Multi-Objective Optimization Algorithms For Intrusion Detection in IoT Networks A Systematic Review
Multi-Objective Optimization Algorithms For Intrusion Detection in IoT Networks A Systematic Review
A R T I C L E I N F O A B S T R A C T
Keywords: The significance of intrusion detection systems in networks has grown because of the digital revolution and
Multi-objective increased operations. The intrusion detection method classifies the network traffic as threat or normal based on
Intrusion detection the data features. The Intrusion detection system faces a trade-off between various parameters such as detection
IoT
accuracy, relevance, redundancy, false alarm rate, and other objectives. The paper presents a systematic review of
Optimization
intrusion detection in Internet of Things (IoT) networks using multi-objective optimization algorithms (MOA), to
identify attempts at exploiting security vulnerabilities and reducing the chances of security attacks. MOAs provide
a set of optimized solutions for the intrusion detection process in highly complex IoT networks. This paper
presents the identification of multiple objectives of intrusion detection, comparative analysis of multi-objective
algorithms for intrusion detection in IoT based on their approaches, and the datasets used for their evaluation.
The multi-objective optimization algorithms show the encouraging potential in IoT networks to enhance multiple
conflicting objectives for intrusion detection. Additionally, the current challenges and future research ideas are
identified. In addition to demonstrating new advancements in intrusion detection techniques, this study attempts
to identify research gaps that can be addressed while designing intrusion detection systems for IoT networks.
* Corresponding author.
E-mail address: [email protected] (S. Sharma).
https://doi.org/10.1016/j.iotcps.2024.01.003
Received 29 June 2023; Received in revised form 29 January 2024; Accepted 29 January 2024
Available online 10 February 2024
2667-3452/© 2024 The Authors. Published by Elsevier B.V. on behalf of KeAi Communications Co., Ltd. This is an open access article under the CC BY license (http://
creativecommons.org/licenses/by/4.0/).
S. Sharma et al. Internet of Things and Cyber-Physical Systems 4 (2024) 258–267
time. Such techniques cannot identify unknown threats [7]. classification accuracy will decrease. Hence, the problem of Intrusion
Anomaly-based intrusion detection techniques use a base database and detection is combinatorial and multi-objective in IoT networks and calls
check continuously for abnormal behavior of network activities to mark for the use of multi-objective optimization algorithms (MOA) that pro-
them as attacks using techniques like clustering, classification, etc. [8]. vide the best-optimized solutions in an automatic and timely manner.
The increasing data, malicious behavior, and security attacks are a The MOAs are used for the optimization of features of network flow and
challenge for existing intrusion detection strategies as they require packet information that lowers the false alarm rate, and increases clas-
pre-processing a large number of attributes. sification accuracy, along with decreasing response time and computa-
Intrusion detection techniques based on artificial intelligence have tional complexity.Besides intrusion detection, MOAs have been used for
emerged as a promising solution to address these challenges, offering feature selection in other applications such as engineering design opti-
significant advantages over traditional methods in terms of adaptability mization [74], biomedical data classification [75], image classification
to new threats and dynamic networks, pattern recognition to identify [76], data clustering and prediction [77], community detection in social
attack patterns in large amounts of data and real-time detection and media [78], image segmentation [79], etc.
response capabilities [9]. Intrusion Detection in IoT Networks involves
the analysis of large complex datasets, but, the irrelevant or duplicate 2.1. General methodology for multi-objective intrusion detection
features can consume more resources like time and storage [4].
The primary fundamental design objectives of an intrusion detection Intrusion detection using multi-objective optimization methods is
approach are the reduction of false positive alarm occurrences and an shown in Fig. 1. The various steps involved in this method include data
improvement in detection accuracy. Both these goals have a trade-off capturing, data pre-processing, data interpretation, model training,
relationship therefore intrusion detection is considered a multi- validating, and testing [63]. The data is captured either from datasets
objective problem [10]. Therefore, that concept must be taken into ac- [47–61] or real network flow data.
count during the design and implementation of any intrusion detection When known data is collected, it is assessed using missing data
approach. Feature selection solves this problem of large dimensions of handling [38], class balancing, normalization [39], scaling, encoding
network datasets by selecting the relevant features that best describe the [64], or transformation techniques [62]. Missing data can be imputed
dataset of a network and can support the classification process. In this using techniques like interpolation, Minkowski distance [65], and
study, features are the attributes or characteristics of network data that dropout [66]. AI-based algorithms usually perform better when the fea-
are utilized to identify intrusions [11]. Some of the features of data are tures are scaled to a similar range. Scaling techniques such as mean
arrival time of frame, Source or destination IP address, source/destina- centering, variance scaling, and specified range scaling [67] are used to
tion port, HTTP request/response, query, acknowledge flags, transaction scale features with a comparable distribution and range. This step pre-
identifier, etc. [12]. Multi-objective optimization (MO) based intrusion vents some features from controlling the learning process based only on
detection has become the dominant system in the intrusion detection their magnitudes [68]. Transformation techniques can be categorized as
research field in recent years [13]. Intrusion detection based on MO one-hot encoding (binary) [6] and label encoding (categories with
techniques is reliable and effective at spotting network threats. Such integer labels) [44]. Categorical variables are changed into numerical
techniques not only detect a threat but also help to identify various attack forms before being processed by algorithms. Feature selection or
classes or categories [14,73]. An MO technique is used to choose the most extraction of data happens after data assessment. Feature Selection and
relevant features subset from the input data, which improves the overall extraction [69] makes use of optimization algorithms to remove
performance of intrusion detection by reducing computational non-important features [70]. It is essential to complete uniform pro-
complexity, false alarms, and detection time, and increasing accuracy cessing of the data before beginning data extraction, especially when
and detection rates [15]. using more recent datasets or actual traffic data. The feature selection
procedure can be outlined as follows: generate an initial optimal feature
1.1. Contribution subset; compare the generated feature subset against initial subsets;
select the best feature subset; define a termination criterion; and validate
1. Multiple intrusion detection objectives for IoT networks are findings [10]. While some approaches perform feature selection as a
identified. distinct step to improve the ability to describe data, others incorporate
2. Meta-analysis of various multi-objective optimization algorithms and feature selection in the classification model-building and representation
their implementation strategies for intrusion detection in IoT net- process [20].
