Volume 14 , Issue 1 , PP: 102-113, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
B. Sowmya 1 * , Nagendra Muthuluru 2
Doi: https://doi.org/10.54216/JISIoT.140108
Internet of Things (IoT) devices are more attractive towards various vulnerable activities and nodes are easily compromised by attackers. The complexity of insecure IoT node installation relies on device heterogeneity and resource constraints because of the network ends and conventional endpoints. This work concentrates on modeling an efficient IoT-based preservation model () which is a lightweight approach used for detecting anomaly and performance various analyses at the endpoints. This work integrates linear Support Vector Machine for pattern analysis and adaptive fuzzy rule model for data pattern rule generation to examine malicious network functionality and network traffic. While adopting the rules, the compromised node needs to fulfill the generated rules; when it fails then it is considered as malicious activity. Then, the models impose network access restrictions on the compromised and terminate the further process. Thus, the nodes are prevented from further network attacks. The evaluation model is done with the use of an online available network dataset and the dataset samples are evaluated in the complex network scenario. The simulation is done in MATLAB 2020a simulation environment and the accuracy attained with this model is higher compared to other approaches. Similarly, other metrics like False Alarm Rate (FAR) are evaluated for predicting malicious network functionality. The significance of the model is evaluated based on the prediction and mitigation of various network attacks. The anticipated model shows a prediction rate of 90.21% for DoS attacks, 89.13% for R2L, 91.65% for probe, and 93.56% for U2R attacks.
Internet of Things , Malicious activities , Security , Attack, Fuzzy rule model , Pattern analysis
[1] Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the Internet of Things: perspectives and challenges,” Wireless Networks, vol. 20, pp. 2481–2501, 2014
[2] S. Hemamalini ,V. D. Ambeth Kumar ,R. Venkatesan,S. Malathi. (2023). Relevance Mapping based CNN model with OSR-FCA Technique for Multi-label DR Classification. Journal of Fusion: Practice and Applications, 11 ( 2 ), 90-110.
[3] C. S. Manigandaa,V. D. Ambeth Kumar,G. Ragunath,R. Venkatesan,N. Senthil Kumar. (2023). De-Noising and Segmentation of Medical Images using Neutrophilic Sets. Journal of Fusion: Practice and Applications, 11 ( 2 ), 111-123.
[4] HaddadPajouh, A Dehghantanha, R Khayami, KK Choo, "A deep Recurrent Neural Network-based approach for Internet of Things malware threat hunting", Future Generation Computer Systems, vol. 85, pp. 88–96, 2018.
[5] Pajouh, R. Javidan, R. Khayami, D. Ali, and K. K. R. Choo, “A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks," IEEE Transactions on Emerging Topics in Computing, vol. PP, no. 99, pp. 1–1, 2016.
[6] Kumar, V.D.A., Sharmila, S., Kumar, A. et al. (2023). A novel solution for finding postpartum haemorrhage using fuzzy neural techniques. Neural Comput & Applic. 35(33), 23683–23696
[7] Hodo, X. J. A. Bellekens, A. Hamilton, C. Tachtatzis, and R. C. Atkinson, “Shallow and deep networks intrusion detection system: A taxonomy and survey,” CoRR, vol. abs/1701.02145, 2017.
[8] Sathya Preiya, V., and V. D. Ambeth Kumar. (2023). Deep Learning-Based Classification and Feature Extraction for Predicting Pathogenesis of Foot Ulcers in Patients with Diabetes. Diagnostics 13(12), 1983.
[9] Ma, F Wang, J Cheng, Y Yu, and X Chen, "A hybrid spectral clustering and deep neural network ensemble algorithm for intrusion detection in sensor networks," in Sensors vol. 16, no. 10, 2016.
[10] C Yin, Y Zhu, J Fei, and X He, "A deep learning approach for intrusion detection using recurrent neural networks," in IEEE Access vol. 5 pp. 21954-21961, 2017
[11] Hemamalini, Selvamani, and Visvam Devadoss Ambeth Kumar. (2022). Outlier Based Skimpy Regularization Fuzzy Clustering Algorithm for Diabetic Retinopathy Image Segmentation. Symmetry, 14(12), 2512.
[12] Abolhasanzadeh, “Nonlinear dimensionality reduction for intrusion detection using auto-encoder bottleneck features,” in 2015 7th Conference on Information and Knowledge Technology (IKT), Urmia, Iran, pp. 1–5, 2015.
[13] Tan, W. Huang, and Q. Li, “An intrusion detection method based on DBN in ad hoc networks,” in International Conference on Wireless Communication and Sensor Network, Wuhan, China, pp. 477–485, 2016
[14] Alghuried, “A Model for Anomalies Detection in Internet of Things (IoT) Using Inverse Weight Clustering and Decision Tree,” Masters dissertation, Dublin Institute of Technology, 2017.
[15] S.M.H. Bamakan, H. Wang, Y. Tian, Y. Shi, An effective intrusion detection framework based on mclp/svm optimized by time-varying chaos particle swarm optimization, Neurocomputing 199 (2016) 90–102
[16] Ambeth Kumar, V.D. Vaishali,S. Shweta, B. (2015). Basic Study of the Human Foot. Biomedical and Pharmacology, 8(1), 435-444.
[17] Piyush K. Pareek, Pixel Level Image Fusion in Moving objection Detection and Tracking with Machine Learning “,Fusion: Practice and Applications, Volume 2 , Issue 1 , PP: 42-60, 2020
[18] Shivam Grover, Kshitij Sidana, Vanita Jain, “Egocentric Performance Capture: A Review”, Fusion: Practice and Applications, Volume 2, Issue 2 , PP: 64-73, 2020.
[19] Abdel Nasser H. Zaied, Mahmoud Ismail and Salwa El- Sayed, A Survey on Meta-heuristic Algorithms for Global Optimization Problems, Journal of Intelligent Systems and Internet of Things,Volume 1 , Issue 1 , PP: 48-60, 2020
[20] Kumar, I., Kumar, A., Kumar, V.D.A. et al. (2022) Dense Tissue Pattern Characterization Using Deep Neural Network. Cogn Comput 14, 1728–1751.
[21] Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, ''Deep learning approach for network intrusion detection in software-defined networking,'' in Proc. Int. Conf. Wireless Netw. Mobile Commun. (WINCOM), Oct. 2016, pp. 258–263
[22] Tavallaee, E. Bagheri, W. Lu, and A. A. A. Ghorbani, ‘‘A detailed analysis of the KDD CUP 99 data set,’’ in Proc. IEEE Symp. Comput. Intell. Secure. Defense Appl., Jul. 2009, pp. 1–6.
[23] Bhattacharjee, A. K. M. Fujail, and S. A. Begum, ‘‘Intrusion detection system for NSL-KDD data set using vectorized fitness function in genetic algorithm,’’ Adv. Comput. Sci. Technol., vol. 10, no. 2, pp. 235–246, 2017.
[24] Martens and I. Sutskever, ‘‘Learning recurrent neural networks with hessian-free optimization,’’ presented at the 28th Int. Conf. Int. Conf. Mach. Learn., Bellevue, WA, USA, Jul. 2011, pp. 1033–1040.
[25] Kim, N. Shin, S. Y. Jo, and S. H. Kim, “Method of intrusion detection using deep neural network,” in Proc. IEEE Int. Conf. Big Data Smart Comput., Hong Kong, China, Feb. 2017, pp. 313–316.
[26] Paulauskas and J. Auskalnis, ‘‘Analysis of data pre-processing influence on intrusion detection using NSL-KDD dataset,’’ in Proc. Open Conf. Elect., Electron. Inf. Sci. (eStream), Apr. 2017, pp. 1–5.
[27] Garcia Cordero, S. Hauke, M. Muhlhauser, and M. Fischer, “Analyzing flow-based anomaly intrusion detection using replicator neural networks,” in Proc. 14th Annu. Conf. Privacy, Security. Trust, Auckland, New Zeland, Dec. 2016, pp. 317–324
[28] Kang and J.-W. Kang, “Intrusion detection system using deep neural network for in-vehicle network security,” PLoS One, vol. 11, no. 6, Jun. 2016, Art. no. e0155781.
[29] Wang, W.-D. Cai, and P.-C. Wei, “A deep learning approach for detecting malicious JavaScript code,” Security Commun. Netw., vol. 9, no. 11, pp. 1520–1534, Jul. 2016.
[30] Chang, W. Li, and Z. Yang, “Network intrusion detection based on random forest and support vector machine,” in Proc. IEEE Int. Conf. Comput. Sci. Eng./IEEE Int. Conf. Embedded Ubiquitous Comput., Jul. 2017, pp. 635–638.