S. A. Bahaj, Anomaly-based intrusion detection system for IoT networks through deep learning model, Computers and Electrical Engineering, 99 (2022), 107810. https://doi. org/10.1016/j.compeleceng.2022.107810 [18] L. Sharma, C. Sharma, S. Lal Roy, Anomaly based network intrusion detection for IoT attacks using deep learning technique, Computers and Electrical Engineering, 107 (2023), 108626. https://doi.org/10.1016/j.compeleceng. 2023.108626 [19] M. Soltani, B. Ousat, M. J. Siavoshani, A. H. Jahangir, An adaptable deep learning-based intrusion detection system to zero-day attacks, Journal of Information Security and Applications, 76 (2023), 103516. https://doi.org/10. 1016/j.jisa.2023.103516 [20] M. Vishwakarma, N. Kesswani, A new two-phase intrusion detection system with Na¨ıve Bayes machine learning for data classification and elliptic envelop method for anomaly detection, Decision Analytics Journal, 7 (2023), 100233. https://doi.org/10.1016/j.dajour.2023.100233 [21] J. Xiao, L. Yang, F. Zhong, H. Chen, X. Li, Robust anomaly-based intrusion detection system for in-vehicle network by graph neural network framework, Applied Intelligence, 53(3) (2023), 3183-3206. https://doi.org/10. 1007/s10489-022-03412-8 [22] H. Xu, Z. Sun, Y. Cao, H. Bilal, A data-driven approach for intrusion and anomaly detection using automated machine learning for the internet of things, Soft Computing, 27(19) (2023), 14469-14481. https://doi.org/10. 1007/s00500-023-09037-4 | ||
|
آمار تعداد مشاهده مقاله: 219 تعداد دریافت فایل اصل مقاله: 102 |
||