works is carried out. The data will then be divided for testing and training. When super-
3. Several datasets utilized in intrusion detection for IoT networks are vised learning methods are used, data labeling is done by selecting the
examined. suitable label types. At the first level, labels can be an attack and normal.
4. Various challenges and future directions are identified. Attack categories such as Probe, Denial of service (DoS), and Distributed
DoS can be labeled at the second level of data labels. In the third level,
This study reviews the multi-objective algorithms for intrusion labels can be in the form of subcategories of the attacks like DoSHTTP,
detection in IoT networks. Section 2 presents the multi-objective opti- DoSTCP, DoSUDP, etc. This labeled data is then used further [71]. The
mization for intrusion detection including the general steps utilized for classification model construction step is fundamental for both general use
intrusion detection followed by the multiple objectives used. The rele- cases and basic methods. The classification model is first trained with a
vant work on applying multi-objective optimization algorithms for training set. Training the classification model is to find optimal param-
intrusion detection is covered in Section 3. Section 4 presents the datasets eters to maximize the performance. This process of multi-objective
used in the detection of intrusion in IoT networks. Section 5 includes the optimization is repeated to fine-tune the classification process. This
discussions and analysis. Section 6 presents future research directions classification is then tested using the testing data. The classifier gives a
followed by concluding remarks. classification report as an output to classify normal traffic and attack
instances [72]. In case the model is trained for multiclass classification
2. Multi-objective optimization for intrusion detection then the output is in the form of attack classes. The model is assessed for
performance using performance metrics such as accuracy, error rate,
In IoT networks, the performance of intrusion detection based on response time, etc.
accuracy, relevance, and redundancy could not always give better results
because there may be a case where a false alarm and detection rate are
low, yet accuracy is high. Also, when the number of features is decreased,
259
S. Sharma et al. Internet of Things and Cyber-Physical Systems 4 (2024) 258–267
260
S. Sharma et al. Internet of Things and Cyber-Physical Systems 4 (2024) 258–267
261
S. Sharma et al. Internet of Things and Cyber-Physical Systems 4 (2024) 258–267
selected features, and computational time. The algorithm got 95.59% In [23], the multi-objective immune algorithm was used for feature
accuracy, 91.42% sensitivity, 97.38% specificity, 14.75 features, and selection. This algorithm was based on the elite selection, reference
10205.83 s of computational time for the NSL-KDD dataset. For vectors, and GHSOM-pr classifier. It can identify many attack types in
CICIDS-2017, the algorithm obtained 98.79 % accuracy, 97.26% sensi- NSL-KDD (U2R, DoS, Probe, R2L) and UNSW-NB15 (DoS, Backdoor,
tivity, 99.67% specificity, 10 features, and 2270.9 s of computational Exploits, Analysis, Fuzzers, Generic, Worms, Shellcode, Reconnaissance)
time.For the UNSW-NB15 dataset, the GTO-BSA algorithm achieved datasets. The objectives considered were convergence speed, classifica-
71.01% accuracy, 81.53% sensitivity, 87.70% specificity, 16.6 features, tion accuracy, and different types of attack. The algorithm obtained
and 161.23 s of computational time. The algorithm using the BoT-IoT 94.60 % accuracy, 95.11% precision, and 97.05% recall with 24 features
dataset got 94.85% accuracy, 99.28% sensitivity, 96.22% specificity, for NSL-KDD. In UNSW-NB15, the algorithm for 10 class classification got
2.5 features, and 145.74s of computational time. 10.63% false alarm rate, 95% accuracy, 95% precision, and 98% detec-
In [14], the multi-objective Harris hawks optimization with mutation tion rate.
mechanism has been used to detect intrusions (botnets) in IoT combined Kasongo and Sun [24] explored the XGBoost algorithm for feature
with the K-Nearest Neighbor (KNN), Multi-layer Perceptron (MLP), De- selection in intrusion detection. It utilized the UNSW-NB15 dataset.
cision Tree (DT), and Support Vector Machine (SVM) classifiers. The Artificial Neural Networks (ANN), KNN, DT, Logistic Regression (LR),
performance of the method was evaluated using datasets from UCI. and SVM classifiers were employed in this study. It demonstrated that
Glow-worm swarm optimization algorithm with principal component this method works well for majority classes but fails for minority classes.
analysis algorithm was used in Ref. [17], for intrusion detection. The Therefore, there is a need to increase the minority class occurrences in
proposed algorithm had a multi-class average detection rate of 95.12%, the training phase.
false alarm rate of 2.97%, accuracy of 93.90%, and precision of 91.90%. In [25], a hybrid machine learning approach using Naive Bayes and
In [18], the NSGA-II algorithm was used for optimizing mutual in- SVM was discussed. The NSL-KDD dataset was used and grouped into two
formation, standard deviation, and information gain to select over 19-30 categories, one contains all classes and the other group only contains
relevant features. KDD ‘99, Kyoto 2006þ, and NSL-KDD datasets are used R2L, U2R, and normal classes. Feature selection was applied on both
with SVM, DT, and KNN classifiers. This technique used an unsupervised layers using inter-sectional correlated feature selection and principal
approach and unlabelled information. For the KDD dataset, the algorithm component analysis. Layer1 checks for attacks, and if the attack is not
obtained a weighted average accuracy of 99.78%, a detection rate of detected, then data passes through layer2. The algorithm got 88.97%
99.27, a precision of 99.29, and 0.2 false alarm rate. For NSL-KDD, the accuracy, 88.17% precision, 93.11% detection rate, and 11.82% false
results were 99.83 accuracy, 99.16 detection rate, 98.73 precision, and alarm rate. for NSL- KDD dataset1. For the second dataset i.e. 20% of the
0.18 false alarm rate. Also, in the case of Kyoto 2006þ algorithm ob- original dataset got 87.55% accuracy, 88.16% precision, and 90.24%
tained 99.65% accuracy, 99.65% detection rate, 99.65% precision, and detection rate.
0.3 false alarm rate. Khanday et al. [26] presented a lightweight approach for intrusion
In [19], NSGA-II with the jumping gene method is used for maxi- detection. Different classifiers were used to detect distributed denial of
mizing relevance, accuracy, recall, and precision along with minimizing service (DDoS) attacks in IoT networks. BOT-IoT and TON-IoT network
redundancy and features over the CICIDS2017 dataset for DDoS attacks. datasets were used for analysis and experimentation. Attacks were clas-
The binary classifier Extreme Learning Machine (ELM) is used to extract sified in binary and multi-classes. For classification, 20 features are
features for the detection of distributed denial-of-service attacks. With 6 selected using decision trees and feature importance index methods. The
features, the algorithm obtained 99.9% accuracy, 79% relevance, 100% model obtained 98% accuracy, 98% precision, and 98% recall for binary
recall, 99.8% precision, 0.02 s runtime, and 0.19% redundancy of fea- classification using the BOT-IoT dataset. For the classification of DDoS
tures. The obtained results in all aspects considered were better with attacks, the model got 99% accuracy, 100% precision, and 100% recall.
feature selection than without feature selection. Considering the TON-IoT dataset, the model obtained 99% accuracy,
In [20], an improved multi-objective algorithm named NSGA-III is 100% precision, and 99% recall for binary classification and 99% accu-
presented to reduce the complexity and improve the classification ac- racy, 100% precision, and 100% recall for DDoS attack classification.
curacy. NSGA-III used a domination method, multi-target search, and Xu et al. [27] presented an intrusion detection model based on
bias selection process. Growing Hierarchical Self-Organizing Map is multi-objective feature selection using a binary whale optimization al-
utilized by employing a probabilistic relabeling (GHSOM-pr) classifier to gorithm. The paper utilized four datasets from the UCI database. For
distinguish both attack-related and non-attack-related data, as well as dataset 1, the algorithm obtained 98.49% accuracy using less than half
several attack types (U2R, R2L, Probe, DoS, and new attack types). This i.e. 5 features. Algorithm with 4 features obtained 96.27% accuracy for
technique used KDD ‘99, and Gure-KDD datasets. In the case of the dataset 2, and 95.79% accuracy for dataset 3. For the fourth dataset, the
Gure-KDD dataset, with 20 features, the algorithm got 92.96 % average algorithm managed to obtain 96.86% accuracy using just 2% features.
accuracy and 99.62% detection rate. For the KDD ‘99 dataset the per- The algorithm was also analyzed using the KDD Cup 99 dataset, where
formance obtained was 99.77% average accuracy and 99.37 % detection the algorithm had an accuracy of 97.89% with just 5 features.
rate. In [28], a levy flight-based elephant herd optimization algorithm was
In [21], a negative selection algorithm is used to identify botnet at- used. The algorithm focused on data size (memory) used to obtain better
tacks. ISOT and ISCX benchmark datasets are used for experimentation. accuracy. KDD CUP 99 dataset was used for classification.
This method used CNN and long short-term memory (LSTM) as classi- A multi-objective evolutionary algorithm was used in Ref. [39] for
fiers. This method used correlation for feature selection. It also changes binary and multi-classification of intrusions. The model had 99.68%
the type/category of the features in the dataset such as those that are precision, and 99.98% recall values for Binary classification using AWID
acceptable, safe, doubtful, unsafe, dangerous, fun, etc. The algorithm got dataset. Using the same dataset for multi-classification, the algorithm had
99% accuracy, 98% precision, and 100% recall values for 400k sample 99.5% precision, and 99.95% recall. For the CIC-IDS2017 dataset in bi-
data. nary classification, precision was 99.8% and recall was 99.75%.For
In [22], a hybrid multi-objective approach based on Artificial multi-classification, the algorithm with some degradation gota minimum
Ecosystem and sine cosine algorithm was proposed. This method also precision of 97.89% and a minimum recall of 20%.
utilized opposition-based learning, bit-wise, and disruption operators. Multi-objective particle swarm optimization algorithm used in
KNN was used for the classification of attacks. The datasets utilized were Ref. [44] select 16 features in KDD cup dataset, 11 features in Cloud
from the UCI data repository. The algorithm got 98.5% accuracy, 0.014 Intrusion Detection Dataset (CIDD) dataset and 17 features in NSL-KDD
false alarm rate, 98.6% specificity, 98.2 % detection rate with 20 dataset. The algorithm had an average precision of 89.93%, an average
features. recall of 83.825, an average training time of 14.95 s, and an average
262
S. Sharma et al. Internet of Things and Cyber-Physical Systems 4 (2024) 258–267
263
S. Sharma et al. Internet of Things and Cyber-Physical Systems 4 (2024) 258–267
264
S. Sharma et al. Internet of Things and Cyber-Physical Systems 4 (2024) 258–267
2. Comparisons and conclusions regarding the performance of the MO [8] S.M. Kasongo, Y. Sun, Performance analysis of intrusion detection systems using a
feature selection method on the unsw-nb15 dataset, Journal of Big Data 7 (1)
algorithms on recent datasets or actual data are possible. Different
(2020) 105, https://doi.org/10.1186/s40537-020-00379-6, 10.1186/s40537-020-
classification models can also be considered. 00379-6.
3. It is feasible to use a variety of data transformation and normalization [9] N. Moustafa, N. Koroniotis, M. Keshk, A.Y. Zomaya, Z. Tari, Explain-able intrusion
methods. detection for cyber defenses in the Internet of things: Opportunities and solutions,
IEEE Communications Surveys & Tutorials 25 (3) (2023) 1775–1807, https://
4. Different computationally efficient multi-objective optimizers can be doi.org/10.1109/COMST.2023.3280465.
considered for intrusion detection with different datasets, and their [10] A.S. Eesa, Z. Orman, A.M.A. Brifcani, A novel feature-selection approach based on
performance can be tested for their capability in other optimization the cuttlefish optimization algorithm for intrusion detection systems, Expert Syst.
Appl. 42 (5) (2015) 2670–2679, https://doi.org/10.1016/j.eswa.2014.11.009.
tasks, such as scheduling, parameter estimations, resource manage- [11] S.S. Kareem, R.R. Mostafa, F.A. Hashim, H.M. El-Bakry, An effective feature
ment, etc. selection model using hybrid metaheuristic algorithms for IoT intrusion detection,
5. With the advancement of the techniques, new attacks also evolve. As Sensors 22 (4) (2022), 10.3390/s22041396. URL, https://www.mdpi.com/
1424-8220/22/4/1396.
a result, newer labeled datasets can be developed to include newer [12] M. Prasad, R.K. Gupta, S. Tripathi, A multi-level correlation-based feature selection
attacks in the IoT environment. for intrusion detection, Arabian J. Sci. Eng. 47 (8) (2022) 10719–10729, https://
6. A structure that constructs new datasets by combining attributes doi.org/10.1007/s13369-022-06760-2.
[13] A. Azab, M. Khasawneh, S. Alrabaee, K.-K.R. Choo, M. Sarsour, Network traffic
selected by different feature selection and extraction techniques classification Techniques, datasets, and challenges, Digital Communications and
described in the literature can be suggested. Networks (2022), https://doi.org/10.1016/j.dcan.2022.09.009.
7. A hybrid intrusion detection approach using different classifiers on [14] F.S. Gharehchopogh, B. Abdollahzadeh, S. Barshandeh, B. Arasteh, A multi-
objective mutation-based dynamic Harris Hawks optimization for botnet detection
actual traffic data with different attack types can be proposed.
in IoT, Internet of Things 24 (2023) 100952, https://doi.org/10.1016/
j.iot.2023.100952. ISSN 2542-6605.
7. Conclusions [15] H. Liu, B. Lang, Machine learning and deep learning methods for intrusion detection
systems: a survey, Appl. Sci. 9 (20) (2019), 10.3390/app9204396.URL,
https://www.mdpi.com/2076-3417/9/20/4396.
This paper conducted a thorough review and analysis of the various [16] Q. Al-Tashi, S.J. Abdulkadir, H.M. Rais, S. Mirjalili, H. Alhussian, M.G. Ragab,
advances in the methodologies for intrusion detection in IoT networks. A. Alqushaibi, Binary multi-objective grey wolf optimizer for feature selection in
This paper discusses the existing security procedure and multiple ob- classification, IEEE Access 8 (2020) 106247–106263, https://doi.org/10.1109/
ACCESS.2020.3000040.
jectives of the problem. There are many factors available for assessing the [17] C. Anusha, A. Sravani, J. Anusha, C. Lakshmi, G.S. Kumari, Intrusion detection
efficacy and performance of any approach, and it is not possible to decide system in IoTnetwork by using metaheuristic algorithm with machine learning
by only considering a few of them. Moreover, it explains the role of multi- dimensional reduction technique, in: 2022 3rd International Conference on
Computing, Analytics, and Networks (ICAN), 2022, pp. 1–6, https://doi.org/
objective optimization algorithms for Intrusion detection in IoT net- 10.1109/ICAN56228.2022.10007341.
works. An additional crucial part of intrusion detection is a particular [18] C. Suman, S. Tripathy, S. Saha, Building an Effective Intrusion Detection System
kind of dataset that needs to be properly chosen. Therefore, different Using Unsupervised Feature Selection in a Multi-Objective Optimization
Framework, CoRR abs/1905.06562, 2019 arXiv:1905.06562. URL, http://arxiv
datasets have been explored for various properties and attacks included. .org/abs/1905.06562.
Moreover, various challenges and future work to investigate MOAs in the [19] M. Roopak, G.Y. Tian, J. Chambers, Multi-objective-based feature selection for
field of IoT intrusion detection are discussed. This study highlights the DDoS attack detection in IoT networks, IET Netw. 9 (3) (2020) 120–127, https://
doi.org/10.1049/iet-net.2018.5206, arXiv, https://ietresearch.onlinelibrary.wile
significance of multi-objective optimization of intrusion detection, while
y.com/doi/pdf/10.1049/iet-net.2018.5206.
also introducing newcomers to the world of intrusion detection systems. [20] Y. Zhu, J. Liang, J. Chen, Z. Ming, An improved nsga-iii algorithm for feature
In the future, a comparison of various feature reduction/selection tech- selection used in intrusion detection, Knowl. Base Syst. 116 (2017) 74–85, https://
niques can be worked upon. Additionally, XAI techniques can be used for doi.org/10.1016/j.knosys.2016.10.030.
[21] S. Hosseini, A.E. Nezhad, H. Seilani, Botnet detection using negative selection
intrusion detection. algorithm, convolution neural network, and classification methods, Evolving
Systems 13 (1) (2022) 101–115, https://doi.org/10.1007/s12530-020-09362-1.
Funding [22] F. Hosseini, F.S. Gharehchopogh, M. Masdari, Moaeosca: an enhanced multi-
objective hybrid artificial ecosystem-based optimization with sine cosine algorithm
for feature selection in botnet detection in IoT, Multimed. Tool. Appl. 82 (9) (2023)
No grant from any funding agency was received for this study. 13369–13399, https://doi.org/10.1007/s11042-022-13836-6.
[23] W. Wei, S. Chen, Q. Lin, J. Ji, J. Chen, A multi-objective immune algorithm for
intrusion feature selection, Appl. Soft Comput. 95 (2020) 106522, https://doi.org/
References 10.1016/j.asoc.2020.106522.
[24] S.M. Kasongo, Y. Sun, Performance analysis of intrusion detection systems using a
[1] H. Mittal, A.K. Tripathi, A.C. Pandey, M.D. Alshehri, M. Saraswat, R. Pal, A new feature selection method on the unsw-nb15 dataset, Journal of Big Data 7 (1)
intrusion detection method for cyber–physical system in emerging industrial IoT, (2020) 105, https://doi.org/10.1186/s40537-020-00379-6, 10.1186/s40537-020-
Comput. Commun. 190 (2022) 24–35, https://doi.org/10.1016/ 00379-6.
j.comcom.2022.04.004. [25] T. Wisanwanichthan, M. Thammawichai, A double-layered hybrid approach for
[2] K. Kaushik, S. Dahiya, A. Bhardwaj, Y.E. Maleh, Internet of Things and Cyber- network intrusion detection system using combined naive Bayes and SVM, IEEE
Physical Systems: Security and Forensics, first ed., CRC Press, 2022 https://doi.org/ Access 9 (2021) 138432–138450, https://doi.org/10.1109/
10.1201/9781003283003. ACCESS.2021.3118573.
[3] A. Thakkar, R. Lohiya, A survey on intrusion detection system: feature selection, [26] S.A. Khanday, H. Fatima, N. Rakesh, Implementation of intrusion detection model
model, performance measures, application perspective, challenges, and future for DDoS attacks in lightweight IoT networks, Expert Syst. Appl. 215 (2023)
research directions, Artif. Intell. Rev. 55 (1) (2022), https://doi.org/10.1007/ 119330, https://doi.org/10.1016/j.eswa.2022.119330.
s10462-021-10037-9. [27] H. Xu, Y. Fu, C. Fang, Q. Cao, J. Su, S. Wei, An improved binary whale optimization
[4] R. Abdulhammed, H. Musafer, A. Alessa, M. Faezipour, A. Abuzneid, Features algorithm for feature selection of network intrusion detection, in: 2018 IEEE 4th
dimensionality reduction approaches for machine learning based network intrusion International Symposium on Wireless Systems within the International Conferences
detection, Electronics 8 (3) (2019), https://doi.org/10.3390/electronics8030322. on Intelligent Data Acquisition and Advanced Computing Systems, (IDAACS-SWS),
[5] A. Thakkar, R. Lohiya, Attack classification using feature selection techniques: a 2018, pp. 10–15, https://doi.org/10.1109/IDAACS-SWS.2018.8525539.
comparative study, J. Ambient Intell. Hum. Comput. 12 (2020) 1249–1266. [28] H. Xu, Q. Cao, C. Fang, Y. Fu, J. Su, S. Wei, P. Bykovyy, Application of elephant herd
[6] W.A.H.M. Ghanem, S.A.A. Ghaleb, A. Jantan, A.B. Nasser, A.M. Saleh, A. Ngah, optimization algorithm based on levy flight strategy in intrusion detection, in: 2018
A.C. Alhadi, H. Arshad, A.-M.H.Y. Saad, A.E. Omolara, Y.A.B. El-Ebiary, IEEE 4th International Symposium on Wireless Systems within the International
O.I. Abiodun, Cyber intrusion detection system based on a multi objective binary Conferences on Intelligent Data Acquisition and Advanced Computing Systems,
bat algorithm for feature selection and enhanced bat algorithm for parameter (IDAACS-SWS), 2018, pp. 16–20, https://doi.org/10.1109/IDAACS-
optimization in neural networks, IEEE Access 10 (2022) 76318–76339, https:// SWS.2018.8525848.
doi.org/10.1109/ACCESS.2022.3192472. [29] Z. Ye, Y. Sun, S. Sun, S. Zhan, H. Yu, Q. Yao, Research on network intrusion
[7] I.H. Hassan, A. Mohammed, M.A. Masama, Chapter 6 - metaheuristic algorithms in detection based on support vector machine optimized with a grasshopper
network intrusion detection, in: S. Mirjalili, A.H. Gandomi (Eds.), Comprehensive optimization algorithm, in: 2019 10th IEEE International Conference on Intelligent
Metaheuristics, Academic Press, 2023, pp. 95–129, https://doi.org/10.1016/B978- Data Acquisition and Advanced Computing Systems: Technology and Applications
0-323-91781-0.00006-5. (IDAACS), 1, 2019, pp. 378–383, https://doi.org/10.1109/IDAACS.2019.8924234.
265
S. Sharma et al. Internet of Things and Cyber-Physical Systems 4 (2024) 258–267
[30] A.S. Mahboob, M.R.O. Moghaddam, An anomaly-based intrusion detection system [53] J.H. Ring, C.M. Van Oort, S. Durst, V. White, J.P. Near, C. Skalka, Methods for host-
using a butterfly optimization algorithm, in: 2020 6th Iranian Conference on Signal based intrusion detection with deep learning, Digital Threats 2 (4) (Oct 2021),
Processing and Intelligent Systems, IC-SPIS), 2020, pp. 1–6, https://doi.org/ https://doi.org/10.1145/3461462, 10.1145/3461462.
10.1109/ICSPIS51611.2020.9349537. [54] M.A. Ferrag, O. Friha, D. Hamouda, L. Maglaras, H. Janicke, Edge-IIoTset:: a new
[31] A. Fatani, M. AbdElaziz, A. Dahou, M.A.A. Al-Qaness, S. Lu, Iot intrusion detection comprehensive realistic cyber security dataset of IoT and IIoTapplications for
system using deep learning and enhanced transient search optimization, IEEE centralized and federated learning, IEEE Access 10 (2022) 40281–40306.
Access 9 (2021) 123448–123464, https://doi.org/10.1109/ [55] I. Sharafaldin, A. Lashkari, A. Ghorbani, Toward generating a new intrusion
ACCESS.2021.3109081. detection dataset and intrusion traffic characterization, Intl Conf. on Information
[32] M.M. Althobaiti, K. Pradeep Mohan Kumar, D. Gupta, S. Kumar, R.F. Mansour, An Systems Security and Privacy (ICISSP) 1 (2018) 108–116, https://doi.org/10.5220/
intelligent cognitive computing based intrusion detection for industrial cyber- 0006639801080116.
physical systems, Measurement 186 (2021) 110145, https://doi.org/10.1016/ [56] N. Koroniotis, N. Moustafa, E. Sitnikova, B. Turnbull, Towards the development of
j.measurement.2021.110145. realistic botnet dataset in the Internet of Things for network forensic analytics: bot-
[33] Z. Wang, Z. Li, D. He, S. Chan, Alightweight approach for network intrusion IoT dataset, Future Generat. Comput. Syst. 100 (2019) 779–796, https://doi.org/
detection in industrial cyber-physical systems based on knowledge distillation and 10.1016/j.future.2019.05.041.
deep metric learning, Expert Syst. Appl. 206 (2022) 117671, https://doi.org/ [57] M. Bhuyan, D.K. Bhattacharyya, J. Kalita, Towards generating real-life datasets for
10.1016/j.eswa.2022.117671. network intrusion detection, Int. J. Netw. Secur. 17 (2015) 675–693.
[34] H. Al-Zoubi, S. Altaamneh, A feature selection technique for network intrusion [58] W. Dhifallah, M. Tarhouni, T. Moulahi, S. Zidi, A novel realistic dataset for intrusion
detection based on the chaotic crow search algorithm, in: 2022 International detection in IoT based on machine learning, in: 2021 International Symposium on
Conference on Intelligent Data Science Technologies and Applications, (IDSTA), Networks, Computers, and Communications (ISNCC), 2021, pp. 1–6, https://
2022, pp. 54–60, https://doi.org/10.1109/IDSTA55301.2022.9923108. doi.org/10.1109/ISNCC52172.2021.9615841.
[35] Z. Jie, Iot-network attack detection with optimized recurrent neural network and [59] M.H. Bhuyan, D.K. Bhattacharyya, J.K. Kalita, Towards generating real-life datasets
optimal feature selection, in: 2022 IEEE 2nd International Conference on Data for network intrusion detection, Int. J. Netw. Secur. 17 (6) (2015) 683–701.
Science and Computer Application, (ICD-SCA), 2022, pp. 951–957, https://doi.org/ [60] V. Dutta, M. Chora’s, M. Pawlicki, R. Kozik, A deep learning ensemble for network
10.1109/ICDSCA56264.2022.9987890. anomaly and cyber-attack detection, Sensors 20 (2020) 4583, https://doi.org/
[36] R. Gangula, M.M V, R.K M, Network intrusion detection system for internet of 10.3390/s20164583.
things based on enhanced flower pollination algorithm and ensemble classifier, [61] M. Ring, S. Wunderlich, D. Scheuring, D. Landes, A. Hotho, A survey of network-
Concurrency Comput. Pract. Ex. 34 (21) (2022) e7103, 10.1002/cpe.7103. URL, based intrusion detection data sets, Comput. Secur. 86 (2019) 147–167, https://
https://onlinelibrary.wiley.com/doi/abs/10.1002/cpe.7103. doi.org/10.1016/j.cose.2019.06.005, arXiv:1903.02460.
[37] L. Jovanovic, D. Jovanovic, M. Antonijevic, M. Zivkovic, N. Budimirovic, [62] U. cavusoglu, A new hybrid approach for intrusion detection using machine
I. Strumberger, N. Bacanin, The xgboost tuning by improved firefly algorithm for learning methods, Appl. Intell. 49 (Jul 2019), https://doi.org/10.1007/s10489-
network intrusion detection, in: 2022 24th International Symposium on Symbolic 018-01408-x.
and Numeric Algorithms for Scientific Computing, SYNASC), 2022, pp. 268–275, [63] P. Vanin, T. Newe, L.L. Dhirani, E. O'Connell, D. O'Shea, B. Lee, M. Rao, A study of
https://doi.org/10.1109/SYNASC57785.2022.00050. network intrusion detection systems using artificial intelligence/machine learning,
[38] S. Bebortta, S.K. Das, S. Chakravarty, Fog-enabled intelligent network intrusion Appl. Sci. 12 (22) (2022), 10.3390/app122211752. URL, https://www.mdpi.com
detection framework for internet of things applications, in: 2023 13th International /2076-3417/12/22/11752.
Conference on Cloud Computing, Data Science & Engineering, Confluence, 2023, [64] P. Kumar, G.P. Gupta, R. Tripathi, Design of anomaly-based intrusion detection
pp. 485–490, https://doi.org/10.1109/Confluence56041.2023.10048841. system using fog computing for IoT network, Automat. Control Comput. Sci. 55 (2)
[39] Y. Chen, Q. Lin, W. Wei, J. Ji, K.-C. Wong, C.A.C. Coello, Intrusion detection using (2021) 137–147, https://doi.org/10.3103/S0146411621020085.
multi-objective evolutionary convolutional neural network for the internet of things [65] Y. Otoum, D. Liu, A. Nayak, Dl-ids: a deep learning–based intrusion detection
in fog computing, Knowl. Base Syst. 244 (2022) 108505, https://doi.org/10.1016/ framework for securing IoT, Transactions on Emerging Telecommunications
j.knosys.2022.108505. Technologies 33 (3) (2022) e3803.
[40] A.K. Dey, G.P. Gupta, S.P. Sahu, Hybrid meta-heuristic based feature selection [66] S. Pokhrel, R. Abbas, B. Aryal, IoTsecurity: Botnet Detection in IoT Using Machine
mechanism for cyber-attack detection in iot-enabled networks, Procedia Comput. Learning, ArXiv abs/2104.02231, 2021. URL, https://api.semanticscholar.org
Sci. 218 (2023) 318–327, https://doi.org/10.1016/j.procs.2023.01.014. /CorpusID:233033401.
International Conference on Machine Learning and Data Engineering. [67] M. Markevych, M. Dawson, A review of enhancing intrusion detection systems for
[41] R. Chinnasamy, M. Subramanian, N. Sengupta, Designing of intrusion detection cybersecurity using artificial intelligence (ai), International conference Knowledge-
system using an ensemble of artificial neural network and honey badger Based Organization 29 (3) (2023) 30–37, https://doi.org/10.2478/kbo-2023-0072.
optimization algorithm, in: 2023 International Conference on IT Innovation and [68] M. Aljebreen, M.A. Alohali, M.K. Saeed, H. Mohsen, M. Al Duhayyim,
Knowledge Discovery, ITIKD), 2023, pp. 1–6, https://doi.org/10.1109/ A.A. Abdelmageed, S. Drar, S. Abdelbagi, Binary chimp optimization algorithm with
ITIKD56332.2023.10100161. ML-based intrusion detection for secure IoT-assisted wireless sensor networks,
[42] Y. Gong, Y. Liu, C. Yin, A novel two-phase cycle algorithm for effective cyber Sensors 23 (8) (2023), https://doi.org/10.3390/s23084073.
intrusion detection in edge computing, EURASIP J. Wirel. Commun. Netw. 2021 (1) [69] G. Eswari, G. Monica, V. Deepak, K. Sunil, B.P. Kumar, Enhancing cloud storage
(2021) 149, https://doi.org/10.1186/s13638-021-02016-z. security with intrusion detection system using cnn and gray wolf optimization
[43] M. Aljanabi, M.A. Ismail, V. Mezhuyev, Improved TLBO-JAYA algorithm for subset algorithm, in: 2023 International Conference on Sustainable Computing and Data
feature selection and parameter optimization in the intrusion detection system, Communication Systems, ICSCDS), 2023, pp. 557–563, https://doi.org/10.1109/
Complexity 2020 (2020) 5287684, https://doi.org/10.1155/2020/5287684. ICSCDS56580.2023.10104643.
[44] S. Subramani, M. Selvi, Multi-objective pso based feature selection for intrusion [70] H.A. Christopher, J.A. Ojeniyi, S.A. Adepoju, O.A. Abisoye, Cloud intrusion
detection in iot based wireless sensor networks, Optik 273 (2023) 170419, https:// detection system using antlion optimization algorithm and support vector machine
doi.org/10.1016/j.ijleo.2022.170419. (SVM) techniques, in: 2023 International Conference on Science, Engineering, and
[45] H. Asgharzadeh, A. Ghaffari, M. Masdari, F. SoleimanianGharehchopogh, Anomaly- Business for Sustainable Development Goals (SEB-SDG), 1, 2023, pp. 1–5, https://
based intrusion detection system in the internet of things using a convolutional doi.org/10.1109/SEB-SDG57117.2023.10124606.
neural network and multi-objective enhanced capuchin search algorithm, J. Parallel [71] S. Alosaimi, S.M. Almutairi, An intrusion detection system using bot-iot, Appl. Sci.
Distr. Comput. 175 (2023) 1–21, https://doi.org/10.1016/j.jpdc.2022.12.009. 13 (9) (2023), 10.3390/app13095427. URL, https://www.mdpi.com/2076-3417/
[46] Z. Azam, M.M. Islam, M.N. Huda, Comparative analysis of intrusion detection 13/9/5427.
systems and machine learning-based model analysis through the decision tree, IEEE [72] A. Heidari, M.A. JabraeilJamali, Internet of things intrusion detection systems: a
Access 11 (2023) 80348–80391, https://doi.org/10.1109/ACCESS.2023.3296444. comprehensive review and future directions, Cluster Comput. 26 (6) (2023)
[47] M.S. Hoque, M.A. Mukit, M.A.N. Bikas, An implementation of an intrusion detection 3753–3780, https://doi.org/10.1007/s10586-022-03776-z, 10.1007/s10586-022-
system using genetic algorithm, Int. J. Netw. Secur. Appl. 4 (2) (2012) 109120, 03776-z.
https://doi.org/10.5121/ijnsa.2012.4208. [73] R. Ghanbarzadeh, A. Hosseinalipour, A. Ghaffari, A novel network intrusion
[48] R. Thomas, D. Pavithran, A survey of intrusion detection models based on nsl-kdd detection method based on metaheuristic optimization algorithms, J. Ambient
data set, in: 2018 Fifth HCT Information Technology Trends, ITT), 2018, Intell. Hum. Comput. 14 (6) (2023) 7575–7592, https://doi.org/10.1007/s12652-
pp. 286–291, https://doi.org/10.1109/CTIT.2018.8649498. 023-04571-3.
[49] S. Mighan, M. Kahani, A novel scalable intrusion detection system based on deep [74] Y. Shen, C. Zhang, F.S. Gharehchopogh, S. Mirjalili, An improved whale
learning, Int. J. Inf. Secur. 20 (2021), https://doi.org/10.1007/s10207-020-00508- optimization algorithm based on multi-population evolution for global optimization
5. and engineering design problems, Expert Syst. Appl. 215 (2023) 119269, https://
[50] M. Verkerken, L. D’hooge, D. Sudyana, Y.-D. Lin, T. Wauters, B. Vol-ckaert, doi.org/10.1016/j.eswa.2022.119269. ISSN 0957-4174.
F.D. Turck, A Novel Multi-Stage Approach for Hierarchical Intrusion Detection, [75] J. Piri, P. Mohapatra, B. Acharya, F.S. Gharehchopogh, V.C. Gerogiannis,
IEEE Transactions on Network and Service Management, 2023, https://doi.org/ A. Kanavos, S. Manika, Feature selection using artificial Gorilla troop optimization
10.1109/TNSM.2023.3259474, 1–1. for biomedical data: a case analysis with COVID-19 data, Mathematics 10 (2022)
[51] M. Al-Hawawreh, E. Sitnikova, N. Aboutorab, X-IIoTID: a connectivity-agnostic and 2742, https://doi.org/10.3390/math10152742.
device-agnostic intrusion data set for industrial Internet of things, IEEE Internet €
[76] E. Ozbay, €
F.A. Ozbay, F.S. Gharehchopogh, Peripheral blood smear images
Things J. 9 (5) (2021) 3962–3977. classification for acute lymphoblastic leukemia diagnosis with an improved
[52] R. Vinayakumar, M. Alazab, K.P. Soman, P. Poornachandran, A. Al-Nemrat, convolutional neural network, J Bionic Eng (2023), https://doi.org/10.1007/
S. Venkatraman, Deep learning approach for intelligent intrusion detection system, s42235-023-00441-y.
IEEE Access 7 (2019) 41525–41550, https://doi.org/10.1109/ [77] F.S. Gharehchopogh, A.A. Khargoush, A chaotic-based interactive autodidactic
ACCESS.2019.2895334. school algorithm for data clustering problems and its application on COVID-19
266
S. Sharma et al. Internet of Things and Cyber-Physical Systems 4 (2024) 258–267
disease detection, Symmetry 15 (4) (2023) 894, https://doi.org/10.3390/ [79] F.S. Gharehchopogh, T. Ibrikci, An improved African vultures optimization
sym15040894. algorithm using different fitness functions for multi-level thresholding image
[78] F.S. Gharehchopogh, An improved Harris hawks optimization algorithm with multi- segmentation, Multimed. Tool. Appl. (2023) 1–47, https://doi.org/10.1007/
strategy for community detection in social network, J Bionic Eng 20 (2023) s11042-023-16300-1.
1175–1197, https://doi.org/10.1007/s42235-022-00303-z.
267