Enhanced Intrusion Detection in IoT with a Novel PRBF Kernel and Cloud Integration
Received: 7 May 2024 | Revised: 18 May 2024 | Accepted: 19 May 2024 | Online: 3 June 2024
Corresponding author: Bhargavi Mopuru
Abstract
The proliferation of Internet of Things (IoT) devices in various sectors has increased the need for robust security solutions capable of addressing complex network vulnerabilities and sophisticated cyber threats. This study introduces a novel architecture that integrates cloud computing with advanced machine learning techniques to provide efficient and scalable security in IoT systems. A unique Polynomial Radial Basis Function (PRBF) kernel is proposed to enhance the classification accuracy of Support Vector Machine (SVM) beyond traditional Gaussian and polynomial kernels. This study compares the proposed PRBF-SVM with Logistic Regression, SVM, and XGBoost models, optimized through rigorous hyperparameter tuning, to demonstrate significant improvements in detection rates. Furthermore, the integration of cloud services facilitates the offloading of computationally intensive tasks, ensuring scalability and real-time response capabilities. The results highlight the superior performance of the proposed model in accuracy, efficiency, and computation time, making a compelling case for its application in safeguarding IoT environments against evolving threats.
Keywords:
cloud assisted IoT security as a service, Intrusion Detection System (IDS), machine learning, SVMs, kernel functionsDownloads
References
G. S. Mahmood, D. J. Huang, and B. A. Jaleel, "Achieving an Effective, Confidentiality and Integrity of Data in Cloud Computing," International Journal of Network Security, vol. 21, no. 2, pp. 326–332, Mar. 2019.
O. Saeed and R. Shaikh, "A user-based trust model for cloud computing environment," International Journal of Advanced Computer Science and Applications, vol. 9, no. 3, pp. 337–346, 2018.
F. Anindra, A. N. Hidayanto, and H. Prabowo, "Critical Components of Security Framework for Cloud Computing Community: A Systematic Literature Review," International Journal of Pure and Applied Mathematics, vol. 118, no. 18, pp. 3345–3358, 2018.
G. Thamilarasu and S. Chawla, "Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things," Sensors, vol. 19, no. 9, Jan. 2019, Art. no. 1977.
S. Rajendran and R. Mary Lourde, "Security Threats of Embedded Systems in IoT Environment," in Inventive Communication and Computational Technologies, 2020, pp. 745–754.
B. Ali and A. I. Awad, "Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes," Sensors, vol. 18, no. 3, Mar. 2018, Art. no. 817.
A. Verma and V. Ranga, "Machine Learning Based Intrusion Detection Systems for IoT Applications," Wireless Personal Communications, vol. 111, no. 4, pp. 2287–2310, Apr. 2020.
S. Javaid, H. Afzal, M. Babar, F. Arif, Z. Tan, and M. Ahmad Jan, "ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System," IEEE Access, vol. 7, pp. 19616–19630, 2019.
G. Cornetta and A. Touhafi, "Design and Evaluation of a New Machine Learning Framework for IoT and Embedded Devices," Electronics, vol. 10, no. 5, Jan. 2021, Art. no. 600.
R. Elhabob, Y. Zhao, N. Eltayieb, A. M. S. Abdelgader, and H. Xiong, "Identity-based encryption with authorized equivalence test for cloud-assisted IoT," Cluster Computing, vol. 23, no. 2, pp. 1085–1101, Jun. 2020.
M. Alsharif and D. B. Rawat, "Study of Machine Learning for Cloud Assisted IoT Security as a Service," Sensors, vol. 21, no. 4, Jan. 2021, Art. no. 1034.
A. J. Siddiqui and A. Boukerche, "Adaptive ensembles of autoencoders for unsupervised IoT network intrusion detection," Computing, vol. 103, no. 6, pp. 1209–1232, Jun. 2021.
C. SaiTeja and J. B. Seventline, "A hybrid learning framework for multi-modal facial prediction and recognition using improvised non-linear SVM classifier," AIP Advances, vol. 13, no. 2, Feb. 2023, Art. no. 025316.
G. P. Gupta, "Security Issues and Its Countermeasures in Examining the Cloud-Assisted IoT," in Examining Cloud Computing Technologies Through the Internet of Things, IGI Global, 2018, pp. 91–115.
R. Gorle and A. Guttavelli, "A novel dynamic image watermarking technique with features inspired by quantum computing principles," AIP Advances, vol. 14, no. 4, Apr. 2024, Art. no. 045024.
D. Roman, A. J. Berre, and J. Langlois, "Model as a Service (MaaS)," presented at the AGILE workshop: Grid technologies for geospatial applications, Hanover, Germany, Jun. 2009.
A. Iacovelli, C. Souveyet, and C. Rolland, "Method as a Service (MaaS)," in 2008 Second International Conference on Research Challenges in Information Science, Marrakech, Morocco, Jun. 2008, pp. 371–380.
N. A. Alsharif, S. Mishra, and M. Alshehri, "IDS in IoT using Machine Learning and Blockchain," Engineering, Technology & Applied Science Research, vol. 13, no. 4, pp. 11197–11203, Aug. 2023.
P. Mullangi et al., "Assessing Real-Time Health Impacts of outdoor Air Pollution through IoT Integration," Engineering, Technology & Applied Science Research, vol. 14, no. 2, pp. 13796–13803, Apr. 2024.
Downloads
How to Cite
License
Copyright (c) 2024 Bhargavi Mopuru, Yellamma Pachipala
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.