Next Article in Journal
Intelligent Fault Diagnosis of Robotic Strain Wave Gear Reducer Using Area-Metric-Based Sampling
Previous Article in Journal
An Innovative Numerical Method Utilizing Novel Cubic B-Spline Approximations to Solve Burgers’ Equation
Previous Article in Special Issue
An Enhanced Multi-Constraint Optimization Algorithm for Efficient Network Topology Generation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimal Deep-Learning-Based Cyberattack Detection in a Blockchain-Assisted IoT Environment

1
Department of Software Engineering, College of Computer Science and Engineering, University of Jeddah, Jeddah 21493, Saudi Arabia
2
Information Technology Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia
*
Author to whom correspondence should be addressed.
Mathematics 2023, 11(19), 4080; https://doi.org/10.3390/math11194080
Submission received: 22 August 2023 / Revised: 18 September 2023 / Accepted: 19 September 2023 / Published: 26 September 2023

Abstract

:
The Internet of Things (IoT) is the most extensively utilized technology nowadays that is simple and has the advantage of replacing the data with other devices by employing cloud or wireless networks. However, cyber-threats and cyber-attacks significantly affect smart applications on these IoT platforms. The effects of these intrusions lead to economic and physical damage. The conventional IoT security approaches are unable to handle the current security problems since the threats and attacks are continuously evolving. In this background, employing Artificial Intelligence (AI) knowledge, particularly Machine Learning (ML) and Deep Learning (DL) solutions, remains the key to delivering a dynamically improved and modern security system for next-generation IoT systems. Therefore, the current manuscript designs the Honey Badger Algorithm with an Optimal Hybrid Deep Belief Network (HBA-OHDBN) technique for cyberattack detection in a blockchain (BC)-assisted IoT environment. The purpose of the proposed HBA-OHDBN algorithm lies in its accurate recognition and classification of cyberattacks in the BC-assisted IoT platform. In the proposed HBA-OHDBN technique, feature selection using the HBA is implemented to choose an optimal set of features. For intrusion detection, the HBA-OHDBN technique applies the HDBN model. In order to adjust the hyperparameter values of the HDBN model, the Dung Beetle Optimization (DBO) algorithm is utilized. Moreover, BC technology is also applied to improve network security. The performance of the HBA-OHDBN algorithm was validated using the benchmark NSLKDD dataset. The extensive results indicate that the HBA-OHDBN model outperforms recent models, with a maximum accuracy of 99.21%.

1. Introduction

Currently, Internet of Things (IoT) technology is applied in a variety of applications such as sensors, devices, software, and tools to ensure improved functions and accuracy [1]. With the growth of the IoT, life has become comfortable and simple for human beings, governments, and industries. Machines, sensors, gadgets, and devices have become highly intelligent, whereas manual contributions have substantially decreased through the development of IoT technology [2]. The IoT is required for smart devices, namely, fire alarms, physical medical sensors, smart mobiles, smart energy meters, industrial devices, energy applications, and smart security systems. The term IoT security refers to the protection of internet-connected or network-based things [3]. In recent years, the concept of the IoT has developed, and its main terminology has developed over several years. The major role of the IoT is to interconnect the nodes, frameworks, sensors, smart cities, and systems through the internet for communication, control, and information sharing [4].
The IoT has been developed for the optimization of the day-to-day activities of human life and to enable the current world to run proficiently. Everything is connected to the internet, such as smart sensors, cooking appliances, thermostats, fitness mobile applications, air conditioners, and PV systems [5]. This fast growth of IoT technology is creating huge difficulties for securing and protecting IoT data from unauthorized users, malicious traffic, hackers, and attackers. Thus, numerous defense mechanisms and approaches have been proposed and developed in IoT systems and architectures to protect the data [6]. The application of various DL techniques to identify the attacks with binary classification and to classify different kinds of attacks with multi-class classification has become an active research domain [7]. While several great reviews have covered this developing area of research, the literature fails to produce an unbiased comparison of various DL techniques, particularly the application of new databases for intrusion detection in a controlled setting [8].
Cybersecurity is a serious challenge in the current world. Firewalls, for instance, have been employed for a long time to protect secret data. The intrusion detection system (IDS) studies network traffic on a certain computer environment to detect the indications of malicious activities [9]. The fast development of Artificial Intelligence (AI) has led to important advances in certain mechanisms, including anomaly detection and pattern identification. While the existing systems perform well in detecting cyberattacks, their performance could still be improved. With an increase in the number of network attacks, the quantity of data accessible on networks increases; thus, rapid and highly effective methods are required in order to identify the attacks. Without a doubt, a huge number of approaches to enhancing network security exist [10]. Privacy and security are significant IoT challenges to focus on and investigate further. With the employment AI, the identification of cyber security attacks on the IoT can be significantly enhanced.
The current manuscript describes the Honey Badger Algorithm with the Optimal Hybrid Deep Belief Network (HBA-OHDBN) technique for cyberattack detection in a BC-assisted IoT platform. In the proposed HBA-OHDBN system, feature selection using HBA is implemented to choose an optimal set of features. In the HBA, digging and honey-finding strategies are simulated during the exploration and exploitation of the search space. For intrusion detection, the HBA-OHDBN technique applies the HDBN model. To adjust the hyperparameter values of the HDBN model, the Dung Beetle Optimization (DBO) algorithm is utilized. The DBO algorithm considers global exploration and local exploitation, thereby having the characteristics of a fast convergence rate and a satisfactory accuracy outcome. The HBA-OHDBN algorithm was tested using a benchmark IDS database, and the outcomes were inspected under different evaluation metrics. The key contributions of the paper are summarized herewith:
  • Development of the HBA-OHDBN technique comprising HBA-based feature subset selection, HDBN-based detection, and DBO-based hyperparameter tuning for intrusion detection in the IoT environment. To the best of the authors’ knowledge, the HBA-OHDBN technique does not exist in the literature.
  • Design of the HBA-based feature subset selection approach to identify the most relevant and informative features from the dataset, which helps in reducing the dimensionality and improving the overall performance of the intrusion detection system.
  • Employment of the DBO algorithm to fine-tune the hyperparameters of the HDBN model, thus leading to a fast convergence rate and high solution accuracy. This approach ensures that the HDBN model is well adjusted for an improved intrusion detection performance.
The rest of the paper is organized as follows. Section 2 provides the related works and Section 3 discusses the proposed model. Then, Section 4 details the analytical results, while Section 5 concludes the paper.

2. Literature Review

Asiri et al. [11] introduced the Hybrid Metaheuristics FS with Stacked DL-enabled Cyber-Attack Detection (HMFS-SDLCAD) approach. In this study, data preprocessing was implemented, the Salp Swarm Optimizer (SSO) depends on the PSO (SSOPSO), and a Stacked Bidirectional-GRU (SBiGRU) algorithm was employed for FS identification and classification. Further, the Whale Optimization Algorithm (WOA) was utilized for optimization of the hyperparameters. In reference [12], the authors suggested a DL-based intrusion detection model for IIoT with a hybrid rule-based FS in order to confirm and train the data acquired from TCP/IP packets. In this study, the training method was executed utilizing a hybrid rule-based FS and deep FFNN (DFFNN) approach. In a study conducted earlier [13], the authors developed a Deep Random-NN (DRaNN)-based rapid and dependable attack identification method for IIoT platforms. The developed RaNN method was optimized by integrating the hybrid PSO with Sequential Quadratic Programming (SQP). The SQP-enabled PSO enables the NN to select the optimum hyper-parameters.
Chander and Upendra Kumar [14] presented a novel metaheuristic FS with DL-enabled anomaly detection approach in the IIoT platform, abbreviated as the MFSDL-ADIIoT algorithm. This method leveraged a novel Deer Hunting Optimization (DHO) technique based on FS to arrive at the valuable feature subsets. Moreover, a Cascaded RNN (CRNN) algorithm was also implemented for classification and recognition. Eventually, the Sparrow Search Algorithm (SSA) was employed for optimal fine-tuning of the parameters. Khacha et al. [15] suggested a novel IDS by exploiting the DL techniques. To be specific, the proposed system functions via the incorporation of CNN and LSTM algorithms for intrusion detection and classification. In this study, the current datasets, termed Edge-IIoT sets, containing the actual traffic network of the IIoT and IoT applications were employed. Alabsi et al. [16] integrated two CNNs and recommended a method by which to identify the attacks on IoT networks. The first CNN algorithm is used for the selection of the important features that identify the IoT attack in the raw data on network traffic. The second CNN applies the features detected by the first CNN for making a robust identification technique so as to correctly identify the IoT attacks. In reference [17], the authors developed a novel DL-based IDS (DL-IDS) approach. This method involves the application of a Spider Monkey Optimizer (SMO) approach and the Stacked-Deep Polynomial Network (SDPN). Here, the SMO chooses the optimum features in the databases, whereas the SDPN approach classifies the data as either normal or anomaly.
Alohali et al. [18] developed a novel BC-Assisted Optimal ML-based Cyber-attack Detection and Classification (BAOML-CADC) approach. The primary aim of the proposed BAOML-CADC algorithm was to classify cyber-attacks. Therefore, the proposed BAOML-CADC approach executed the Thermal Equilibrium Algorithm-based FS (TEA-FS) algorithm for optimum selection of the features. The BAOML-CADC system utilized the ELM approach for cyber-attack detection. In the study conducted earlier [19], a new Hybrid Deep Random NN (HDRaNN) was established for cyber-attack detection from the IIoT. The HDRaNN integrates the DRaNN and MLP with dropout regularization. Al-Abassi et al. [20] examined a DL approach for the development of novel balanced representations of imbalanced databases. A novel representation was provided as an ensemble DL attack detection model, especially planned for the ICS platform. The presented attack detection model had the advantages of both DNN and DT approaches for the detection of cyber-attacks in a novel representation.

3. The Proposed Model

In the current manuscript, the HBA-OHDBN system is presented for cyberattack detection in a BC-assisted IoT platform. The major intention behind the HBA-OHDBN algorithm lies in its accurate recognition and classification of the cyberattacks that occur in the IoT platform. The proposed HBA-OHDBN approach has three operational stages: HBA-based feature selection, HDBN-based detection, and DBO-based hyperparameter tuning. Figure 1 depicts the overall flow of the HBA-OHDBN algorithm.

3.1. BC Technology

The blockchain (BC) is a de-centralized digital ledger that enables endwise transmission and provides communication among untrustworthy people [21]. It includes n number of blocks. In the current research work, all the blocks are incorporated into their prior block via reverse connection, except the initial block (genetic), i.e., the hash code of its early block. For instance, b l o c k   j + 1 assumes the hash code of the early b l o c k j . Similarly, all the blocks contain additional data fields, namely, an encryption opcode, an identifier, a core hash of every commitment, and a core hash of every operation. Since single-bit change may result in commitments, the unique hash code and the fixed-size core hash values of these two functions are irreversible. One particular condition is satisfied, i.e., smart contracts working on the upper end of the BC can simplify the application of restrictions and contractual agreements. After it is synthesized to the implemented code and recorded from the BC, based on the irreversibility of the BC and core hash of the smart contract, the smart contract becomes irreversible. The smart contract helps in improving the efficacy of business operations, reducing its potential threats, and streamlining the administration. Figure 2 illustrates the structure of the BC.

3.2. Feature Selection Using HBA

In order to elect an optimal subset of features, the HBA is applied. HBA is a newly-established metaheuristic approach inspired by the smart foraging behavior of honey badgers (HB). In this approach, the honey-finding and digging approaches of HB are mimicked during the exploitation and exploration stages in the search range [22,23]. The initial population randomly initializes the individual location and the size of the population (number of HBs), as given below:
x i = l b i + r 1 × u b j + l b   .
In Equation (1), r 1 refers to a random integer in the range of 0 , 1 ;   x j denotes the location of the i t h individual of N candidates; and l b i and u b i indicate the lower and upper boundaries of the search range, respectively. The concentration of prey and its smell intensity are related to the distance between the HBs and the prey. The olfactory intensity is compared with the distance between the targets and the HBs and the concentration of the prey. The slower the movement of the HB, the smaller the olfactory intensity will be. If the HB moves faster, then a higher inverse square law provides the olfactory concentration, as given below:
I i = r 2 × S 4 π d i 2
S = ( x i x i + 1 ) 2
d i = x p r e y χ i .
Here, S shows the intensity concentration or source; I i denotes the olfactory concentration of the HB; r 2 corresponds to an arbitrary value ranged between 0 and 1; and d i signifies the distance between the prey and the existing individual, HB.
The density factor α ensures a steady conversion from exploration to excavation. The reduction factor C reduces with the number of iterations, upgraded by Equation (5) to reduce the uncertainty produced by time-varying changes at the time of foraging:
α = C × e x p t t m a x .
In Equation (5), t corresponds to the maximal iteration counts; and C is a constant value fixed at 2. The flag F changes the search direction and provides a heavy prospect of finding the food within the search range.
Similar to the shape of the heart line, the HB implements the action in the excavation stage. The cardioid movement is simulated using the following expression:
x n e w = x p r e y + F × β × I × x p r e y + F × r 3 × α × d i × c o s 2 π r 4 × 1 c o s 2 π r 5 .
In Equation (6), d i shows the distance between the target and the existing individual HB; x r e y indicates the global optimum location in the existing state; β corresponds to the capability of the HB to attain food; and r 3 ,   r 4 , and r 5 refer to three dissimilar random integers in the range of ( 0,1 ) .
F = 1   i f   r 6 < 0.5 1   e l s e  
The HB heavily relies on a few parameters, such as the time-varying search, the fragrance concentration of the target, and the distance from the prey during the excavation phase. Furthermore, HBs are subjected to different disturbances that prevent them from finding the best location of the prey. The movement trajectory of the honey source or the HB follows the honeyguide bird to the hive, as shown in the following expression:
x n e w = x p r e y + F × r 7 × α × d i .
Here, x n e w refers to the upgraded individual location of the HBs; x p r e y shows the prey’s location; F and α are defined using the Equations (5) and (7), respectively; and r 7 indicates the randomly generated value within [0, 1]. The HB searches near the prey’s position x p r e y   according to the distance d i .
The Fitness Function (FF) deployed in the presented HBA methodology is intended to take a balance between the number of features elected from every performance (lesser) and the classification accuracy (higher) acquired by utilizing these elected features. Equation (9) defines the FF to calculate the performance:
F i t n e s s = α γ R D + β R C .
Here, γ R ( D ) implies the errors of a provided classifier; R   suggests the cardinality of the elected subset; | C | demonstrates the entire number of features from the database; and α and β correspond to two parameters that are equivalent to the impact of classifier quality and subset length, i.e., ∈ [1, 0] and β = 1 α .

3.3. Cyberattack Detection Using the HDBN Model

In the current research work, the HDBN approach is applied to detect cyberattacks. Based on the assumption that both DBN and DBM techniques have constraints, the current study presents the HDBN model that employs the Deep Boltzmann Machine system that contains two low-level layers of RBMs and the DBN technique that contains two-layer RBMs from the upper layers. Either the training time or model accuracy should be of concern [24]. The HDBN technique contains four layers. ν represents the visual state and it also acts as the input for the method. All the samples are defined by a set length vector. h 1 ,   h 2 ,   h 3 , and h 4 correspond to four hidden layers (HLs) with distinct counts of nodes for all the levels. The nodes with similar HL values cannot be linked together; for nodes of distinct layers, among h 3 , h 4 , and h 2 , there exists directed connections. Among HL h 1 , ν , and HL h 2 , there exists undirected FC. Next, the sample is signified as a set vector and is trained by the first two layers, i.e., h 1 and h 2 of DBM training. Here, h 2 stands for DBM outcomes. Simultaneously, h 2 implies the input of the DBN technique that is composed of h 3 and h 4 . Here, h 4 represents the last outcome of the HDBN approach. Related to the visual state, it is called higher-level semantic representation. Figure 3 illustrates the architecture of DBN.
In order to gain the optimum parameters for the method, Hinton establishes an energy model in which the parameters are developed as an optimum performance that is embedded in the energy function. The most important mechanism in detecting the statistical pattern is the capturing of the correlations among variables, and it is similar to the energy model.
E ν ,   h = i = 1 n j = 1 m W i j h i ν j j = 1 m b j ν j i = 1 n c i h i
Here, n signifies the number of hidden nodes (HNs); m denotes the number of visible nodes (VNs); and b and c denote the biases of the visual state and HL, respectively. This equation is the energy function that signifies every connection between VN and HN. The main function of RBM is the cumulative value of energies for every VN and HN. However, for the main function, in every instance, there is a need to identify the values of every HN, which could be equivalent to calculating the energy so that it can face the index level of complexity in computation. The joint probability of VN and HN is given herewith:
P ν , h = e E v , h v , h e E v , h .
By establishing this probability, it becomes simple to resolve the energy model. The purpose of this study is to obtain minimal energy. In the statistical procedure, the low energy layer has a greater probability of incident than the greater energy state. So, it is required to maximize the probability.
F r e e   E n e r g y = l n h e E v , h ,
so
P ν = e F r e e E n e r g y v Z ,   Z = v , h e E v , h ,
where Z denotes the normalized factor.
I n   P ν = F r e e   E n e r g y ν l n   Z
In this equation, the first item on the right denotes the negative values of the entire free-energy function of the whole network; on the left, the probability function is shown. This has been mentioned in the presented model, in which the maximal probability evaluation is used to resolve the model parameters.

3.4. Hyperparameter Selection Using DBO Algorithm

In this final stage, the DBO algorithm is applied upon the hyperparameter values of the HDBN model. The DBO algorithm is inspired by the natural behaviors of dung beetles [25]. Here, the optimum solution is attained by updating the location of the dung beetles [26]: the dung beetles that roll the balls can be upgraded and formulated using the following Equation (15):
x i t + 1 = x i t + α × k 1 × x i t 1 + k 2 × Δ x
x i t + 1 = x i t + t a n θ x i t x i t 1 .
The location-updating formula for female dung beetles is given herewith:
x i t + 1 = X * + b 1 × x i t L b * + b 2 × x i t U b * .
The location-updating formula for small dung beetles is given below.
x i t + 1 = X i ( t ) + C 1 × x i t L b b + C 2 × x i t U b b .
The location-updating formula for thief dung beetles is as follows:
x i t + 1 = X b + S × g × x i t X * + x i t X b .
where, k 1 and k 2 values are fixed, i.e., 0.1 and 0.3, respectively; the flexure angle ( t a n θ ) ranges from [ 0 , π ] and is utilized in the dung beetles’ location-updating formula; X * and X b show the present optimum location and the global optimum location, respectively; and b 1 and b 2 are two constants that signify independent random vectors of size 1 × d i m . The reproduction and ovipositional regions have upper and lower boundaries, which are denoted by U b * ,   L b * ,   U b b , and L b b . Moreover, a random vector of 1 × d i m size that follows a uniform distribution is characterized by g , and S signifies a constant value. The parameters C 1 and C 2 are uniformly distributed random numbers between [0, 1]. The location-updating equation for dung beetles is updated continuously, until the optimum solution is reached.
Fitness selection is a key aspect of the DBO algorithm. The encoded solution is utilized to assess the good performance of the candidate outcomes. At present, accuracy is the major condition exploited in the design of an FF.
F i t n e s s = m a x P
P = T P T P + F P
In the above equation, F P and T P define the false- and true-positive values, respectively.

4. Results and Discussion

The cyberattack detection performance of the HBA-OHDBN technique is examined in this section using the standard NSLKDD dataset [27], comprising 148,517 samples under five classes, as summarized in Table 1.
Figure 4 shows the classification outcomes of the HBA-OHDBN algorithm under the test dataset. Figure 4a,b portray the confusion matrices generated by the HBA-OHDBN method on 60:40 of the TR set/TS set. The outcome values demonstrate that the HBA-OHDBN approach classified and detected all five classes accurately. Figure 4c,d depict the classifier outcomes of the HBA-OHDBN methodology on 60:40 of the TR set/TS set. The proposed method accomplished effective detection of all four kinds of attacks and normal instances.
The cyberattack detection output of the HBA-OHDBN technique is shown in Table 2 and Figure 5. The results highlight the effectual identification of all four kinds of attacks and normal samples. With the 60% TR set, the HBA-OHDBN technique achieved average a c c u y , p r e c n , r e c a l , F s c o r e , and A U C s c o r e values such of 99.17%, 96.09%, 75.24%, 75.83%, and 87.30%, respectively. Moreover, with the 40% TS set, the HBA-OHDBN approach achieved average a c c u y , p r e c n , r e c a l , F s c o r e , and A U C s c o r e values of 99.21%, 76.26%, 75.04%, 75.63%, and 87.21%, respectively.
Figure 6 demonstrates the training accuracy T R _ a c c u y and V L _ a c c u y values achieved via the HBA-OHDBN method. The T L _ a c c u y is determined as an estimate of the HBA-OHDBN method on the TR dataset, whereas the V L _ a c c u y is computed by evaluating the performance of the proposed method on a separate testing dataset. The outcomes demonstrate that the T R _ a c c u y and V L _ a c c u y values increased with the increase in the number of epochs. As a result, the performance of the HBA-OHDBN technique on the TR and TS datasets improved with the increase in the number of epochs.
Figure 7 shows the T R _ l o s s and V R _ l o s s   curves of the HBA-OHDBN technique. The T R _ l o s s value is defined as the error between the predictive outcome and original values of the TR data. The V R _ l o s s value measures of the outcome of the HBA-OHDBN system on individual validation data. The results indicate that the T R _ l o s s and V R _ l o s s values were reduced with the rising number of epochs. This phenomenon portrays the enhanced performance of the HBA-OHDBN technique and its ability to make accurate classifications. The minimal T R _ l o s s and V R _ l o s s values demonstrate the superior outcome of the HBA-OHDBN technique in capturing the patterns and relationships.
A detailed PR analysis was conducted via the HBA-OHDBN approach using the test database, and the results are shown in Figure 8. The simulation values depict that the HBA-OHDBN system achieved high PR values. Thus, it is clear that the HBA-OHDBN method achieved enhanced PR values on all five classes.
Figure 9 shows the ROC curve of the HBA-OHDBN approach on the test database. The simulation values indicate that the HBA-OHDBN system achieved superior ROC values. Thus, it can be inferred that the HBA-OHDBN methodology achieved a better ROC performance in all five classes.
In Table 3 and Figure 10, the results of the comparative analysis between the proposed HBA-OHDBN technique and other existing models are provided [28]. The results indicate that the HBA-OHDBN technique achieved improved performance over other models. At the same time, the NSL-KDD IoT model achieved the worst results, while the NIDS-ML, AE-MLID, DL-NIDS, and ADNT-ELM models obtained closer results. Although the remaining models achieved reasonable outcomes, the HBA-OHDBN technique outperformed the rest of the models.
Finally, the Computation Time (CT) results of the HBA-OHDBN technique are compared with recent models in Table 4 and Figure 11. The results indicate that the HBA-OHDBN technique reached effectual outcomes with a minimal CT of 0.95 s. On the other hand, the NIDS-ML, AE-MLID, NSL-KDD IoT, DL-Improved ID, DL-NIDS, ADNT-ELM, and DL-DCSCA IoT CN models attained increased CT values. Therefore, the HBA-OHDBN technique can be applied to classify the cyberattacks automatically.

5. Conclusions

In the current manuscript, the authors have presented the HBA-OHDBN system for cyberattack detection in an IoT platform. The major intention behind the HBA-OHDBN approach is to accurately recognize and classify cyberattacks in a IoT platform. The proposed HBA-OHDBN system has three stages of operations: HBA-based feature selection, HDBN-based detection, and DBO-based hyperparameter tuning. Moreover, BC technology is also applied to improve network security. In the presented HBA-OHDBN technique, feature selection using HBA was applied to elect the optimal set of features, which, in turn, led to improved results. Finally, the DBO algorithm has been utilized to adjust the hyperparameter values of the HDBN algorithm. The performance of the HBA-OHDBN system was validated using the benchmark IDS database. Our extensive results confirmed the superior performance of the HBA-OHDBN technique compared to other recent approaches. Future research work can focus on auditing and securing smart contracts in the IoT environment. In addition, advanced tools and methodologies can be developed for the identification of vulnerabilities in IoT-related smart contracts in order to ensure their resilience against cyberattacks. In addition to these, scalability challenges related to BC technology can be resolved to accommodate the growing number of IoT devices and transactions.

Author Contributions

Conceptualization, M.R.; Methodology, F.Y.A.; Software, M.R.; Validation, M.R.; Formal analysis, F.Y.A.; Investigation, M.R.; Resources, F.Y.A.; Data curation, M.R.; Writing—original draft, F.Y.A.; Writing—review & editing, M.R.; Funding acquisition, F.Y.A. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by the University of Jeddah, Jeddah, Saudi Arabia, under grant No. (UJ-23-DR-48). Therefore, the authors thank the University of Jeddah for its technical and financial support.

Data Availability Statement

Data sharing does not apply to this article as no datasets were generated during the current study.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Arya, L.; Gupta, G.P. Ensemble Filter-based Feature Selection Model for Cyber Attack Detection in Industrial Internet of Things. In Proceedings of the 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 17–18 March 2023; Volume 1, pp. 834–840. [Google Scholar]
  2. Soliman, S.; Oudah, W.; Aljuhani, A. Deep learning-based intrusion detection approach for securing industrial Internet of Things. Alex. Eng. J. 2023, 81, 371–383. [Google Scholar] [CrossRef]
  3. Das, S.; Manchala, Y.; Rout, S.K.; Kumar Panda, S. Deep Learning and Metaheuristics based Cyber Threat Detection in Internet of Things Enabled Smart City Environment. Res. Sq. 2023. preprint. [Google Scholar] [CrossRef]
  4. Popoola, S.I.; Adebisi, B.; Ande, R.; Hammoudeh, M.; Anoh, K.; Atayero, A.A. smote-drnn: A deep learning algo-rithm for botnet detection in the internet-of-things networks. Sensors 2021, 21, 2985. [Google Scholar] [CrossRef] [PubMed]
  5. Tharewal, S.; Ashfaque, M.W.; Banu, S.S.; Uma, P.; Hassen, S.M.; Shabaz, M. Intrusion detection system for indus-trial Internet of Things based on deep reinforcement learning. Wirel. Commun. Mob. Comput. 2022, 2022, 9023719. [Google Scholar] [CrossRef]
  6. Koroniotis, N.; Moustafa, N.; Turnbull, B.; Schiliro, F.; Gauravaram, P.; Janicke, H. A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments. In Proceedings of the 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China, 20–22 October 2021; pp. 887–894. [Google Scholar] [CrossRef]
  7. Katib, I.; Ragab, M. Blockchain-Assisted Hybrid Harris Hawks Optimization Based Deep DDoS Attack Detection in the IoT Environment. Mathematics 2023, 11, 1887. [Google Scholar] [CrossRef]
  8. Nasir, M.; Javed, A.R.; Tariq, M.A.; Asim, M.; Baker, T. Feature engineering and deep learning-based intrusion detection framework for securing edge IoT. J. Supercomput. 2022, 78, 8852–8866. [Google Scholar] [CrossRef]
  9. Alkahtani, H.; Aldhyani, T.H.H. Intrusion Detection System to Advance Internet of Things Infrastructure-Based Deep Learning Algorithms. Complexity 2021, 2021, 5579851. [Google Scholar] [CrossRef]
  10. Alalayah, K.M.; Alrayes, F.S.; Alzahrani, J.S.; Alaidarous, K.M.; Alwayle, I.M.; Mohsen, H.; Ahmed, I.A.; Al Duhayyim, M. Optimal Deep Learning Based Intruder Identification in Industrial Internet of Things Environment. Comput. Syst. Sci. Eng. 2023, 46, 3121–3139. [Google Scholar] [CrossRef]
  11. Asiri, M.M.; Mohamed, H.G.; Nour, M.K.; Al Duhayyim, M.; Aziz, A.S.A.; Motwakel, A.; Zamani, A.S.; Eldesouki, M.I. Hybrid Metaheuristics Feature Selection with Stacked Deep Learning-Enabled Cyber-Attack Detection Model. Comput. Syst. Sci. Eng. 2023, 45, 1679–1694. [Google Scholar] [CrossRef]
  12. Awotunde, J.B.; Chakraborty, C.; Adeniyi, A.E. Intrusion Detection in Industrial Internet of Things Network-Based on Deep Learning Model with Rule-Based Feature Selection. Wirel. Commun. Mob. Comput. 2021, 2021, 7154587. [Google Scholar] [CrossRef]
  13. Ahmad, J.; Shah, S.A.; Latif, S.; Ahmed, F.; Zou, Z.; Pitropakis, N. DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things. J. King Saud Univ. Comput. Inf. Sci. 2022, 34, 8112–8121. [Google Scholar] [CrossRef]
  14. Chander, N.; Kumar, M.U. Metaheuristic feature selection with deep learning enabled cascaded recurrent neural network for anomaly detection in Industrial Internet of Things environment. Clust. Comput. 2022, 26, 1801–1819. [Google Scholar] [CrossRef]
  15. Khacha, A.; Saadouni, R.; Harbi, Y.; Aliouat, Z. Hybrid Deep Learning-based Intrusion Detection System for Industrial Internet of Things. In Proceedings of the 2022 5th International Symposium on Informatics and its Applications (ISIA), M’sila, Algeria, 29–30 November 2022; pp. 1–6. [Google Scholar]
  16. Alabsi, B.A.; Anbar, M.; Rihan, S.D.A. CNN-CNN: Dual Convolutional Neural Network Approach for Feature Selection and Attack Detection on Internet of Things Networks. Sensors 2023, 23, 6507. [Google Scholar] [CrossRef] [PubMed]
  17. Otoum, Y.; Liu, D.; Nayak, A. DL-IDS: A deep learning–based intrusion detection framework for securing IoT. Trans. Emerg. Telecommun. Technol. 2022, 33, e3803. [Google Scholar] [CrossRef]
  18. Alohali, M.A.; Elsadig, M.; Al-Wesabi, F.N.; Al Duhayyim, M.; Hilal, A.M.; Motwakel, A. Blockchain Assisted Op-timal Machine Learning Based Cyberattack Detection and Classification Scheme. Comput. Syst. Sci. Eng. 2023, 46, 3583–3598. [Google Scholar] [CrossRef]
  19. Huma, Z.E.; Latif, S.; Ahmad, J.; Idrees, Z.; Ibrar, A.; Zou, Z.; Alqahtani, F.; Baothman, F. A Hybrid Deep Random Neural Network for Cyberattack Detection in the Industrial Internet of Things. IEEE Access 2021, 9, 55595–55605. [Google Scholar] [CrossRef]
  20. Al-Abassi, A.; Karimipour, H.; Dehghantanha, A.; Parizi, R.M. An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System. IEEE Access 2020, 8, 83965–83973. [Google Scholar] [CrossRef]
  21. Alkatheiri, M.S.; Alghamdi, A.S. Blockchain-Assisted Cybersecurity for the Internet of Medical Things in the Healthcare Industry. Electronics 2023, 12, 1801. [Google Scholar] [CrossRef]
  22. Hashim, F.A.; Houssein, E.H.; Hussain, K.; Mabrouk, M.S.; Al-Atabany, W. Honey Badger Algorithm: New me-taheuristic algorithm for solving optimization problems. Math. Comput. Simul. 2022, 192, 84–110. [Google Scholar] [CrossRef]
  23. Jin, C.; Li, S.; Zhang, L.; Zhang, D. The Improvement of the Honey Badger Algorithm and Its Application in the Location Problem of Logistics Centers. Appl. Sci. 2023, 13, 6805. [Google Scholar] [CrossRef]
  24. Yan, Y.; Yin, X.-C.; Li, S.; Yang, M.; Hao, H.-W. Learning Document Semantic Representation with Hybrid Deep Belief Network. Comput. Intell. Neurosci. 2015, 2015, 650527. [Google Scholar] [CrossRef]
  25. Xue, J.; Shen, B. Dung beetle optimizer: A new meta-heuristic algorithm for global optimization. J. Supercomput. 2022, 79, 7305–7336. [Google Scholar] [CrossRef]
  26. Tu, N.; Fan, Z. IMODBO for Optimal Dynamic Reconfiguration in Active Distribution Networks. Processes 2023, 11, 1827. [Google Scholar] [CrossRef]
  27. Canadian Institute for Cybersecurity (CIS). NSL-KDD Dataset. Available online: https://www.unb.ca/cic/datasets/nsl.html (accessed on 15 March 2022).
  28. Abu Al-Haija, Q.; Zein-Sabatto, S. An Efficient Deep-Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks. Electronics 2020, 9, 2152. [Google Scholar] [CrossRef]
Figure 1. Overall flow of the HBA-OHDBN algorithm.
Figure 1. Overall flow of the HBA-OHDBN algorithm.
Mathematics 11 04080 g001
Figure 2. Structure of the BC.
Figure 2. Structure of the BC.
Mathematics 11 04080 g002
Figure 3. DBN structure.
Figure 3. DBN structure.
Mathematics 11 04080 g003
Figure 4. Performance of the proposed HBA-OHDBN technique: (a,b) confusion matrices and (c,d) classifier outcome on 60:40 of the TR set/TS set.
Figure 4. Performance of the proposed HBA-OHDBN technique: (a,b) confusion matrices and (c,d) classifier outcome on 60:40 of the TR set/TS set.
Mathematics 11 04080 g004
Figure 5. Average values of the HBA-OHDBN algorithm on 60:40 of the TR set/TS set.
Figure 5. Average values of the HBA-OHDBN algorithm on 60:40 of the TR set/TS set.
Mathematics 11 04080 g005
Figure 6. A c c u y , curve of the HBA-OHDBN algorithm.
Figure 6. A c c u y , curve of the HBA-OHDBN algorithm.
Mathematics 11 04080 g006
Figure 7. Loss curve of the HBA-OHDBN algorithm.
Figure 7. Loss curve of the HBA-OHDBN algorithm.
Mathematics 11 04080 g007
Figure 8. PR curve of the HBA-OHDBN algorithm.
Figure 8. PR curve of the HBA-OHDBN algorithm.
Mathematics 11 04080 g008
Figure 9. ROC of the HBA-OHDBN algorithm.
Figure 9. ROC of the HBA-OHDBN algorithm.
Mathematics 11 04080 g009
Figure 10. Comparative outcomes of the HBA-OHDBN algorithm with other approaches.
Figure 10. Comparative outcomes of the HBA-OHDBN algorithm with other approaches.
Mathematics 11 04080 g010
Figure 11. CT analytical outcomes of the HBA-OHDBN algorithm with other approaches.
Figure 11. CT analytical outcomes of the HBA-OHDBN algorithm with other approaches.
Mathematics 11 04080 g011
Table 1. Description of the database.
Table 1. Description of the database.
ClassNo. of Samples
Normal77,054
DoS53,385
Probe14,410
R2L3416
U2R252
Total Samples148,517
Table 2. Cyberattack detection outcomes of the HBA-OHDBN algorithm on 60:40 of the TR set/TS set.
Table 2. Cyberattack detection outcomes of the HBA-OHDBN algorithm on 60:40 of the TR set/TS set.
Class A c c u y P r e c n R e c a l F S c o r e A U C S c o r e
TR set (60%)
Normal98.7398.7198.8598.7898.73
DoS98.9498.2198.8498.5298.92
Probe99.0094.7595.0794.9197.25
R2L99.3688.7982.8385.7191.29
U2R99.82100.0000.6201.2350.31
Average99.1796.0975.2475.8387.30
TS set (40%)
Normal98.7398.6798.8998.7898.73
DoS99.0898.4499.0198.7299.06
Probe99.0394.9094.9794.9397.21
R2L99.3789.3182.3585.6991.06
U2R99.8500.0000.0000.0050.00
Average99.2176.2675.0475.6387.21
Table 3. Comparative analysis outcomes of the HBA-OHDBN algorithm with other approaches [28].
Table 3. Comparative analysis outcomes of the HBA-OHDBN algorithm with other approaches [28].
Research A c c u y P r e c n R e c a l F S c o r e
NIDS-ML83.7070.9769.9070.24
AE-MLID85.2073.4672.3471.39
NSL-KDD IoT78.5071.9470.8671.04
DL-Improved ID94.6070.9169.1774.27
DL-NIDS88.4071.0170.2870.31
ADNT-ELM91.7073.3070.8273.95
DL-DCSCA IoT CN [26]98.2072.0172.7773.20
HBA-OHDBN99.2176.2675.0475.63
Table 4. CT analytical outcomes of the HBA-OHDBN algorithm with other approaches.
Table 4. CT analytical outcomes of the HBA-OHDBN algorithm with other approaches.
ResearchComputational Time (s)
NIDS-ML4.23
AE-MLID3.57
NSL-KDD IoT2.53
DL-Improved ID2.88
DL-NIDS1.85
ADNT-ELM2.87
DL-DCSCA IoT CN1.23
HBA-OHDBN0.95
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Assiri, F.Y.; Ragab, M. Optimal Deep-Learning-Based Cyberattack Detection in a Blockchain-Assisted IoT Environment. Mathematics 2023, 11, 4080. https://doi.org/10.3390/math11194080

AMA Style

Assiri FY, Ragab M. Optimal Deep-Learning-Based Cyberattack Detection in a Blockchain-Assisted IoT Environment. Mathematics. 2023; 11(19):4080. https://doi.org/10.3390/math11194080

Chicago/Turabian Style

Assiri, Fatmah Y., and Mahmoud Ragab. 2023. "Optimal Deep-Learning-Based Cyberattack Detection in a Blockchain-Assisted IoT Environment" Mathematics 11, no. 19: 4080. https://doi.org/10.3390/math11194080

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop