Next Article in Journal
Heuristics for Quantum Computing Dealing with 3-SAT
Next Article in Special Issue
Recognition of Sunflower Diseases Using Hybrid Deep Learning and Its Explainability with AI
Previous Article in Journal
Bayesian Spatial Split-Population Survival Model with Applications to Democratic Regime Failure and Civil War Recurrence
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Blockchain-Assisted Hybrid Harris Hawks Optimization Based Deep DDoS Attack Detection in the IoT Environment

1
Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia
2
Information Technology Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia
*
Author to whom correspondence should be addressed.
Mathematics 2023, 11(8), 1887; https://doi.org/10.3390/math11081887
Submission received: 28 February 2023 / Revised: 10 April 2023 / Accepted: 12 April 2023 / Published: 16 April 2023
(This article belongs to the Special Issue Advances in Communication Systems, IoT and Blockchain)

Abstract

:
The Internet of Things (IoT) is developing as a novel phenomenon that is applied in the growth of several crucial applications. However, these applications continue to function on a centralized storage structure, which leads to several major problems, such as security, privacy, and a single point of failure. In recent years, blockchain (BC) technology has become a pillar for the progression of IoT-based applications. The BC technique is utilized to resolve the security, privacy, and single point of failure (third-part dependency) issues encountered in IoT applications. Conversely, the distributed denial of service (DDoS) attacks on mining pools revealed the existence of vital fault lines amongst the BC-assisted IoT networks. Therefore, the current study designs a hybrid Harris Hawks with sine cosine and a deep learning-based intrusion detection system (H3SC-DLIDS) for a BC-supported IoT environment. The aim of the presented H3SC-DLIDS approach is to recognize the presence of DDoS attacks in the BC-assisted IoT environment. To enable secure communication in the IoT networks, BC technology is used. The proposed H3SC-DLIDS technique designs a H3SC technique by integrating the concepts of Harris Hawks optimization (HHO) and sine cosine algorithm (SCA) for feature selection. For the intrusion detection process, a long short-term memory auto-encoder (LSTM-AE) model is utilized in this study. Finally, the arithmetic optimization algorithm (AOA) is implemented for hyperparameter tuning of the LSTM-AE technique. The proposed H3SC-DLIDS method was experimentally validated using the BoT-IoT database, and the results indicate the superior performance of the proposed H3SC-DLIDS technique over other existing methods, with a maximum accuracy of 99.05%.

1. Introduction

With the evolution of the internet, the Internet of Things (IoT) has developed as an innovative technology and has penetrated the day-to-day life activities of human beings [1]. The IoT-based applications, namely RFID-based identity management systems, supply chain management and healthcare, empowering society and individuals directly. This technology has become auspicious for modeling, as well as data analysis, through a combination of machine learning (ML) and cloud computing (CC) [2] techniques. IoT-based development brings about tremendous growth in several domains. An application is typically built and run in an IoT environment based on computing architecture and centralized storage [3]. The centralized storage methods are prone to several privacy and security breaches. The basic working model will have some limitations in assisting the growth of IoT-assisted systems in the near future. Therefore, there is a need to develop a distributed storage or decentralized model to overcome such issues [4]. Blockchain (BC) technology is one of the emerging decentralization-related architectures. To deal with billions of transactions generated by IoT systems, the distributed computing process uses a point-to-point computing mechanism. This reduces the cost of storage and computing with the help of storage and computing abilities of numerous idle devices that are installed in unused places [5].
Additional protection systems should be applied to increase security to achieve safe storage and secure transmission and ensure the privacy of several individuals [6]. The BC technique is a suitable, secure, and dependable technique that can be leveraged for this purpose. Since the cost of constructing data storage and data center is high, it is not feasible to improve the existing disaster recovery system [7]. Thus, when it comes to enhancing disaster recovery capabilities, the main issue to be addressed is to reduce storage costs. BC, which links centralized and distributed services, can halt an attack successfully on vital network structures [8]. Intrusion detection systems (IDSs) have a primary task to perform, i.e., to observe the anomalous performance in a network or a host. Today, the current IDSs are not very effective in identifying the extensive range of threats. Collaborative IDs have certain abilities to at least identify a few threats and transfer it for further processing. IDSs can be categorized into two types based on where the IDSs are deployed, i.e., network-based ID systems (NIDSs) and host-based ID systems (HIDSs) [9]. By placing packet sniffers in the network, the NIDS monitors the network at different points. Such packet sniffers choose the data and transfer it to the analysis units, where a comparison is conducted between the current system and the anomaly [10]. The application of various DL methods to identify the attacks with binary classification and classify different kinds of attacks with multi-class classification, has become an active research domain.
The current study designs a hybrid Harris Hawks with sine cosine and a deep-learning-based intrusion detection system (H3SC-DLIDS) for a BC-supported IoT environment. The proposed model allows the BC technology to communicate in the IoT environment securely. In addition, the H3SC-DLIDS technique designs a H3SC technique for feature selection with the LSTM_AE model for classification. Moreover, the arithmetic optimization algorithm (AOA) is applied as a hyperparameter optimizer of the LSTM-AE method. The performance of the proposed H3SC-DLIDS technique was validated in the study using the BoT-IoT dataset. In short, some of the key contributions of the study are listed herewith.
  • A novel H3SC-DLIDS technique comprising H3SC-based feature selection, LSTM-AE-based classification and AOA-based hyperparameter tuning is presented in this study for DDoS attack detection in the IoT network. To the best of the researcher’s knowledge, no authors proposed this H3SC-DLIDS technique so far in the literature.
  • A new H3SC technique has been developed by integrating the characteristics of the HHO algorithm and SCA for an optimal selection of the features.
  • An AOA has been presented in this study with an LSTM-AE model for attack detection.
  • Hyperparameter optimization of the LSTM-AE model using the AOA algorithm and cross-validation, helps in boosting the predictive outcome of the proposed model for unseen data.
The rest of the paper is organized as follows: Section 2 provides the related works, and Section 3 offers the proposed model. Then, Section 4 details the analytical results and Section 5 concludes the paper.

2. Related Works

Heidari et al. [11] suggested a BC-based radial basis function neural networks (RBFNNs) prototype. The suggested technique can enhance the veracity of the information, as well as its repository for smart policy-making across the diverse IoDs. In this study, the authors further deliberated the enforcement of BC to generate the distributed forecasting analysis and a prototype for efficient practice and distribution of the DL techniques in a distributed manner. In the literature [12], a new peculiar IDS structure was proposed for IoT networks by employing the DL method. In particular, a screening-based aspect selection, deep neural network (DNN), prototype was the introduction, in which the tremendously associated factors were dropped. Additionally, the prototype was adjusted with several constraints and hyper-constraints.
Mansour [13] established a new poor and rich optimizing with a DL prototype for BC-enabled intrusion detection in the CPS atmosphere, abbreviated as the PRO-DLBIDCPS method. The suggested PRO-DLBIDCPS method primarily presented the Adaptive Harmony Search Algorithm (AHSA) method for the selection of the factor subsets appropriately. For invasion identification and categorization, an attention-founded bi-directional gated recurrent neural network (Bi-GRNN) prototype was enforced. In the study conducted earlier [14], the FIDChain IDS was suggested by employing the weightless ANN in a federated learning (FL) manner. This was done so to confirm the confidentiality of information in the healthcare industry and to parallelly improve the BC technology. Such a model gives a dispersed register for combining the local weights, and later distributing the enhanced worldwide weights after standardizing and averting the lethal outbreaks. This process provided complete clarity and stability over the dispersed structure, with insignificant overhead. When the recognition prototype is enforced at the edge, it safeguards the cloud in case of any outbreaks. This occurs because it stops the information from its gateway at a minimal recognition period and low processing by calculating the volume as FL pacts with lesser sets of information.
Sarhan et al. [15] suggested an ordered BC-based FL outline to develop a safe and confidentiality-conserved co-operative IoT invasion identification method. The authors also accentuated and exhibited the significance of distributing the cyber hazard intelligence amongst inter-organizational IoT networks to enhance the recognition competency of the prototype. The suggested ML-based invasion identification outline follows an ordered FL construction method to confirm the confidentiality of the education process, as well as the organizational info. The authors [16] suggested a deep blockchain framework (DBF) to accomplish security-oriented dispersed invasion identification and confidentiality-based BC with clever contracts in IoT networks. The invasion identification technique was also implemented by the BiLSTM DL protocol to pact with the chronological network info, and was evaluated by employing the info sets of BoT-IoT, as well as UNSW-NB15. In the study conducted earlier [17], an empirical intelligent agent (EIA) was developed with an exclusive Swarm-NN technique to identify the invaders in an edge-centric IoMT outline. The most significant result of the suggested policy was the identification of the outbreaks when data transfer occurred over a network and an effective analysis of the health info at the network edge with great precision.

3. The Proposed Model

In the current study, the authors have developed a new H3SC-DLIDS algorithm for the identification of DDoS attacks in the BC-assisted IoT environment. To enable secure communication in the IoT networks, BC technology is used. It comprises three stages, such as feature subset selection using the H3SC approach, LSTM-AE-based DDoS attack detection, and AOA-based parameter tuning. Figure 1 illustrates the overall procedure of the proposed H3SC-DLIDS approach.

3.1. BC Technology

To enable secure communication in the IoT networks, BC technology is used. BC technology is a decentralized P2P network, in which a registered node validates every transaction and records it in a dispersed and immutable ledger [18]. The consensus method assures the integrity of the network. Particularly, no centralized authority exists in this mechanism to validate the produced event: every single transaction must be authenticated by the BC node with the help of a mutual agreement (consensus). Some conventional types of consensuses are briefed herewith.
  • Proof-of-importance (PoI): the node that can construct a block has the maximal amount of transactions.
  • Proof-of-stake (PoS): the node with high wealth has a higher opportunity to contribute from the consensus, and constructs the block.
  • Proof-of-work (PoW): a transaction can be approved once the node accepts its P2P network.
  • Proof-of-authority (PoA): certain nodes are allowed to produce novel blocks and protect the BC. It is to be noted that the aforementioned process features potential benefits and probable disadvantages, too, primarily based on the basic P 2 P network architecture.
PoS and PoW refer to the conventional methods that are used to accomplish the consensus among the P 2 P nodes. Nevertheless, it becomes apparent that the PoS method is demonstrated for attacking, since the mining cost is approximately zero. On the other hand, the PoW method requires higher computational resources. Both PoI and PoA are effective alternatives, since both are energy-friendly and achieved improved performance. Furthermore, the BC technique presents two methods to create a network of permissioned and permission-less BCs. Particularly, the permissioned BC (private BC) limits the implementation of the tasks and access to the nodes that belong to the network. Successively, permission-less BC (public BC) enables a possible candidate to be a node and belongs to the network. The node on this BC might implement the rest of the errands, once it provides the physical capability (for instance, mine blocks, authenticate transactions, etc.). The BC technique has a proper characteristic, i.e., it is capable of selecting the levels of decentralization in a network, partially decentralized or else the completely centralized ones. To be specific, the closed permissioned BC gets completely centralized. Finally, the data stored is noticeable to the participant node, whereas the open permissioned BC is partially decentralized, since every entity can read the stored data.

3.2. Design of H3SC-Based Feature Selection

At the initial stage, the H3SC-DLIDS technique designs a new H3SC technique for feature subset selection [19]. Likewise, it is predicted to improve the solution’s quality, as well as the convergence behavior. Furthermore, the performance of a hybrid mechanism might result in generating a highly efficient search, because it greatly jumps at regular intervals in the searching area to escape from the local optimum issues. Hence, it produces several diverse solutions. In the hierarchical form of the presented H3SC technique, the bottommost layer of the SCA upgrades an individual that is generated by the HHO at the topmost layer. There exists an M HHO search agent at the topmost layer that corresponds to the bottommost layer’s M group count. All the groups in the bottommost layer comprise the N population. The implementation of the SCA, at the bottommost layer, is the early stage during the updating procedure of the novel location. Then, based on the attained optimum solution, the position of the individual is upgraded in the topmost layer. Consequently, novel equations that represent the exploitation, as well as exploration phases, are generated. The exploration stage of the H3SC technique is implemented using the mathematical expression given below.
Y t + 1 i = y rand r 2   | y rand 2 r 2 y t + r 8   s i n   r 9 × r 10 p t i y t | ,   c 0.5 & r 11 < 0.5 y r a n d r 2 y r a n d 2 r 2 y t + r 8   c o s r 9 × r 10 p t i y t ,   c 0.5 & r 11 0.5 y p r e y y m r 3 l b t + r 4 u b t l b t ,   c < 0.5  
In Equation (1), Y t + 1 i represents the position of the t t h individual from the topmost layer that is equivalent to the i t h   searching component in the bottommost layer. y t defines the position of the t th topmost layer searching agent. t denotes the existing number of iterations .   y p r e y = p i t characterizes the better location attained up to the existing iteration.   c and r 2 ,   r 3 ,   r 4 ,   r 11 indicate the random parameters. y m ,   l b , and u b denote the average mean, upper, and lower boundaries correspondingly.
r 8 = 2 t 2 T r 9 = 2 π r a n d ( ) r 10 = 2 r a n d ( )
The exploitation stage is implemented by the abovementioned besieging strategy.
Tough besiege: hawks follow this strategy to capture the prey with the lowest energy when escaping the hunt. This is represented as r 0.5 and E < 0.5 . The presented hybrid technique implements these strategies as given below.
Y t + 1 i = y p r e y E y p r e y 2 r 2 y t + r 8 sin r 9 × r 10 p i t y t ,   r 11 < 0.5 y p r e y E y p r e y 2 r 2 y t + r 8 cos r 9 × r 10 p i t y t ,   r 11 0.5  
E = 2 E 0 1 t T ,   t = 1 , 2 , 3 ,   ,   T
Tough besiege with progressive quick dives: if the prey’s energy gets depleted, this besiege is determined viz., r < 0.5 and E < 0.5
Y t + 1 i = Z   i f   F Z < F y t & y t = y t + r 8 sin r 9 × r 10 p i t y t , r 11 < 0.5 y t + r 8 cos r 9 × r 10 p i t y t , r 11 0.5 X   i f   F X < F y t & y t = y t + r 8 sin r 9 × r 10 p i t y t , r 11 < 0.5 y t + r 8 cos r 9 × r 10 p i t y t , r 11 0.5  
where Z = X + S × L F D , X = y p r e y E J y p r e y y m ,
S = R a n d o m   v e c t o r   o f   1 × D , r 7 = R a n d o m   p a r a m e t e r ,   a n d   D = D i m e n s i o n .
J = 2 1 r 7
L F D = β × u | v | 1 σ × 0.01
β = sin π σ 2 × Γ 1 + σ Γ 1 + σ 2 × σ × 2 σ 1 2
Mild besiege: this is implemented by the hawks if r 0.5 and E 0.5
Y t + 1 i = y p r e y y t + r 8 sin r 9 × r 10 p i t y t E | y p r e y 2 r 2 y t + r 8 sin r 9 × r 10 p i t y t | , r 11 < 0.5 y p r e y y t + r 8 cos r 9 × r 10 p i t y t E | y p r e y 2 r 2 y t + r 8 cos r 9 × r 10 p i t y t | , r 11 0.5
Mild besiege with progressive quick dives: here, the prey has sufficient energy E 0.5 to flee the hunt. However, the hawk generates a mild besiege r < 0.5 .
Y t + 1 i = Z   if   F Z < F y t & y t = y t + r 8   sin   r 9 × r 10 p i t y t ,   r 11 < 0.5 y t + r 8   cos   r 9 × r 10 p i t y t ,   r 11 0.5 X   i f   F X < F y t & y t = y t + r 8 sin   ( r 9 )   × r 10 p i t y t ,   r 11 < 0.5 y t + r 8   cos   r 9 × r 10 p i t y t , r 11 0.5 ,
where
Z = X + S × L F D
X = y p r e y E J y p r e y y t
In the presented method, the objective is incorporated into a single-objective equation so that the present weight recognizes every important objective [20]. A fitness function is adopted here that integrates both the objectives of FS as follows.
F i t n e s s X = α E X + β × 1 R N
In Equation (11), F i t n e s s ( X ) characterizes the fitness value of the subset X ,   E X symbolizes the classifier rate of the errors based on the features chosen in X subset, R and N represents the number of the selected and original features correspondingly,   α 0 , 1 and β = 1 α , where α and β indicate the weight of the classifier error and reduction ratio correspondingly.

3.3. Optimal LSTM-AE-Based DDoS Attack Detection

The LSTM-AE model is used for an accurate identification of DDoS attacks. AE is a class of NNs that is utilized for a competent reconstruction of unlabeled datasets [21]. The AE learns a representation of the presented data by training the network to disregard the irrelevant parts of data, for instance noise. It learns the design of the standard procedure when detecting anomalies. All other items that do not follow these patterns are categorized as anomalies. Initially, the encoder maps the input as h , i.e., hidden representation after which the decoder maps the data of the hidden space to the reconstruction of the input value. In a simple case provided with a single hidden state, the encoded step of AE, i.e., x d is mapped to h p . Employing this data is defined as latent space h , as given below.
h = σ W x + b
Here, h refers to the frequently suggested hidden space or representation. σ implies the activation function such as the ReLU activation function or sigmoid. W signifies the weighted matrix and b denotes the bias vector that is commonly initialized arbitrarily than the training progress; it can be upgraded gradually with BP. Afterwards, the decoding process obtains the hidden depiction h , which ultimately attempts to recreate the encoded input. Specifically, the decoder put efforts for mapping the hidden illustration h to recreate   x . In the preceding notation, this function is expressed.
x = σ W h + b
Here, σ denotes an activation function while b and W refer to the bias vector and weight matrix correspondingly. It is noted that x ,   σ , and b are different in their encoded counterparts. Finally, the AEs are trained to minimize the loss function and also deal with reconstruction errors. For instance, a case of reconstructing the loss can be the MSE.
L x ,   x = 1 n i = 1 n ( x x ) 2 = 1 n i = 1 n ( x σ ( W ( σ ( W x + b ) ) + b ) ) 2
LSTM-AE has been established on this univariate time series data to perform the classification. Figure 2 represents the structure of LSTM-AE model. This model is used to provide a lookback window that dictates the time series patch obtained by the network. Based on the experience, the LSTM network obtains a 2D array, with a size of n x f as input at every timestep. The dimensions of this array are related to n previous timestep, whereas the network assumes that at every input, the f feature contains the database. The LSTM layer contains several cells, as the count of time points whenever the network views back at every time t . During the order of the LSTM layer, every cell of the previous layer creates a resultant for constructing the 2D array and the subsequent layer needs.
To generate the reconstructed input, the resultant of the final LSTM layer is multiplied by the   2 D array. In effect, this array is a vector of lengths that are equivalent to the unit count from every cell of the final LSTM layer. This repeats for f times used several times as a feature count from the input. Finally, the study aims at mitigating the divergence between the input and reconstructed models, thus producing a minimum reconstruction error as determined in (3). This stipulation makes sure the reliability of the reconstructs to ground true data.
Finally, the AOA-based hyperparameter tuning process is executed to modify the hyperparameter values of the LSTM-AE model. The AOA technique exploits the distribution behaviors of the arithmetical operator at the time of calculation, namely, division (D), multiplication (M), subtraction (S), and addition (A) [22]. The presented method exploits the math-optimizer-accelerated M O A function to choose from the exploration and exploitation search stages, as expressed by Equation (15):
M O A i t e r =   Min + i t e r ×   Max     Min   Max i t e r
Here, i t e r denotes the current iteration, Max i t e r indicates the maximal amount of iterations, and   Max and   Min   indicate the maximal and minimal values of the accelerated function, correspondingly. During the exploration stage, the AOA model exploits two major approaches, such as the division (D) and multiplication (M) search processes, to search for the best solution. The novel location updating the formula for the exploration stage is presented below.
x i , j i t e r + 1 = b e s t x j ÷ M O P + × u b j l b j × μ + l b j ,   r 2 < 0.5 b e s t x j × M O P × u b j l b j × μ + l b j ,   o t h e r w i s e
In Equation (9), x i , j i t e r + 1 indicates the j - t h location of the i - t h solution during the existing iteration, and b e s t ( χ j ) represents the j - t h location in the optimum solution, and μ represents the control parameter. Here, MOP represents the math optimizer probability that is evaluated as follows:
M O P i t e r = 1 i t e r 1 α Max i t e r 1 α .
In Equation (10), α indicates a sensitive parameter. During the exploration stage, the AOA method exploits two major approaches, such as the addition (D) and the subtraction (S) search strategies, to achieve a high-dense solution.
x i , j i t e r + 1 = b e s t x j M O P × u b j l b j × μ + l b j ,   r 2 < 0.5 b e s t x j + M O P × u b j l b j × μ + l b j ,   o t h e r w i s e
Fitness choice is an essential aspect of the AOA manner. The encoder solution was employed in this study to determine the aptitude (goodness) of the candidate results. A positive integer is used to represent the better performance of the candidate solutions. In this study, the minimum classification error rate is considered to be the fitness function, as given in Equation (19).
f i t n e s s x i = n u m b e r   o f   m i s c l a s s i f i e d   s a m p l e s T o t a l   n u m b e r   o f   s a m p l e s 100

4. Results and Discussion

The proposed model was simulated using the Python 3.6.5 tool (Netherlands) on a PC configured with i5-8600k, GeForce 1050Ti 4GB, 16GB RAM, 250GB SSD, and 1TB HDD. The parameter settings are given herewith: learning rate: 0.01, dropout: 0.5, batch size: 5, epoch count: 50, and activation: ReLU.
In this section, the experimental outcomes achieved by the proposed H3SC-DLIDS approach on the BoT-IoT dataset is discussed [23]. The results were examined under two aspects, such as the binary dataset and the multiclass dataset. The binary dataset includes a total of 2056 samples under two classes, as briefed in Table 1. Next, the multiclass dataset has a total of 2056 samples under five classes, as shown in Table 2. The BoT-IoT dataset consists of network traffic data, captured using a real-time IoT network infrastructure and a variety of devices such as cameras, smart home devices, and wearable fitness trackers. The dataset includes various attack scenarios, such as DDoS attacks, port scans, and malware infections. The attacks were generated by simulating different botnet behaviors, such as Mirai, Bashlite, and IoT Reaper. The dataset contains 10 features and the presented H3SC technique selected six features.
The confusion matrix generated by the proposed H3SC-DLIDS technique under binary class is demonstrated in Figure 3. The figure highlights the efficiency of the proposed H3SC-DLIDS technique in terms of identifying 1555 attack samples and 457 normal samples.
In Table 3 and Figure 4, the overall classification results of the H3SC-DLIDS technique on the binary dataset are portrayed. The experimental values infer the productive results attained by the proposed H3SC-DLIDS technique amongboth classes. In addition, it should be noted that the H3SC-DLIDS technique reached an average a c c u b a l of 97.14%, p r e c n of 96.87%, r e c a l of 97.14%, F s c o r e of 97.01%, and an A U C s c o r e of 97.14%.
Figure 5 portrays the accuracy outcomes achieved by the proposed H3SC-DLIDS method during the training and validation processes upon the binary dataset. The figure infers that the proposed H3SC-DLIDS method accomplished high accuracy values with an increase in the number of epochs. Further, the increase in the validation accuracy values over training accuracy values reveals that the proposed H3SC-DLIDS approach learns the binary dataset efficiently.
The loss analysis was conducted upon the proposed H3SC-DLIDS method at the time of training and validation using the binary dataset and the results are shown in Figure 6. The results infer that the H3SC-DLIDS approach reached closer values of training and validation losses. The H3SC-DLIDS method can be inferred to learn the binary dataset efficiently.
The confusion matrix generated by the proposed H3SC-DLIDS method under the multiclass dataset is shown in Figure 7. The figure illustrates the efficiency of the proposed H3SC-DLIDS method in terms of the identification of 490 DDoS samples, 493 DoS samples, 490 Recon samples, 68 Theft samples, and 466 normal samples.
In Table 4 and Figure 8, the overall classification outcomes of the proposed H3SC-DLIDS algorithm on the multiclass dataset are displayed. The experimental values infer the effectual outcomes of the presented H3SC-DLIDS approach among both classes. Further, the H3SC-DLIDS technique yielded an average a c c u b a l of 99.05%, p r e c n of 96.65%, r e c a l of 95.67%, F s c o r e of 96.14%, and an A U C s c o r e of 97.53%.
Figure 9 exhibits the accuracy outcomes of the H3SC-DLIDS method during the training and validation processes using the multiclass dataset. The results represent the H3SC-DLIDS approach reaching high accuracy values with an increase in the number of epochs. Further, the increase in the validation accuracy values over training accuracy values demonstrates that the H3SC-DLIDS methodology learns the multiclass dataset effectively.
The loss analysis was conducted for the H3SC-DLIDS approach during the training and validation phases using the multiclass dataset and the results are shown in Figure 10. The figure emphasizes that the H3SC-DLIDS algorithm reaches closer values of training and validation losses. The H3SC-DLIDS method was proven to learn the multiclass dataset efficiently.
Figure 11 reveals the classification results of the H3SC-DLIDS method under binary and multiclass datasets. Figure 11a–c shows the PR analysis outcomes of the H3SC-DLIDS method under binary and multiclass datasets. The figures infer that the proposed H3SC-DLIDS approach gained a maximum PR performance under all the classes. Eventually, Figure 11b–d exemplifies the ROC examination results achieved by the proposed H3SC-DLIDS method under binary and multiclass datasets. The figure depicts that the H3SC-DLIDS methodology has potential outcomes with higher ROC values under distinct class labels.
A comparative analysis was conducted between the proposed H3SC-DLIDS method and other methods, and the results are shown in Table 5 and Figure 12 [24,25]. The experimental values infer that the DT model accomplished a poor performance over other approaches. Next, the IDS-IoT, XGBoost and RF methods reached closer classification results.
Contrastingly, the AE-MLP model produced a reasonable outcome. Nevertheless, the H3SC-DLIDS technique outperformed all other models with a maximum a c c u y of 99.05%, p r e c n of 96.65%, r e c a l of 95.67%, and a F s c o r e of 96.14%. The results infer that the H3SC-DLIDS technique can achieve effectual results compared to other techniques.

5. Conclusions

In this study, the authors have established a novel H3SC-DLIDS methodology for the identification of DDoS attacks in the BC-assisted IoT environment. To enable secure communication within IoT networks, BC technology is used. In this study, the H3SC-DLIDS technique designs a new H3SC technique for the feature selection process, by combining the concepts of HHO and SCA techniques. For the intrusion detection process, the LSTM-AE model is used. At the final stage, the AOA is used for the hyperparameter tuning of the LSTM-AE system. The experimental performance of the H3SC-DLIDS system was validated using two datasets, such as the BoT-IoT dataset and the multiclass dataset. The outcomes indicate the superior performance of the proposed H3SC-DLIDS algorithm over other existing algorithms. In the future, the performance of the H3SC-DLIDS method can be improved by implementing ensemble fusion-based DL methods.

Author Contributions

Conceptualization, I.K.; Methodology, M.R.; Software, I.K.; Validation, M.R.; Investigation, I.K.; Writing—original draft, I.K.; Writing—review & editing, M.R.; Supervision, I.K.; Visualization, M.R.; Funding acquisition, I.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research work was funded by the Institutional Fund Projects under grant no. (IFPIP: 495-611-1443). Therefore, the authors gratefully acknowledge the technical and financial support provided by the Ministry of Education and Deanship of Scientific Research (DSR), King Abdulaziz University (KAU), Jeddah, Saudi Arabia.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing is not applicable to this article, as no datasets were generated during the current study.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Saveetha, D.; Maragatham, G. Design of Blockchain enabled intrusion detection model for detecting security attacks using deep learning. Pattern Recognit. Lett. 2022, 153, 24–28. [Google Scholar] [CrossRef]
  2. Hamouda, D.; Ferrag, M.A.; Benhamida, N.; Seridi, H. PPSS: A privacy-preserving secure framework using blockchain-enabled federated deep learning for Industrial IoTs. Pervasive Mob. Comput. 2022, 88, 101738. [Google Scholar] [CrossRef]
  3. Shah, H.; Shah, D.; Jadav, N.K.; Gupta, R.; Tanwar, S.; Alfarraj, O.; Tolba, A.; Raboaca, M.S.; Marina, V. Deep Learning-Based Malicious Smart Contract and Intrusion Detection System for IoT Environment. Mathematics 2023, 11, 418. [Google Scholar] [CrossRef]
  4. Wang, Z.; Jiang, D.; Lv, Z.; Song, H. A Deep Reinforcement Learning based Intrusion Detection Strategy for Smart Vehicular Networks. In Proceedings of the IEEE INFOCOM 2022-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Virtual, 2–5 May 2022; pp. 1–6. [Google Scholar]
  5. Kumar, R.; Kumar, P.; Tripathi, R.; Gupta, G.P.; Kumar, N.; Hassan, M.M. A privacy-preserving-based secure framework using blockchain-enabled deep-learning in the cooperative intelligent transport system. IEEE Trans. Intell. Transp. Syst. 2021, 23, 16492–16503. [Google Scholar] [CrossRef]
  6. Ragab, M.; Sabir, M.F.S. Outlier detection with optimal hybrid deep learning enabled intrusion detection system for ubiquitous and smart environment. Sustain. Energy Technol. Assess. 2022, 52, 102311. [Google Scholar] [CrossRef]
  7. Medhane, D.V.; Sangaiah, A.K.; Hossain, M.S.; Muhammad, G.; Wang, J. Blockchain-enabled distributed security framework for next-generation IoT: An edge cloud and software-defined network-integrated approach. IEEE Internet Things J. 2020, 7, 6143–6149. [Google Scholar] [CrossRef]
  8. Al-Shammari, N.K.; Syed, T.H.; Syed, M.B. An Edge–IoT framework and prototype based on blockchain for smart healthcare applications. Eng. Technol. Appl. Sci. Res. 2021, 11, 7326–7331. [Google Scholar] [CrossRef]
  9. Alghamdi, A.; Zhu, J.; Yin, G.; Shorfuzzaman, M.; Alsufyani, N.; Alyami, S.; Biswas, S. Blockchain Empowered Federated Learning Ecosystem for Securing Consumer IoT Features Analysis. Sensors 2022, 22, 6786. [Google Scholar] [CrossRef]
  10. Biswas, S.; Sharif, K.; Li, F.; Nour, B.; Wang, Y. A scalable blockchain framework for secure transactions in IoT. IEEE Internet Things J. 2018, 6, 4650–4659. [Google Scholar] [CrossRef]
  11. Heidari, A.; Navimipour, N.J.; Unal, M. A Secure Intrusion Detection Platform Using Blockchain and Radial Basis Function Neural Networks for Internet of Drones. IEEE Internet Things J. 2023; in press. [Google Scholar] [CrossRef]
  12. Sharma, B.; Sharma, L.; Lal, C.; Roy, S. Anomaly based network intrusion detection for IoT attacks using deep learning technique. Comput. Electr. Eng. 2023, 107, 108626. [Google Scholar] [CrossRef]
  13. Mansour, R.F. Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment. Sci. Rep. 2022, 12, 12937. [Google Scholar] [CrossRef] [PubMed]
  14. Ashraf, E.; Areed, N.F.; Salem, H.; Abdelhay, E.H.; Farouk, A. Fidchain: Federated intrusion detection system for blockchain-enabled iot healthcare applications. Healthcare 2022, 10, 1110. [Google Scholar] [CrossRef]
  15. Sarhan, M.; Lo, W.W.; Layeghy, S.; Portmann, M. HBFL: A hierarchical blockchain-based federated learning framework for collaborative IoT intrusion detection. Comput. Electr. Eng. 2022, 103, 108379. [Google Scholar] [CrossRef]
  16. Alkadi, O.; Moustafa, N.; Turnbull, B.; Choo, K.K.R. A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks. IEEE Internet Things J. 2020, 8, 9463–9472. [Google Scholar] [CrossRef]
  17. Nandy, S.; Adhikari, M.; Khan, M.A.; Menon, V.G.; Verma, S. An intrusion detection mechanism for secured IoMT framework based on swarm-neural network. IEEE J. Biomed. Health Inform. 2021, 26, 1969–1976. [Google Scholar] [CrossRef] [PubMed]
  18. Ragab, M.; Altalbe, A. A Blockchain-based architecture for enabling cybersecurity in the internet-of-critical infrastructures. CMC-Comput. Mater. Contin. 2022, 72, 1579–1592. [Google Scholar] [CrossRef]
  19. Abdulrab, H.Q.; Hussin, F.A.; Ismail, I.; Assaad, M.; Awang, A.; Shutari, H.; Devan, P.A.M. Hybrid Harris Hawks with Sine Cosine for Optimal Node Placement and Congestion Reduction in an Industrial Wireless Mesh Network. IEEE Access 2023, 11, 2500–2523. [Google Scholar] [CrossRef]
  20. Mafarja, M.; Thaher, T.; Al-Betar, M.A.; Too, J.; Awadallah, M.A.; Abu Doush, I.; Turabieh, H. Classification framework for faulty-software using enhanced exploratory whale optimizer-based feature selection scheme and random forest ensemble learning. Appl. Intell. 2023, 53, 1–43. [Google Scholar] [CrossRef]
  21. Spandonidis, C.; Theodoropoulos, P.; Giannopoulos, F. A Combined Semi-Supervised Deep Learning Method for Oil Leak Detection in Pipelines Using IIoT at the Edge. Sensors 2022, 22, 4105. [Google Scholar] [CrossRef]
  22. Elkasem, A.H.; Kamel, S.; Hassan, M.H.; Khamies, M.; Ahmed, E.M. An Eagle Strategy Arithmetic Optimization Algorithm for Frequency Stability Enhancement Considering High Renewable Power Penetration and Time-Varying Load. Mathematics 2022, 10, 854. [Google Scholar] [CrossRef]
  23. Koroniotis, N.; Moustafa, N.; Sitnikova, E.; Turnbull, B. Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Gener. Comput. Syst. 2019, 100, 779–796. [Google Scholar] [CrossRef]
  24. Kumar, R.; Kumar, P.; Tripathi, R.; Gupta, G.P.; Garg, S.; Hassan, M.M. A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network. J. Parallel Distrib. Comput. 2022, 164, 55–68. [Google Scholar] [CrossRef]
  25. Liu, T.; Sabrina, F.; Jang-Jaccard, J.; Xu, W.; Wei, Y. Artificial Intelligence-Enabled DDoS Detection for Blockchain-Based Smart Transport Systems. Sensors 2022, 22, 32. [Google Scholar] [CrossRef] [PubMed]
Figure 1. Overall procedure of the H3SC-DLIDS algorithm.
Figure 1. Overall procedure of the H3SC-DLIDS algorithm.
Mathematics 11 01887 g001
Figure 2. The architecture of the LSTM-AE model.
Figure 2. The architecture of the LSTM-AE model.
Mathematics 11 01887 g002
Figure 3. Confusion matrix of the H3SC-DLIDS approach on a binary dataset.
Figure 3. Confusion matrix of the H3SC-DLIDS approach on a binary dataset.
Mathematics 11 01887 g003
Figure 4. Average results of the H3SC-DLIDS approach on a binary dataset.
Figure 4. Average results of the H3SC-DLIDS approach on a binary dataset.
Mathematics 11 01887 g004
Figure 5. Accuracy curve of the H3SC-DLIDS approach on a binary dataset.
Figure 5. Accuracy curve of the H3SC-DLIDS approach on a binary dataset.
Mathematics 11 01887 g005
Figure 6. Loss curve of the H3SC-DLIDS approach on a binary dataset.
Figure 6. Loss curve of the H3SC-DLIDS approach on a binary dataset.
Mathematics 11 01887 g006
Figure 7. Confusion matrix of the H3SC-DLIDS approach on multiclass dataset.
Figure 7. Confusion matrix of the H3SC-DLIDS approach on multiclass dataset.
Mathematics 11 01887 g007
Figure 8. Average results of the H3SC-DLIDS approach on the multiclass dataset.
Figure 8. Average results of the H3SC-DLIDS approach on the multiclass dataset.
Mathematics 11 01887 g008
Figure 9. Accuracy curve of the H3SC-DLIDS approach on multiclass dataset.
Figure 9. Accuracy curve of the H3SC-DLIDS approach on multiclass dataset.
Mathematics 11 01887 g009
Figure 10. Loss curve of the H3SC-DLIDS approach on multiclass dataset.
Figure 10. Loss curve of the H3SC-DLIDS approach on multiclass dataset.
Mathematics 11 01887 g010
Figure 11. Binary dataset of (a) the PR curve and (b) ROC curve. Multiclass dataset (c) PR curve and (d) ROC curve.
Figure 11. Binary dataset of (a) the PR curve and (b) ROC curve. Multiclass dataset (c) PR curve and (d) ROC curve.
Mathematics 11 01887 g011
Figure 12. Comparative analysis results of the H3SC-DLIDS approach and other systems.
Figure 12. Comparative analysis results of the H3SC-DLIDS approach and other systems.
Mathematics 11 01887 g012
Table 1. Details of the binary dataset.
Table 1. Details of the binary dataset.
BoT-IoT Binary Dataset
ClassNo. of Instances
Attack1579
Normal477
Total Number of Samples2056
Table 2. Details of the multiclass dataset.
Table 2. Details of the multiclass dataset.
BoT-IoT Multiclass Dataset
ClassNo. of Instances
DDoS500
DoS500
Recon500
Theft79
Normal477
Total Number of Instances2056
Table 3. Classification results of the H3SC-DLIDS approach on a binary dataset.
Table 3. Classification results of the H3SC-DLIDS approach on a binary dataset.
Class A c c u b a l P r e c n R e c a l F s c o r e A U C s c o r e
Attack98.48%98.73%98.48%98.60%97.14%
Normal95.81%95.01%95.81%95.41%97.14%
Average97.14%96.87%97.14%97.01%97.14%
Table 4. Classification results of the proposed H3SC-DLIDS approach on the multiclass dataset.
Table 4. Classification results of the proposed H3SC-DLIDS approach on the multiclass dataset.
Class A c c u b a l P r e c n R e c a l F s c o r e A U C s c o r e
DDoS98.98%97.80%98.00%97.90%98.65%
DoS99.12%97.82%98.60%98.21%98.95%
Recon98.88%97.42%98.00%97.71%98.58%
Theft99.17%91.89%86.08%88.89%92.89%
Normal99.08%98.31%97.69%98.00%98.59%
Average99.05%96.65%95.67%96.14%97.53%
Table 5. Comparative analysis results of the proposed H3SC-DLIDS technique and other systems.
Table 5. Comparative analysis results of the proposed H3SC-DLIDS technique and other systems.
Methods A c c u b a l P r e c n R e c a l F s c o r e
H3SC-DLIDS99.05%96.65%95.67%96.14%
AE-MLP Model98.19%95.91%93.31%95.13%
IDS-IoT Model97.40%95.80%94.90%95.53%
XGBoost Model97.09%94.28%92.13%95.05%
RF Model97.00%94.98%93.69%94.57%
DT Model95.21%92.43%92.51%93.26%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Katib, I.; Ragab, M. Blockchain-Assisted Hybrid Harris Hawks Optimization Based Deep DDoS Attack Detection in the IoT Environment. Mathematics 2023, 11, 1887. https://doi.org/10.3390/math11081887

AMA Style

Katib I, Ragab M. Blockchain-Assisted Hybrid Harris Hawks Optimization Based Deep DDoS Attack Detection in the IoT Environment. Mathematics. 2023; 11(8):1887. https://doi.org/10.3390/math11081887

Chicago/Turabian Style

Katib, Iyad, and Mahmoud Ragab. 2023. "Blockchain-Assisted Hybrid Harris Hawks Optimization Based Deep DDoS Attack Detection in the IoT Environment" Mathematics 11, no. 8: 1887. https://doi.org/10.3390/math11081887

APA Style

Katib, I., & Ragab, M. (2023). Blockchain-Assisted Hybrid Harris Hawks Optimization Based Deep DDoS Attack Detection in the IoT Environment. Mathematics, 11(8), 1887. https://doi.org/10.3390/math11081887

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop