iconOpen Access

ARTICLE

crossmark

Machine Learning Based Cybersecurity Threat Detection for Secure IoT Assisted Cloud Environment

by Z. Faizal Khan1, Saeed M. Alshahrani2,*, Abdulrahman Alghamdi2, Someah Alangari3, Nouf Ibrahim Altamami4, Khalid A. Alissa5, Sana Alazwari6, Mesfer Al Duhayyim7, Fahd N. Al-Wesabi8

1 Department of Computer Engineering, College of Computing and Information Technology, Shaqra University, Shaqra, Saudi Arabia
2 Department of Computer Science, College of Computing and Information Technology, Shaqra University, Shaqra, Saudi Arabia
3 Department of Computer Science, College of Science and Humanities Dawadmi, Shaqra University, Shaqra, Saudi Arabia
4 Department of Mathematics, College of Education, Shaqra University, Shaqra, Saudi Arabia
5 Saudi Aramco Cybersecurity Chair, Networks and Communications Department, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam, 31441, Saudi Arabia
6 Department of Information Technology, College of Computers and Information Technology, Taif University, Taif P.O. Box 11099, Taif, 21944, Saudi Arabia
7 Department of Computer Science, College of Sciences and Humanities-Aflaj, Prince Sattam bin Abdulaziz University, Alaflaj, 16828, Saudi Arabia
8 Department of Computer Science, College of Science & Art at Mahayil, King Khalid University, Saudi Arabia

* Corresponding Author: Saeed M. Alshahrani. Email: email

Computer Systems Science and Engineering 2023, 47(1), 855-871. https://doi.org/10.32604/csse.2023.036735

Abstract

The Internet of Things (IoT) is determine enormous economic openings for industries and allow stimulating innovation which obtain between domains in childcare for eldercare, in health service to energy, and in developed to transport. Cybersecurity develops a difficult problem in IoT platform whereas the presence of cyber-attack requires that solved. The progress of automatic devices for cyber-attack classifier and detection employing Artificial Intelligence (AI) and Machine Learning (ML) devices are crucial fact to realize security in IoT platform. It can be required for minimizing the issues of security based on IoT devices efficiently. Thus, this research proposal establishes novel mayfly optimized with Regularized Extreme Learning Machine technique called as MFO-RELM model for Cybersecurity Threat classification and detection from the cloud and IoT environments. The proposed MFO-RELM model provides the effective detection of cybersecurity threat which occur in the cloud and IoT platforms. To accomplish this, the MFO-RELM technique pre-processed the actual cloud and IoT data as to meaningful format. Besides, the proposed models will receive the pre-processing data and carry out the classifier method. For boosting the efficiency of the proposed models, the MFO technique was utilized to it. The experiential outcome of the proposed technique was tested utilizing the standard CICIDS 2017 dataset, and the outcomes are examined under distinct aspects.

Keywords


1  Introduction

The Internet of Things (IoT) is central to digital transformation in several industrial sectors [1]. Owing to the pervasive nature of such gadgets and due to the simplicity of observing and controlling gadgets from distant places, there occurs a fast advancement in framing various new applications in numerous fields like connected industrial and manufacturing sensors and equipment, smart home devices, health monitoring gadgets, energy management gadgets, wearable devices, etc. [2,3]. The main concern in the IoT network was managing the device’s security and data protection from assaults. Cyber-attacks were unauthorized access or intentional exploitation of infrastructures or information of other organizations or individuals [4]. Protection of IoT gadgets from assaults becomes a problem because of the heterogeneity of protocols and gadgets, direct exposure of gadgets to the internet, and resource limits on devices. The mitigation method presented for IT networks does not suit the IoT atmosphere, and some Machine Learning (ML) techniques were advanced for detecting assaults based on IoT traffic paradigms [5,6]. ML techniques will be appropriate since they can be implemented in several applications like anomaly detection (AD), data classification, and clustering [7].

Several research works are focused on solving the security problems and difficulties of cloud computing (CC) and IoT by utilizing a lightweight authentication procedure, the data security searching and sharing of cloud-related IoT [8]. They could operate the consistency and accuracy of IoT data for its complete lifetime [9]. Thus, these cyber-attacks should be solved for safe IoT usage [10]. Subsequently, massive efforts to manage the security problems in the IoT method were made recently. Another cyber threat was malware. Malware or malicious software has software which can be fixed on a computer for disrupting their function and damage electrical data. Trojan horses, viruses, spyware, ransomware, malvertising, worms, and adware are important malware forms [11]. Malign intrusions on the computer network and gadgets were other cyber-attack to cyberspace. Such intrusions were utilized for identifying and scanning the susceptibilities of a computer system or network [12]. An intrusion detection system (IDS) can be utilized for protecting beside such intrusion [13]. ML has become the most effective and basic technique for competing with cyber-attacks and solving the limits of predictable security mechanisms. Disdain has all its charms, and ML methods have their limitations and constraints. ML is a subclass of AI [14]. The captivating superiority of ML methods was that ML methods did not program explicitly since they could mechanically learn from their experience for generating the outcomes.

This paper designs a novel mayfly optimized with Regularized Extreme Learning Machine approach called as MFO-RELM model, for cybersecurity threat classifier and detection in the cloud and IoT environments. The proposed MFO-RELM model primarily pre-processes the actual cloud and IoT data as to meaningful format. Besides, the proposed methodology will receive the pre-processing data and carry out the classifier system using the RELM model. For boosting the efficiency of the proposed models, the MFO algorithms are utilized to it. High-accurate simulations and several scenarios of experiments will be performed. The experimental validation of the presented systems will be tested utilizing standard databases in several features.

2  Related Works

Kumar et al. [15] introduced an intellectual cyber-attack detection mechanism for IoT systems with the use of a new hybrid feature minimized technique. This method initially executes feature ranking utilizing correlation co-efficient, RF, mean diminishing accuracy, and gaining ratio for gaining 3 distinct feature sets. After, features were integrated through the usage of a suitable devised system (AND operations), for gaining a single optimizer feature set. At last, the gained diminish feature sets were given to 3 renowned ML techniques like RF, K-NN, and XGBoost, for detecting cyberattacks. In [16], the cognitive ML-enabled attack detection structure was devised for sharing medical data securely. The healthcare CPS is efficient in dispersing the accumulated data to cloud storage. ML approaches forecast cyber-attack behaviour in the healthcare decision support system. In [17], the authors sightsee an assault and AD method based on ML approaches like KNN, LR, RF, SVM, ANN, and DT for defending against and mitigating IoT cybersecurity menaces in smart cities. Or otherwise, prevailing studies that concentrate on one classifier, the authors even sightsee ensemble approaches such as stacking, bagging and boosting for enhancing the activity of the detection mechanism.

A decentralized system of security was offered in [18] utilizing a SDN compiled with blockchain (BC) for IoT in fog and mobile edge computing. The SDN incessantly analyses and observes the traffic of a system to offer an assault recognition approach. The BC was leveraged for overcoming the failure problems faced in the current techniques by distributing a decentralized attack recognition technique that identifies assaults in fog and minimizes it in edge nodes. In [19], the authors rendered the complete advancement of novel intellectual and autonomous DL-related classification and detection mechanism for cyber threats in IoT transmission network which uses the power of CNN is named IoT-IDCS-CNN (IoT related intrusion detection and classifier mechanism utilizing CNN). The presented IoT-IDCS-CNN uses higher efficiency computing which uses the powerful Compute Unified Device Architecture (CUDA) related parallel processing and Nvidia GPUs that uses high-speed I9-core-related Intel CPUs.

Elsisi et al. [20] present a compiled IoT structure for managing the issue of cyber-attacks related to an advanced DNN having a rectified linear unit for providing secure and reliable online observation for automated guided vehicle (AGV). The advanced IoT structure related to a DNN introduced a novel technique for network monitoring of AGVs towards cyberattacks with an easy and cheap application as an alternative to conventional cyberattack detection techniques. This DNN can be well-trained related to new AGV data that indicate the AGV’s real state and various kinds of cyber-attacks involving a sinusoidal attack, random assault, pulse assault, and ramp assault that can be inserted by attacker as to internet network. In [21], the authors devise a technique utilizing advanced DL for recognizing cyberattacks in IoT systems. To be Specific, this technique compiles an LSTM set modules into a collective of detectors. Such elements were compiled utilizing a DT for arriving at a combined output at the last phase.

3  The Proposed Model

In this work, a novel MFO-RELM model was introduced for cyber-attack detection and classification in the cloud-enabled IoT platform. The proposed MFO-RELM model provides the effective identification of cybersecurity attacks which occur from the cloud and IoT platforms. Fig. 1 represents the overall workflow of the MFO-RELM system.

images

Figure 1: Workflow of MFO-RELM system

3.1 Data Normalization

Firstly, the MFO-RELM approach pre-processed the actual cloud and IoT data into a meaningful format. Raw information for the analysis can sometimes be unsuitable for a set of statistical tests, and to be capable of using those statistical tests and to raise the performance of the analysis, and we should make some modifications to the raw information. Such modifications are named data conversion, which is mathematical modelling used to change parameters that don’t follow the statistical assumption of uniform linearity, scattering, and normality, or have a pattern with unusual outliers.

Amongst them, data normalized has higher efficacy. Normalization has distinct statistical meaning, the simple usage is to normalize variables or data, and is a technique that puts information in a similar field once they are not. In other words, a data miner may encounter conditions whereby the property of the information involves viz., various domains or ranges. The larger-value features could have a larger impact on the cost function than the lowest feature values. These problems can be overcome by normalizing the properties so that the values are in the same range. While creating a Meta model from the information, beforehand model training initiates, the information is divided into large values to be normalized to values amongst [0, 1] to minimalize the impact of the full scale and have nearly every input in a similar range.

The min-max technique is the simplest and most popular normalization approach in medicinal imaging [22]. In the study, the unifying data scale, data changing edges would be distributed within [0, 1]. By assuming attribute X, mapping from the dataset among Xmin and Xmax, the min-max normalization (Xnorm) can be accomplished as follows:

Xnorm=XXminXmaxXmin.(1)

3.2 RELM-Based Cyber Threat Detection

At this stage, the proposed model will receive the pre-processing data and carry out the classifier procedure using the RELM model. For achieving a robust solution to the network resultant weight Wout in terms of perturbations to data representation from the ELM space, it can resolve the subsequent optimized problems [23]:

𝒥=argWoutminWoutTϕTF2,(2)

subject to: WoutTφi=WoutTφ~i,m,i=1,,N,m=1,,M,(3)

whereas φ~i,mRL refers to the perturbed copy of φi. Specifically, it will be similar to learned network resultant weight, which generates network outcomes of perturbed instances φ~ that is as nearby as feasible to the network outcomes to the original instances φi, that is, WoutTφ~i,m=o~i,m0i=WoutTφi, but (simultaneously) the network trained error is as lower as feasible.

An identical technique was exploited in AEs, controlling to suppose that De-noising AEs. In recent times, it can also be demonstrated that an identical manner is used to train FFNNs. In any case, it can be demonstrated that the implementation of perturbed instances is a result of the regularization of the attained network parameters that improve the generalized capability of trained networks and controls to optimum generalized performances. For incorporating such a regularization manner in Backpropagation (BP) based network training, the training set has generally developed by creating arbitrary perturbations of trained data as the network resultant weights are attained dependent upon closed procedure solution. Fig. 2 showcases the framework of ELM.

images

Figure 2: Architecture of ELM

The perturbed instance φ~i,m was attained by copying the jth element of φi with probability equivalent to p, or by setting the equivalent element corresponding to 0 with probability identical to (1p). This procedure is formulated as φ~i,m=bi,mφi, whereas bi,mRL, taking their elements equivalent to one with probability p, or zero with probability (1p) and refers to the element-wise product of 2 vectors. With setting φi,m=φiφ~i,m, the constraint Eq. (3) is interchanged with the succeeding one:

WoutTφi,m=0, i=1, , N, m=1, , M.(4)

By replacing Eqs. (4) with (2) and taking the corresponding dual problem, it can be attained:

𝒥D=argWoutminWoutTΦTF2+cMm=1MWoutTΦmF2,(5)

whereas  Φm=[φ1,m, , φN,m]. In Eq. (5), the network resultant weighted were achieved as:

Wout=(ΦΦT+cm=1MΦmΦmT)1ΦTT.(6)

Therefore, for calculating the network resultant weighted by utilizing the presented regularized technique, it can enrich our dataset with the addition of M arbitrary perturbations of all the samples (once demonstrated from the ELM space). But this technique is simply executed from the small- and medium-scale problems, it can be applied to large-scale, complex problems. But, it can be assumed that the count of utilized perturbations is higher  (M), dependent upon the weak law of huge numbers the regularized term R=1Mm=1mΦmΦmT in Eq. (6) converges to their estimated value:

RE[1Mm=1MΦmΦmT]M=(ΦΦT)P,(7)

In which P=(1p)21+(1p)2I and 1RL×L is a matrix of ones. Utilizing Eqs. (7), (6) are formulated as:

Wout=(ΦΦT+c[ΦΦT]P)1ΦTT=([ΦΦT][1+cP])1ΦTT.(8)

So, it is detected that either the time or memory complexity of presented regularization ELM is similar to ELM and RELM.

3.3 MFO-Based Parameter Optimization

For boosting the efficiency of the proposed models, the MFO technique is utilized to it. The mayflies in a swarm for the MFO approach are classified into male and female individuals [24]. Also, male mayflies are often the strongest ones, and therefore, they are well performed in optimization. Based on individual swarming in the PSO approach, the individuals in the MFO method upgrade the location based on the current location pi(t) and velocity vi(t) at the existing iteration:

pi(t+1)=pi(t)+vi(t+1)(9)

Every female and male mayfly upgrades its position based on the above equation. However, the velocity gets upgraded in different ways.

Movement of male mayfly

Male mayfly in swarming executes exploration or exploitation processes in iteration. The velocity is upgraded according to the existing fitness value f(xi) and the past optimum fitness value in trajectories  f(xhi). When f(xi)>f(xhi), then the male mayfly upgrades the velocity based on the present velocity, as well as the distance between them and the optimum global locations, the past optimum trajectories:

vi(t+1)=gvi(t)+a1eβrp2[xhixi(t)]+a2eβrq2, [xgxi(t)](10)

In Eq. (10), g indicates a variable that linearly declined from the highest value to the lowest one. a1, a2, and β symbolize 2 constants to balance the value. RP and rg specify 2 variables applied for Cartesian distance betwixt the individuals and past and global optimum position in the swarm:

||xixj||=k=1n(xikxjk)2(11)

On the other hand, if f(xi)<f(xhi), the male mayfly upgrades the velocity from the present one using a random dance co-efficient d:

vi(t+1)=gvi(t)+dr1(12)

In Eq. (12), r1 symbolizes the random number in uniform distribution and selected from the range −1 and 1.

Movement of female mayfly

The female will upgrade the velocity based on different styles. Generally, the female mayfly with wings lives for 1 to 7 days at the most. Therefore the female mayfly would be onrush to find the male mayfly to mate and reproduce itself. In the MFO method, the optimum male and female mayflies are treated as the 1st mate, and 2nd optimum female male mayfly is processed as 2nd mate, etc. therefore, for i-th females, when f(yi)<f(xi):

vi(t+1)=gvi(t)+a3eβrmf2[xi(t)yi(t)](13)

In Eq. (13), a3 indicates an additional constant and is exploited to balance the velocity. rm shows the Cartesian distance amongst themselves. At the same time, when (yi)<f(xi), the female mayfly upgrades the velocity from the present one using random dance fl:

vi(t)=gvi(t)+flr2(14)

Consider r2 indicates a uniformly distributed random number within [−1, 1].

Mating of mayfly

Every male and female mayfly was mated and provided a pair of childrens. The offspring is established randomly from the parent:

offspring1=Lmale+(1L)female(15)

offspring2=Lfemale+(1L)male(16)

Now, L indicates the random value in the Gauss distribution. The MFO approach initiates with the initialization of female and male mayfly populations. Next, the velocity and solution of the mayfly are upgraded. Then, the ranking procedure of mayfly is performed, and the worst solution will be replaced with the optimal solution. The MFO approach makes extraction of a Fitness Function (FF) for achieving enriched classifier result. It ascertains positive values for denoting enhanced outcomes of the candidate result. During this work, the decrease of the classifier rate of errors were regarded as the FF is given in Eq. (17).

fitness(xi)=ClassifierErrorRate(xi)=number of misclassified samples Total number of samples100(17)

4  Results and Discussion

The presented method was simulated utilizing Python 3.6.5 tool on GeForce 1050Ti 4 GB, PC i5-8600k, 250 GB SSD, 1TB HDD, and 16 GB RAM. The parameter setting are provided as follows: epoch count: 50, rate of learning: 0.01, batch size: 5, activation: ReLU, and dropout: 0.5. The simulation outcome of the MFO-RELM approach was tested using CICIDS 2017 dataset under two aspects: binary classification and multi-classification. Table 1 depicts the details of the binary classification dataset. The presented technique was simulated utilizing the Python tool.

images

Fig. 3 represents the confusion matrix generated by the MFO-RELM algorithm on the binary classifier of the CICIDS 2017 database. With the entire database, the MFO-RELM model has recognized 79254 instances into the normal class and 217611 instances into the abnormal class. Also, with 70% of TRS, the MFO-RELM approach has recognized 55520 instances into the normal class and 152308 instances into the abnormal class. Meanwhile, with 30% of TSS, the MFO-RELM system has recognized 23734 instances into the normal class and 65303 instances into the abnormal class.

imagesimages

Figure 3: Confusion matrices of MFO-RELM system under binary database (a) entire database,(b) 70% of TRS, and (c) 30% of TSS

Table 2 and Fig. 4 report the binary classifier result of the MFO-RELM model. On the entire database, the MFO-RELM approach has obtainable average accuracy of 99.14%, Precn of 98.69%, recal of 99.11%, Fscore of 98.90%, and MCC of 97.81%. Additionally, on 70% of TRS, the MFO-RELM approach has a reachable average accuracy of 99.15%, Precn of 98.71%, recal of 99.13%, Fscore of 98.92%, and MCC of 97.84%. Similarly, on 30% of TSS, the MFO-RELM algorithm has an accessible average accuracy of 99.11%, Precn of 98.66%, recal of 99.09%, Fscore of 98.87%, and MCC of 97.74%.

images

images

Figure 4: Average outcome of the MFO-RELM system under binary database

The TACC and VACC acquired by the MFO-RELM system on binary dataset are displayed in Fig. 5. The performance outcome stated that the MFO-RELM algorithm had obtained enhanced values of TACC and VACC. In specific, the VACC considered that higher than TACC.

images

Figure 5: TACC and VACC outcome of MFO-RELM system under binary dataset

The TLS and VLS attained by the MFO-RELM methodology on binary dataset are depicted in Fig. 6. The performance outcome pointed out that the MFO-RELM method has achieved minimal values of TLS and VLS. In certain, the VLS is lower than TLS.

images

Figure 6: TLS and VLS outcome of MFO-RELM system under binary database

Table 3 demonstrates a detailed description of the multi-classification dataset. Fig. 7 demonstrates the confusion matrix generated by the MFO-RELM method under the multi-classification of the CICIDS 2017 dataset. With the entire database, the MFO-RELM system has detection 78227 samples in the N class, 3 samples in the A1 class, 1894 samples in the A2 class, 21395 samples in the A3 class, 25248 samples in the A4 class, 19029 samples in A5 class, 8134 samples into A6 class, 7181 samples into A7 class, 36981 samples into A8 class, 39105 samples into A9 class, and 38833 samples into A10 class.

images

images

Figure 7: Confusion matrices of MFO-RELM system on multiclass database (a) entire database,(b) 70% of TRS, and (c) 30% of TSS

Table 4 and Fig. 8 report the multi-classification outcome of the MFO-RELM technique. On the entire database, the MFO-RELM approach has obtainable average accuracy of 98.58%, Precn of 82.52%, recal of 77.21%, Fscore of 76.28%, and MCC of 76.86%. Moreover, on 70% of TRS, the MFO-RELM system has offered average accuracy of 98.58%, Precn of 82.83%, recal of 77.17%, Fscore of 76.25%, and MCC of 76.80%. Lastly, on 30% of TSS, the MFO-RELM system has an existing average accuracy of 98.58%, Precn of 82.52%, recal of 77.21%, Fscore of 76.28%, and MCC of 76.86%.

images

images

Figure 8: Average analysis of the MFO-RELM approach under a multiclass database

Table 5 and Fig. 9 showcase the MFO-RELM approach with existing methods on binary classification. The simulation values inferred that the MFO-RELM algorithm had shown enhanced performance over other models. The XGB model has shown ineffectual performance with minimal accuracy of 94.56%. In addition, the RF and ANN models have obtained certainly improved accuracy values of 97.92% and 97.86%, respectively. Moreover, the Rearguard, NB-SVM, and DBN models have reached reasonable accuracy of 98.95%, 98.48% and 98.73%, respectively. But the MFO-RELM model has shown superior performance with increased accuracy of 99.15%.

images

images

Figure 9: Comparative outcome of MFO-RELM system under binary database

Fig. 10 demonstrates the MFO-RELM approach with existing techniques on multiclass classification. The experimental values inferred that the MFO-RELM system had demonstrated higher performance over other techniques. The RF approach has exhibited ineffectual performance with minimal accuracy of 96.39%. Besides, the Support Vector Classifier (SVC) and ANN systems have obtained higher accuracy values of 96.91% and 97.37%, respectively. Furthermore, the Rearguard, multilayer perceptron (MLP), and XGB models have obtained reasonable accuracy of 98.16%, 97.69% and 97.87%, correspondingly. Finally, the MFO-RELM technique has portrayed superior performance with enhanced accuracy of 98.58%.

images

Figure 10: Comparative outcome of the MFO-RELM system on multiclass database

5  Conclusion

In this work, a novel MFO-RELM model was introduced for cyber-attack detection and classification in the cloud-enabled IoT platform. The proposed MFO-RELM model provides the effective identification of cybersecurity attacks which occur from the cloud and IoT platforms. In order to realize this, the MFO-RELM approach pre-processed the actual cloud and IoT data as to meaningful format. Also, the proposed approach will receive the pre-processing data and carry out the classifier system using the RELM model. For boosting the efficiency of the proposed models, the MFO technique will be utilized to it. A series of simulations were carried out on CICIDS 2017 dataset and the outcomes are inspected with respect to various measures. A widespread comparison study portrayed the enhanced performance of the proposed model. Thus, the presented MFO-RELM model accomplishes maximum detection efficiency over other existing models. In future, advanced DL approaches are combined as to the MFO-RELM system for improved classifier efficacy. Besides, the computation complexity of the MFO-RELM approach was investigated in future.

Funding Statement: The authors extend their appreciation to the deanship of scientific research at Shaqra University for funding this research work through the project number (SU-NN-202210).

Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

References

1. V. Dutta, M. Choraś, M. Pawlicki and R. Kozik, “A deep learning ensemble for network anomaly and cyber-attack detection,” Sensors, vol. 20, no. 16, pp. 4583, 2020. [Google Scholar] [PubMed]

2. S. Lysenko, K. Bobrovnikova, V. Kharchenko and O. Savenko, “IoT Multi-vector cyberattack detection based on machine learning algorithms: Traffic features analysis, experiments, and efficiency,” Algorithms, vol. 15, no. 7, pp. 239, 2022. [Google Scholar]

3. M. A. Alohali, F. N. Al-Wasabi, A. M. Hilal, S. Goel, D. Gupta et al., “Artificial intelligence enabled intrusion detection systems for cognitive cyber-physical systems in industry 4.0 environment,” Cognitive Neurodynamics, vol. 16, no. 5, pp. 1045–1057, 2022. [Google Scholar] [PubMed]

4. Y. N. Soe, Y. Feng, P. I. Santosa, R. Hartanto and K. Sakurai, “Rule generation for signature-based detection systems of cyber attacks in IoT environments,” Bulletin of Networking, Computing, Systems, and Software, vol. 8, no. 2, pp. 93–97, 2019. [Google Scholar]

5. A. Abdulrahman Albraikan, S. Ben Haj Hassine, S. Mohamed Fati, F. N. Al-Wasabi, A. Mustafa Hilalet al., “Optimal deep learning-based cyberattack detection and classification technique on social networks,” Computers, Materials & Continua, vol. 72, no. 1, pp. 907–923, 2022. [Google Scholar]

6. M. Shafiq, Z. Tian, A. K. Bashir, X. Du and M. Guizani, “orrAUC: A malicious bot-IoT traffic detection method in IoT network using machine-learning techniques,” IEEE Internet of Things Journal, vol. 8, no. 5, pp. 3242–3254, 2020. [Google Scholar]

7. H. Hameed, F. Yang, S. U. Bazai, M. I. Ghafoor, A. Alshehri et al., “Urbanization detection using LiDAR-based remote sensing images of Azad Kashmir using novel 3D CNNs,” Journal of Sensors, 2022. https://doi.org/10.1155/2022/6430120 [Google Scholar] [CrossRef]

8. M. I. Ghafoor, M. S. Roomi, M. Aqeel, U. Sadiq and S. U. Bazai, “Multi-features classification of SMD screen in smart cities using randomised machine learning algorithms,” in 2021 2nd Int. Informatics and Software Engineering Conf. (IISEC), Ankara, Turkey, pp. 1–5, 2021. [Google Scholar]

9. A. Al-Qarafi, F. Alrowais, S. Alotaibi, N. Nemri, F. N. Al-Wasabi et al., “Optimal machine learning based privacy-preserving blockchain assisted internet of things with smart cities environment,” Applied Sciences, vol. 12, no. 12, pp. 1–17, 2022. [Google Scholar]

10. W. Wang, F. Harrow, B. Bouyeddou, S. M. Senouci and Y. Sun, “A stacked deep learning approach to cyber-attacks detection in industrial systems: Application to power system and gas pipeline systems,” Cluster Computing, vol. 25, no. 1, pp. 561–578, 2022. [Google Scholar] [PubMed]

11. E. Bout, V. Loscri and A. Gallais, “How machine learning changes the nature of cyberattacks on IoT networks: A survey,” IEEE Communications Surveys & Tutorials, vol. 24, no. 1, pp. 248–279, 2021. [Google Scholar]

12. C. Iwendi, S. U. Rehman, A. R. Javed, S. Khan and G. Srivastava, “Sustainable security for the internet of things using artificial intelligence architectures,” ACM Transactions on Internet Technology, vol. 21, no. 3, pp. 1–22, 2021. [Google Scholar]

13. Y. N. Soe, Y. Feng, P. I. Santosa, R. Hartanto and K. Sakurai, “Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features,” Electronics, vol. 9, no. 1, pp. 144, 2020. [Google Scholar]

14. A. Derhab, M. Guerroumi, A. Gumaei, L. Maglaras, M. A. Ferran et al., “Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security,” Sensors, vol. 19, no. 14, pp. 3119, 2019. [Google Scholar] [PubMed]

15. P. Kumar, G. P. Gupta and R. Tripathi, “Toward design of an intelligent cyber attack detection system using hybrid feature reduced approach for IoT networks,” Arabian Journal for Science and Engineering, vol. 46, no. 4, pp. 3749–3778, 2021. [Google Scholar]

16. A. A. AlZubi, M. Al-Mariah and A. Alarifi, “Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques,” Soft Computing, vol. 25, no. 18, pp. 12319–12332, 2021. [Google Scholar]

17. M. M. Rashid, J. Kamruzzaman, M. M. Hassan, T. Imam and S. Gordon, “Cyberattacks detection in IoT-based smart city applications using machine learning techniques,” International Journal of Environmental Research and Public Health, vol. 17, no. 24, pp. 9347, 2020. [Google Scholar] [PubMed]

18. D. G. Roy and S. N. Srirama, “A blockchain-based cyber attack detection scheme for decentralized internet of things using software-defined network,” Software: Practice and Experience, vol. 51, no. 7, pp. 1540–1556, 2021. [Google Scholar]

19. Q. A. A. Haija and S. Z. Sabato, “An efficient deep-learning-based detection and classification system for cyber-attacks in IoT communication networks,” Electronics, vol. 9, no. 12, pp. 2152, 2020. [Google Scholar]

20. M. Elsisi and M. Q. Tran, “Development of an IoT architecture based on a deep neural network against cyber-attacks for automated guided vehicles,” Sensors, vol. 21, no. 24, pp. 8467, 2021. [Google Scholar] [PubMed]

21. M. Saharkhizan, A. Azmoodeh, A. Dehghantanha, K. K. R. Choo and R. M. Parizi, “An ensemble of deep recurrent neural networks for detecting IoT cyber attacks using network traffic,” IEEE Internet of Things Journal, vol. 7, no. 9, pp. 8852–8859, 2020. [Google Scholar]

22. A. Pandey and A. Jain, “Comparative analysis of KNN algorithm using various normalization techniques,” International Journal of Computer Network and Information Security, vol. 9, no. 11, pp. 36, 2017. [Google Scholar]

23. D. Gupta, B. B. Hazarika and M. Berlin, “Robust regularized extreme learning machine with asymmetric Huber loss function,” Neural Computing and Applications, vol. 32, no. 16, pp. 12971–12998, 2020. [Google Scholar]

24. R. M. Adnan, O. Kisi, R. R. Mostafa, A. N. Ahmed and A. El-Shafie, “The potential of a novel support vector machine trained with modified mayfly optimization algorithm for streamflow prediction,” Hydrological Sciences Journal, vol. 67, no. 2, pp. 161–174, 2022. [Google Scholar]


Cite This Article

APA Style
Faizal Khan, Z., Alshahrani, S.M., Alghamdi, A., Alangari, S., Altamami, N.I. et al. (2023). Machine learning based cybersecurity threat detection for secure iot assisted cloud environment. Computer Systems Science and Engineering, 47(1), 855-871. https://doi.org/10.32604/csse.2023.036735
Vancouver Style
Faizal Khan Z, Alshahrani SM, Alghamdi A, Alangari S, Altamami NI, Alissa KA, et al. Machine learning based cybersecurity threat detection for secure iot assisted cloud environment. Comput Syst Sci Eng. 2023;47(1):855-871 https://doi.org/10.32604/csse.2023.036735
IEEE Style
Z. Faizal Khan et al., “Machine Learning Based Cybersecurity Threat Detection for Secure IoT Assisted Cloud Environment,” Comput. Syst. Sci. Eng., vol. 47, no. 1, pp. 855-871, 2023. https://doi.org/10.32604/csse.2023.036735


cc Copyright © 2023 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 790

    View

  • 576

    Download

  • 0

    Like

Share Link