Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 14 , Issue 2 , PP: 275-286, 2024 | Cite this article as | XML | Html | PDF | Full Length Article

Detect and Prevent Attacks of Intrusion in IOT Devices using Game Theory with Ant Colony Optimization (ACO)

S. Aruna 1 * , Kalaivani .N 2 , Mohammedkasim .M 3 , D. Prabha Devi 4 , E. Babu Thirumangaialwar 5

  • 1 Assistant professor, Department of Computational Intelligence, SRM Institute of Science and Technology, Kattankulathur-603203, Tamilnadu, India - (arunas@srmist.edu.in)
  • 2 Assistant professor,Sri krishna college of Engineering and Technology, Coimbatore, India - (kalaivani@skcet.ac.in)
  • 3 Assistant Professor (SG), Department of ECE, Nehru Institute of Engineering and Technology, Coimbatore, India - (mohammedkasim1983@gmail.com)
  • 4 Assistant Professor, Department of Computer Science and Engineering, Bannari Amman Institute of Technology, Sathyamangalam. Tamil Nadu, India - (dprabha101990@gmail.com)
  • 5 Associate Professor, Department of CSE, Hindusthan Institute of Technology, Coimbatore, India - (babuthirumangaialwar@hit.edu.in)
  • Doi: https://doi.org/10.54216/JCIM.140219

    Received: January 19, 2024 Revised: March 28, 2024 Accepted: July 07, 2024
    Abstract

    A more extensive attack surface for cyber incursions has resulted from the fast expansion of Internet of Things (IoT) devices, calling for more stringent security protocols. This research introduces a new method for protecting Internet of Things (IoT) networks against intrusion assaults by combining Game Theory with Ant Colony Optimization (ACO). Various cyber dangers are becoming more common as a result of the networked nature and frequently inadequate security measures of IoT devices. Because these threats are ever-changing and intricate, traditional security measures can't keep up. An effective optimization method for allocating resources and pathfinding is provided by ACO, which takes its cues from the foraging behavior of ants, while Game Theory provides a strategic framework for modeling the interactions between attackers and defenders. Attackers and defenders in the proposed system are modeled as players in a game where the objective is to maximize their payout. Minimizing damage by anticipating and minimizing assaults is the defender's task. The monitoring pathways are optimized and resources are allocated effectively with the help of ACO. In response to changes in network conditions, the system dynamically modifies defensive tactics by updating the game model in real time. The results of the simulation show that the suggested method successfully increases the security of the Internet of Things. Compared to 87.4% using conventional approaches, the detection accuracy increased to 95.8%. From 10.5 seconds down to 7.3 seconds, the average reaction time to identified incursions was cut in half. Furthermore, there was a 20% improvement in resource utilization efficiency, guaranteeing that defensive and monitoring resources were allocated optimally. Internet of Things (IoT) network security is greatly improved by combining Game Theory with Ant Colony Optimization. In addition to enhancing detection accuracy and reaction times, this combination method guarantees resource efficiency. The results demonstrate the practicality of this approach, which offers a solid foundation for protecting Internet of Things devices from ever-changing cyber dangers.

    Keywords :

    IoT Security , Intrusion Detection , Game Theory , Ant Colony Optimization (ACO) , Cybersecurity , Network Defence

    References

    [1]          Kumar, A., Abhishek, K., Ghalib, M. R., Shankar, A., & Cheng, X. (2022). Intrusion detection and prevention system for an IoT environment. Digital Communications and Networks8(4), 540-551.

    [2]          Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J., & Alazab, A. (2019). A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks. Electronics, 8(11), 1210.

    [3]          Mishra, N., & Pandya, S. (2021). Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review. IEEE Access, 9, 59353-59377.

    [4]    Bakhsh, S. T., Alghamdi, S., Alsemmeari, R. A., & Hassan, S. R. (2019). An adaptive intrusion detection and prevention system for Internet of Things. International Journal of Distributed Sensor Networks, 15(11), 1550147719888109.

    [5]        Anthi, E., Williams, L., Słowińska, M., Theodorakopoulos, G., & Burnap, P. (2019). A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things Journal, 6(5), 9042-9053.

    [6]        Alruwaili, F. F. (2021, October). Intrusion detection and prevention in Industrial IoT: A technological survey. In 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME) (pp. 1-5). IEEE.

    [7]        Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., & Faruki, P. (2019). Network intrusion detection for IoT security based on learning techniques. IEEE Communications Surveys & Tutorials, 21(3), 2671-2701.

    [8]         Zarpelão, B. B., Miani, R. S., Kawakani, C. T., & De Alvarenga, S. C. (2017). A survey of intrusion detection in Internet of Things. Journal of Network and Computer Applications, 84, 25-37.

    [9]     Chiba, Z., Abghour, N., Moussaid, K., Lifandali, O., & Kinta, R. (2022). A deep study of novel intrusion detection systems and intrusion prevention systems for Internet of Things networks. Procedia Computer Science, 210, 94-103.

    [10]       Vaigandla, K., Azmi, N., & Karne, R. (2022). Investigation on intrusion detection systems (IDSs) in IoT. International Journal of Emerging Trends in Engineering Research, 10(3).

    [11]       Husnain, M., Hayat, K., Cambiaso, E., Fayyaz, U. U., Mongelli, M., Akram, H., & Shah, G. A. (2022). Preventing mqtt vulnerabilities using iot-enabled intrusion detection system. Sensors, 22(2), 567.

    [12]      Eskandari, M., Janjua, Z. H., Vecchio, M., & Antonelli, F. (2020). Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet of Things Journal, 7(8), 6882-6897.

    [13]       Shareena, J., Ramdas, A., & AP, H. (2021). Intrusion detection system for iot botnet attacks using deep learning. SN Computer Science, 2(3), 1-8.

    [14]     Ge, M., Fu, X., Syed, N., Baig, Z., Teo, G., & Robles-Kelly, A. (2019, December). Deep learning-based intrusion detection for IoT networks. In 2019 IEEE 24th pacific rim international symposium on dependable computing (PRDC) (pp. 256-25609). IEEE.

    [15]       Qiu, H., Dong, T., Zhang, T., Lu, J., Memmi, G., & Qiu, M. (2020). Adversarial attacks against network intrusion detection in IoT systems. IEEE Internet of Things Journal, 8(13), 10327-10335.

    [16]      Balakrishnan, N., Rajendran, A., Pelusi, D., & Ponnusamy, V. (2021). Deep Belief Network enhanced intrusion detection system to prevent security breach in the Internet of Things. Internet of things, 14, 100112.

    [17]   Ramya, P..., Chandra, Himagiri. Advanced Cyber Attack Detection Using Generative Adversarial Networks and NLP. Journal of Journal of Cybersecurity and Information Management, vol. 14, no. 2, 2024, pp. 161-172. DOI: https://doi.org/10.54216/JCIM.140211

    [18]   Muthusamy, P., A.Rajan. ,, R.Praveena. , Rajulu, Sundara. , Babu, T.R.Ganesh. , Murugan, K.Sakthi. Optimized Group-Centric Data Routing in Heterogeneous Wireless Sensor Networks for Enhanced Energy Efficiency. Journal of Journal of Cybersecurity and Information Management, vol. 14, no. 2, 2024, pp. 173-185. DOI: https://doi.org/10.54216/JCIM.140212

    Cite This Article As :
    Aruna, S.. , .N, Kalaivani. , .M, Mohammedkasim. , Prabha, D.. , Babu, E.. Detect and Prevent Attacks of Intrusion in IOT Devices using Game Theory with Ant Colony Optimization (ACO). Journal of Cybersecurity and Information Management, vol. , no. , 2024, pp. 275-286. DOI: https://doi.org/10.54216/JCIM.140219
    Aruna, S. .N, K. .M, M. Prabha, D. Babu, E. (2024). Detect and Prevent Attacks of Intrusion in IOT Devices using Game Theory with Ant Colony Optimization (ACO). Journal of Cybersecurity and Information Management, (), 275-286. DOI: https://doi.org/10.54216/JCIM.140219
    Aruna, S.. .N, Kalaivani. .M, Mohammedkasim. Prabha, D.. Babu, E.. Detect and Prevent Attacks of Intrusion in IOT Devices using Game Theory with Ant Colony Optimization (ACO). Journal of Cybersecurity and Information Management , no. (2024): 275-286. DOI: https://doi.org/10.54216/JCIM.140219
    Aruna, S. , .N, K. , .M, M. , Prabha, D. , Babu, E. (2024) . Detect and Prevent Attacks of Intrusion in IOT Devices using Game Theory with Ant Colony Optimization (ACO). Journal of Cybersecurity and Information Management , () , 275-286 . DOI: https://doi.org/10.54216/JCIM.140219
    Aruna S. , .N K. , .M M. , Prabha D. , Babu E. [2024]. Detect and Prevent Attacks of Intrusion in IOT Devices using Game Theory with Ant Colony Optimization (ACO). Journal of Cybersecurity and Information Management. (): 275-286. DOI: https://doi.org/10.54216/JCIM.140219
    Aruna, S. .N, K. .M, M. Prabha, D. Babu, E. "Detect and Prevent Attacks of Intrusion in IOT Devices using Game Theory with Ant Colony Optimization (ACO)," Journal of Cybersecurity and Information Management, vol. , no. , pp. 275-286, 2024. DOI: https://doi.org/10.54216/JCIM.140219