Next Article in Journal
Kernel-Free Quadratic Surface Minimax Probability Machine for a Binary Classification Problem
Previous Article in Journal
Molecular Dynamics Simulation of Tolman Length and Interfacial Tension of Symmetric Binary Lennard–Jones Liquid
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

IoT Botnet Detection Using Salp Swarm and Ant Lion Hybrid Optimization Model

1
King Abdullah II School of Information Technology, The University of Jordan, Amman 11942, Jordan
2
Security Engineering Lab, Computer Science Department, Prince Sultan University, Riyadh 11586, Saudi Arabia
*
Author to whom correspondence should be addressed.
Symmetry 2021, 13(8), 1377; https://doi.org/10.3390/sym13081377
Submission received: 7 July 2021 / Revised: 23 July 2021 / Accepted: 23 July 2021 / Published: 28 July 2021
(This article belongs to the Topic Applied Metaheuristic Computing)

Abstract

:
In the last decade, the devices and appliances utilizing the Internet of Things (IoT) have expanded tremendously, which has led to revolutionary developments in the network industry. Smart homes and cities, wearable devices, traffic monitoring, health systems, and energy savings are typical IoT applications. The diversity in IoT standards, protocols, and computational resources makes them vulnerable to security attackers. Botnets are challenging security threats in IoT devices that cause severe Distributed Denial of Service (DDoS) attacks. Intrusion detection systems (IDS) are necessary for safeguarding Internet-connected frameworks and enhancing insufficient traditional security countermeasures, including authentication and encryption techniques. This paper proposes a wrapper feature selection model (SSA–ALO) by hybridizing the salp swarm algorithm (SSA) and ant lion optimization (ALO). The new model can be integrated with IDS components to handle the high-dimensional space problem and detect IoT attacks with superior efficiency. The experiments were performed using the N-BaIoT benchmark dataset, which was downloaded from the UCI repository. This dataset consists of nine datasets that represent real IoT traffic. The experimental results reveal the outperformance of SSA–ALO compared to existing related approaches using the following evaluation measures: TPR (true positive rate), FPR (false positive rate), G-mean, processing time, and convergence curves. Therefore, the proposed SSA–ALO model can serve IoT applications by detecting intrusions with high true positive rates that reach 99.9% and with a minimal delay even in imbalanced intrusion families.

1. Introduction

A set of connected devices that use a wireless connection to communicate, sense, compute, process, share, and store information over the Internet defines the new technology trend Internet of Things (IoT). IoT is a set of connected devices, including electronic, physical objects, and embedded objects, that communicate through the Internet without human intervention (machine-to-machine). Recently, there has been a massive proliferation in the number of connected devices in IoT. The expected number of connected objects in 2021 is 13.8 billion, and it is expected to jump to 30.9 billion by 2025 (https://www.statista.com/statistics/1101442/iot-number-of-connected-devices-worldwide/ (accessed on 8 March 2021)). IoT applications are strongly connected to humans’ daily lives, including the areas of health, agriculture, fleet management, hospitality, and many others.
IoT is characterized by low computational memory, battery, streaming bandwidth, and processing unit. Due to these characteristics, IoT becomes more susceptible to security breaches. The plug-and-play facility of IoT devices and the original passwords from their manufacturers make them more attractive to brute-force and botnet attacks. Other issues that increase the vulnerability of IoT to software and hardware security threats are the heterogeneity and scalability with other interconnected networks.
IoT devices attacked by malicious software are compromised by a botnet. This botnet is created by brute-forcing techniques or weak credential exploitation to compromise the victim device [1]. Once the device is compromised, the attacker gains control by downloading malicious binaries to enrol into the IoT botnet [2,3].
In general, three main layers encompass IoT: perception, transportation, and the application layers. Each layer applies different standards, making it easier to be attacked by different security breaches. Specifically, the transportation layer includes several technologies for communication, so it can be attacked by denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks. Five years ago, a remarkable DDoS attack occurred involving the Dyn (https://www.kaspersky.com/blog/attack-on-dyn-explained/13325/ (accessed on 26 October 2016)) domain name service provider. This attack launched the Mirai botnet to flood the servers, disrupt many functionalities, and stop the services of many websites, including Twitter, CNN, PayPal, and Netflix. Intrusions threaten mainly the system’s confidentiality, integrity, availability, and authenticity. Traditional security countermeasures, including authentication protocols and encryption techniques, might not be sufficient to provide acceptable security levels for the highly scalable and interconnected IoT. Many emergent protection technologies work against these intrusions, such as blockchain, fog, and cloud computing technology. However, these technologies still have shortcomings related to time latency and scalability issues [4]. Intrusion detection systems (IDSs) are essential and crucial for IoT. In this solution, hardware and software are used to monitor the network and discover malicious behaviors. Typically, there are different types of IDSs, which could be based on statistics, machine learning, or others [5,6,7,8,9,10,11].
IDSs consist of three primary components: the sensing component to gather the information from the environment and the analysis and reporting components. In the analysis components, different intelligent data mining techniques help to process the massive volume of monitored data and capture the abnormal and malicious patterns. Therefore, the analysis component is the smart component in IDS that deploys smart and lightweight security models to protect the network.
IoT involves many connected devices with a high amount of collected high-dimensional data. Such colossal data need data mining techniques to process them, including feature selection (FS) [12].
FS is a data mining technique used to distinguish irrelevant and symmetrical features that may reduce the classifier’s performance. FS contributes to reducing the dimensionality, enhancing the classification performance, and even reducing the training time. Using traditional search techniques, such as exhaustive search, yields exponential running time. Thus, if a dataset has N features, the size of the entire feature space is 2 N . This is practically impossible, especially with a medium and large number of features. Different search methods have been investigated in recent years, but most of them have suffered from the local minima. Recently, metaheuristic algorithms have been applied widely and efficiently for the optimization of the FS problem and have achieved promising results [13].
This work proposes a hybrid model using a salp swarm algorithm (SSA) and ant lion optimization (ALO). The new model is called SSA–ALO, which integrates the power points of both algorithms into one method. The hybridization exploits the ability to search globally (exploration) of the ALO and the ability to search locally by the SSA, consequently achieving a balance between global search and local search of feature space and increasing the opportunity to reach the optimal solution (best asymmetrical features subset) and alleviate the local minima problem. The SSA algorithm has one parameter that adaptively decreases across the iterations of the optimization process. Thus, the algorithm explores several regions at the beginning of the optimization process and focuses on promising regions later on. As a bonus, follower salps update their positions gradually according to other salps in the swarm, which prevents the optimizer from falling into local minima. The SSA maintains the best-found individual so that it is reserved even if agents become weakened. In the SSA, the leader salp moves based on the position of the food source only, which is the best salp found so far, so the leader always is capable of searching globally and locally around the food source in the search space.
ALO has two types of individuals: ants and ant lions. Ant lions are the best solutions found so far. Their positions are replaced whenever a fitter ant is found. Ants are moving around in the search space continuously. The positions of ants are changed based on the positions of ant lions. The position update strategy of ants is based on selecting an ant lion using a roulette wheel in combination with the best solution. Thus, a given ant updates its position based on these two agents. The selection of an agent randomly using a roulette wheel encourages diversification in the search space. Therefore, ants can move randomly in the search space and explore more regions without stagnating in local minima. The avoidance of local minima is a significant merit of ALO, which gives it superiority against other methods such as PSO. Moreover, it has few parameters compared to PSO and GA. In SSA, the swarm leader is chosen to be the agent with the highest fitness value. Hence, the agents of low fitness values have no chance of leading the swarm. This decreases the exploration capability of the algorithm and supports its exploitative power. In contrast, ALO keeps track of all agents in the swarm and uses a roulette wheel together with the current best agent to lead the swarm. This indicates that low-fitness agents can participate in guiding other agents in the swarm besides the best-found agent. This supports the exploratory behavior of the ALO. Integrating the principles of ALO and SSA into one algorithm can support the exploration/exploitation trade-off. The proposed hybrid algorithm keeps the ants and ant lion swarms in motion. However, it uses the ideas of leadership assignments from both ALO and SSA to provide more trade-offs between global search and local search. The proposed SSA–ALO algorithm takes the merits of ALO by updating low-fitness agents (ants) using ALO principles. On the other hand, it uses the merits of SSA by updating the high-fitness agents (ant lions) using SSA principles that have to maintain faster convergence.
The remaining parts of the paper are as follows: Section 2 introduces a related studies review. Section 3 and Section 4 present details regarding the proposed techniques. Section 5 analyzes the results. Finally, Section 7 provides a paper summary and suggests the future works.

2. Related Works

In the literature, researchers have been attracted by new technologies of data mining. Therefore, they have utilized them for security breaches and botnet attacks in IoT in an efficient way. In [14], neural network (NN) and the negative selection algorithm were used to predict intrusions in IoT. However, in this study, the performance of the IDs was limited. Mehmood [15], used a multi-agent system to detect DDoS attacks. Another study [16] classified the machine learning methods used for security in IoT. In [17], the authors used and compared a set of classifiers to determine their performance in detecting malicious activities. The results showed that NB achieved the worst performance among RF and GB. Principal component analysis (PCA) and fuzzy clustering were used to detect intrusions in IoT. The yielded efficiency of the proposed IDS was promising. However, the system suffered from the scalability problem, so it became inefficient when the amount of data increased [18].
Rathore, in [19], proposed an extreme learning machine (ELM) for attack detection in IoT. The new method outperformed other traditional machine learning methods in terms of accuracy. Moustafa [20] proposed an ensemble learning method for IoT security detection. The proposed method was used to detect mainly three kinds of attacks in IoT.
Several nature-inspired algorithms were used to deal with security issues by developing IDS for IoT. Hamamoto [21] proposed IDS based on a genetic algorithm. In [22], a genetic algorithm was used to detect insider threats. The authors in [23] developed an IDS using multilayer perception and an artificial bee colony algorithm to detect malicious patterns. Ali in [24] proposed IDS based on particle swarm optimization (PSO) to detect attacks. In [25], Bayesian networks and C4.5 were used with the firefly algorithm to perform FS and classify the data in the network. PSO, GA, and ant colony algorithms were proposed as a layered model in [26] along with five rule-based classifiers.
In all mentioned studies, the proposed IDSs were used to handle the data traffic in the traditional networks or typical wireless sensor networks (WSNs). This means that they were not specifically developed for IoT networks. Hence, they may be insufficient for the evolved IoT networks [27]. In the literature, there are few studies on the use of metaheuristic algorithms for detecting intrusions in IoT networks and using metaheuristic FS to enhance the detection of attacks.
In [28], RF and the bat algorithm (BA) were integrated to perform FS for IoT security. The achieved performance results were superior to those of other used methods such as SVM, AdaBoost, and decision tree (DT). Xue [29] applied a differential evolution algorithm. In [30], Popoola proposed a wrapper FS to detect intrusions in networks by using a differential evolution algorithm. Guendouzi developed an FS method to detect intrusions using the biogeography-based optimization (BBO) algorithm [31]. In [32], the author proposed a genetic IDS. There is no existing solution in the literature that uses the integration of SSA and ALO for FS in IDSs, especially to detect botnets in IoT networks. In [8], the authors proposed a deep multi-layer classification intrusion detection approach. They used two stages for detecting an intrusion and the type of intrusion. They also applied an oversampling technique to enhance the classification results. The experiments showed that the best settings of the proposed approach included oversampling by the intrusion type identification label (ITI), 150 neurons for the Single-Hidden Layer Feed-Forward Neural Network (SLFN), and 2 layers and 150 neurons for LSTM. The results showed that the proposed technique outperformed the other well-known techniques in terms of the G-mean having a value of 78% compared to 75% for KNN and less than 50% for the other techniques.
In [6], the authors proposed a new approach for intrusion detection. They integrated the unsupervised (clustering), supervised (classification) and oversampling methods for carrying the task. The used classifier in the proposed approach is the Single Hidden Layer Feed-Forward Neural Network (SLFN). The oversampling method was applied to generate balanced training data. The results showed that the SLFN with the Support Vector Machine and Synthetic Minority Oversampling (SVM-SMOTE), with a ratio of 0.9 and a k-means++ clustering with k value of 3 obtained better results than other values and other classification methods.

3. Preliminaries

3.1. Salp Swarm Optimization

The salp swarm algorithm (SSA) is a swarm intelligence algorithm that was developed in [33]. It inspiration is from animals called salps that live in the sea as a chain. The chain starts with a leader salp that leads other salps. Other salps are followers of the leader salp. Figure 1 shows the swarm of salps and the individual salp.
The population X of n salps can be represented using a 2D matrix as shown in Equation (1). F is the food source. The matrix represents the population of salps. Each line in this matrix represents a single salp (solution). This solution or salp consists of a number of elements. The length of the salp represents the dimension of the problem (d). Actually, this is the number of dimensions or features in a dataset. The number of salps (n) represents the size of the population. Therefore, the first line in the matrix represents the first salp in the swarm, which is the leader salp, and the last line in the matrix is the follower salp number (n) in the swarm. Equation (2) explains the position relation of the leader salp (which is the first solution in the swarm of salp) and the food source.
X i = x 1 1 x 2 1 x d 1 x 1 2 x 2 2 x d 2 x 1 n x 2 n x d n
The position of the leader salp is formulated as in Equation (2)
X j 1 = F j + c 1 ( ( u b j l b j ) c 2 + l b j ) , c 3 0.5 F j c 1 ( ( u b j l b j ) c 2 + l b j ) , c 3 < 0.5
where x j 1 and F j are the positions of leaders and food source in the jth dimension, respectively. c 1 is a gradually decreasing parameter across iterations, and calculated as in Equation (3), where l and L are the current iteration and the maximum iterations, respectively. The other c 2 and c 3 parameters in Equation (2) are randomly selected from [0, 1]. The parameters c 2 and c 3 are very important to direct the next position in the jth dimension towards + or −∞ and determine the step size. The u b j and l b j are the bounds of the jth dimension.
C 1 = 2 e ( 4 l L ) 2
X j i = 1 2 ( x j i + x j i 1 )
In Equation (4), i 2 and x j i represents the position of the ith follower at the jth dimension. SSA is presented in Algorithm 1.
Algorithm 1 SSA algorithm pseudo-code.
Input: n is the # salps, d is the # dimensions)
Output:Near optimal solution (F)
Initialization step x_i (i = 1, 2, . . . , n) considering ub and lb
while (maximum iterations is not reached) do
  Computer the fitness value of each individual
  Define F as the best individual
  Update c 1 by Equation (3)
  for (each individual x i ) do
  if l == 1 then
   Change the position of the leader individual by Equation (2)
  else
   Change the position of the follower individual by Equation (4)
  end if
  Change the positions of the individuals based on the bounds of variables
end while
return F

3.2. Ant Lion Optimization

Ant lion optimization (ALO) was developed in 2015 [34]. ALO mimics the ant lions’ strategy for hunting in nature. Ant lions begin to hunt when they are larvae, while they reproduce when they become adults. Ant lion larvae build a hole in the land. This hole is the trap for insects such as ants. Ant lion larvae hide in the hole and wait for the ants. When the ant lion recognizes ant, it throws the sand out of the hole, in an attempt to catch it. Thus, the ant is captured and is unable to get out from the hole. After the ant lion consumes the prey, it tries to fix the trap for the next prey.
In the ALO algorithm, the ants move within the search space in a random way. Ants are affected by the traps that are built by ant lions. The trap size depends on the fitness value of the ant lion so that a large hole indicates the high fitness of the ant lion. Hence, the ant lion with a higher fitness value has a greater chance of catching prey. In each iteration, prey can be hunted by an ant lion. In ALO, the random walks of ants decrease in adaptive way across iterations to reflect the situation of sliding ants in the direction of the ant lion. If the ant is hunted by the ant lion and pulled towards the bottom of the trap, this is described in terms of the ant having higher fitness than the ant lion. The ant lion updates its position to the last hunted prey and builds another hole in preparation for the next hunt. Figure 2 shows the ants and the ant lion in nature. ALO is formulated in Algorithm 2.
Algorithm 2 ALO algorithm pseudo-code.
Input: Search space, fitness function, # ants and ant lions, # iterations ( M a x I t e r ), a i , b i .
Output: The best ant lion and its fitness.
1. Initialize a random n ant positions and n ant lion positions.
2. Compute the fitness of all ants and ant lions.
3. Find the best ant lion
4.
while   t M a x I t e r   do
  for all   a n t i   do
   (i) Use a roulette wheel to select an ant lion (building trap); as in Equations (9) and (10).
   (ii) Slide ants towards the ant lion; as in Equations (11) and (12).
   (iii) Create a random walk for anti and normalize it; as in Equation (14).
  end for
  - Compute the fitness of all ants.
  - Replace an ant lion with a fitter ant.
  - Update elite if an ant lion becomes fitter than the elite.
end while
5. Select the optimal ant lion position.
  • t: the current iteration
  • T: the maximum iterations
  • A n t l i o n j t : the position of ant lion j at iteration t
  • A n t i t : the position ant i at iteration t
  • c t : is the minimum of all variables at tth iteration.
  • d t : indicates the vector including the maximum of all variables at tth iteration.
  • w: a constant defined based on the current iteration ( w = 2 when t > 0.1 T , w = 3 when t > 0.5 T , w = 4 when t > 0.75 T , w = 5 when t > 0.9 T , and w = 6 when t > 0.95 T ). The constant w can adjust the accuracy level of exploitation.
  • I: I is a ratio defined based on w using the equation
    I = 10 w × t T
  • a i : minimum random walk of ithvariable.
  • b i : maximum random walk of ithvariable.
Random walks of ants are all based on Equation (6):
X ( t ) = [ 0 , c u m s u m ( 2 r ( t 1 ) 1 ) ; c u m s u m ( 2 r ( t 2 ) 1 ) ; ; c u m s u m ( 2 r ( t T ) 1 ) ] ,
where cumsum is the cumulative sum, T is the maximum # iterations, t shows the step of random walk, and r ( t ) is a function in Equation (7)
r ( t ) = 1 , if r a n d > 0.5 0 , if r a n d 0.5
with r a n d being a random number in [0; 1].
To keep the random walks inside the search space, the minmax normalization is applied:
X i t + 1 = ( X i t a i ) × ( d i c i t ) ( b i t a i ) + c i
Trapping of ants in the ant lion’s hole is expressed in Equations (9) and (10)
c i t = c t + A n t l i o n j t
d i t = d t + A n t l i o n j t
Ant lions release sand outside the hole as soon as an ant is in the trap. This behavior is mathematically modeled in Equations (11) and (12)
c t = c t I
d t = d t I
The last step is to catch the prey and rebuild the hole. It is assumed that the hunting of ants occurs when ants have higher fitness values than their corresponding ant lions. An ant lion is then expected to update its position regarding the latest position of the hunted ant to improve its chance of catching new prey, modeled by Equation (13)
A n t l i o n j t = A n t i t I f f ( A n t i t ) i s b e t t e r t h a n f ( a n t l i o n j t )
Elitism is used to reserve the best solution(s) across iterations. The random walk of an ant is led by the selected ant lion and the elite ant lion and, therefore, the new position of an ant is formulated as in Equation (14)
A n t i t = R R t + R E t 2
where R A t is the random walk around the ant lion selected by the roulette wheel, and R E t is the random walk around the elite ant lion.

4. The SSA–ALO Hybrid Model for Feature Selection

The SSA algorithm has many promising features that make it favorable for global optimization, particularly for FS problems. In general, SSA has a simple structure, is efficient, and has an implementable methodology. Furthermore, SSA has one parameter for balancing the global search and local search. It adaptively decreases across the iterations of the optimization process. Thus, the algorithm explores several regions at the beginning of the optimization process and focuses on promising regions later on. As a bonus, follower salps update their positions gradually according to other salps in the swarm, which prevents the optimizer from falling into local minima. The SSA maintains the best-found individual so that it is reserved even if agents become weakened. In the SSA, the leader salp moves according to the food source position. This is the best salp found so far. Therefore, the leader always is able to search globally and locally around the food source in the search space.
ALO has two types of individuals: ants and ant lions. Ant lions are the best solutions found so far. Their positions are replaced whenever a fitter ant is found. Ants are moving around in the search space continuously. The positions of ants are changed based on the positions of ant lions. The position update strategy of ants is based on selecting an ant lion using a roulette wheel in combination with the best solution. Thus, a given ant updates its position based on these two agents. The selection of an agent randomly using a roulette wheel encourages diversification in the search space. Therefore, ants can move randomly in the search space and explore more regions without stagnating in local minima. The avoidance of local minima is a significant merit of ALO, which gives it superiority against other methods such as PSO. Moreover, it has few parameters compared to PSO and GA.
The exploration/exploitation capability of a particular algorithm depends directly on how the swarm leader is announced. In SSA, the swarm leader is chosen to be the agent with the highest fitness value. Hence, the agents of low fitness values have no chance of leading the swarm. This decreases the exploration capability of the algorithm and supports its exploitative power. In contrast, ALO keeps track of all agents in the swarm and uses a roulette wheel together with the current best agent to lead the swarm. This indicates that low-fitness agents can participate in guiding other agents in the swarm besides the best-found agent. This supports the exploratory behavior of the ALO. Integrating the principles of ALO and SSA into one algorithm can support the exploration/exploitation trade-off. The proposed hybrid algorithm keeps the ants’ and ant lions’ swarms in motion. However, it uses the ideas of leadership assignments from both ALO and SSA to provide more trade-offs between global search and local search. The proposed SSA–ALO algorithm takes the merits of ALO by updating low-fitness agents (ants) using ALO principles. On the other hand, it uses the merits of SSA by updating the high-fitness agents (ant lions) using SSA principles that have to maintain faster convergence. The SSA–ALO is formally given in Algorithm 3. The overall botnet detection system is represented by the flowchart in Figure 3.
The proposed SSA–ALO algorithm has sufficient exploration capabilities because:
  • It applies a roulette wheel as a selection mechanism of individuals. This affects the swarm of ants.
  • It changes the size of the random walk adaptively as in SSA. This affects the ant lions swarm.
  • The size of the random walks is adaptive as in ALO. This affects the population of ants.
  • All members of the population are repositioned, rather than only the ant population, as in ALO.
Algorithm 3 The proposed hybrid SSA–ALO algorithm.
Input: Search space, fitness function, # ants and ant lions, # iterations ( M a x I t e r ).
Output: The optimal ant lion and its fitness.
1. Initialize the random n ant positions and n ant lion positions.
2. Compute the fitness of all ants and ant lions.
3. Find the fittest ant lion (the elite)
4.
while   t M a x I t e r   do
  for all   a n t i   do
   (i) choose an ant lion using roulette wheel (building trap).
   (ii) Slide ants towards the ant lion.
   (iii) build a random walk for a n t _ i and normalize it.
  end for
  - Compute the fitness of all ants.
  - Change the position of an ant lion with a fitter ant (catching a prey).
  - Select the leading salp from the ant lion population based on its fitness.
  - Update the exploration rate parameter c 1
  - Update ant lion positions
  - Update elite if an ant lion becomes fitter than the elite.
end while
 5. Select the optimal ant lion position.
Furthermore, the SSA–ALO has exploitation power:
  • It is arget-driven, which is realized from SSA, where the best solution is the leader and remaining solutions are the followers. This helps to improve the ant lions walk.
  • The random steps of both SSA and ALO are reduced over time.
  • The fitter ants are replaced with an ant lion as in ALO concepts.
The proposed SSA–ALO algorithm represents a wrapper-based FS framework. The main issue related to implementing the wrapper approach is using a learning (classification) algorithm. In the proposed algorithm, we have used the K-nearest neighbor (KNN) technique to determine the feature subsets’ goodness. The fitness function in the wrapper approach can be formulated as in Equation (15) and will be used to assess the quality of individual i at iteration t ( I i t ). The main objective is to minimize F P R and 1 T P R .
F i t n e s s i t = F P R i t × ( 1 T P R i t )
In the wrapper framework, evaluating a single solution is costly because it requires a training–testing process using the classification algorithm. For this reason, the choice of an efficient search algorithm is necessary. In this paper, the integration of ALO and SSA is applied to perform an adaptive search in the feature search space. The main target is to increase the classification performance to the maximum and reduce the number of features to the minimum simultaneously. Iteratively, the ALO selects an ant lion randomly using a roulette wheel mechanism. Furthermore, the ants implement a random walk around the best ant lion (elite). Based on the latest two random walks, the ants adjust their positions. If the ant has higher fitness than the ant lion, the ant lion eats it and adjusts its position to the ant’s position. Ant lions adjust their positions based on SSA principles, where the leader salp is selected among ant lions. This algorithm is applied iteratively and depends on the exploration rate, which decreases throughout the optimization process.
As mentioned previously, the solution is limited by two values, 0/1. Therefore, a continuous solution with real values needs to be mapped into a binary solution using Equation (16)
y i j = 0 , if   ( x i j < 0.5 ) 1 , otherwise
where x i j is the continuous value of solution i in dimension j, and y i j is the binary representation of solution vector x.

5. Experiments, Results, and Discussion

N-BaIoT dataset [35] is a benchmark dataset that was downloaded from the machine learning repository [36] at UCI (the University of California Irvine). This dataset represents IoT traffic generated after implementing two common botnet families called BASHLITE and Mirai, in addition to the implementation of the network’s normal behavior.
A test bed was built to run BASHLITE and Mirai botnets consisting of nine devices connected wirelessly via Wi-Fi. Their access point was connected wired-based with the attacker side (mainly C&C server). The types of devices included were two doorbells, a thermostat, a baby monitor, four security cameras, and a webcam.
The main attack executed by these botnets was the DoS attack. DoS attacks or distributed DoS attacks target mainly the availability security requirement of the IoT applications. DoS takes advantage of the resource constraint of the IoT devices, including energy, memory, processing capabilities, and bandwidth, to initiate or inject attacks that drain the devices and network resources and make their services unavailable to the concerned users. Table 1 shows the types of attacks that both botnet families carry out. Both BASHLITE and Mirai botnets execute an auto-scanning phase to scan the IoT and discover the vulnerable devices to inject them with malicious code (malware). The attacker’s C&C (command and control) servers can control this malware remotely. The main purpose of this phase is to propagate the malware and enlarge the botnet.
Moreover, both the TCP and UDP transport layers’ protocols were utilized to flood the IoT by sending too many fake packets too fast in order to deplete the device and network resources. Since TCP is a connection-oriented protocol, specific TCP packets were created and transmitted, including synchronization (SYN) and acknowledgement (ACK) packets.
Additionally, the BASHLITE botnet implemented spamming attacks, whether through sending spam data (junk) or opening fake connections with specific ports and IP addresses (COMBO) to book them just for DoS purposes. The total records per attack category are shown in Table 1.
Table 2 presents the 23 recorded features. Table 3 presents the number of normal and abnormal packets for each IoT device in the N-BaIoT Dataset. Table 4 presents a new N-BaIoT dataset that resulted from combining the data based on object type and the numbers of packets that were utilized in different stages. The new version of the N-BaIoT dataset is called the NN-BaIoT dataset. This is the one used for evaluating the proposed method.
All optimization algorithms were implemented using the EvoloPy-FS framework [13]. This is a publicly available FS swarm intelligence framework coded in Python. EvoloPy-FS consists of several metaheuristic algorithms, which can be downloaded from (www.evo-ml.com) (accessed on 28 March 2021). All results were recorded based on population size and maximum number of iterations equal to 10 and 100, respectively.
The proposed SSA–ALO algorithm was assessed using three evaluation measures that are widely used for testing the capability of attack detection; in the following equations, T P indicates true positives, F N indicates false negatives, F P indicates false negatives, T N indicates true negatives, T P R indicates the true positive rate as in Equation (17), F P R indicates the false positive rate as in Equation (18), and G-mean indicates the square root of of T P R multiplied by 1 F P R as in Equation (19).
T P R = T P T P + F N
F P R = F P F P + T N
G m e a n = T P R × ( 1 F P R )
These evaluation measures were applied to the testing part of the dataset. The best anomaly detection was achieved when larger values of G m e a n and T P R were obtained. Moreover, lower values of F P R were required to increase the robustness of the anomaly detection approach. Consequently, the perfect anomaly detection occurred when both G m e a n and T P R equaled one and F P R equaled zero. Table 5 shows the T P R and F P R values for the SSA, ALO, and the proposed SSA–ALO algorithms. In addition, we compared the results with other anomaly detection algorithms from the literature. These are IF, LOF, OCSVM, and GWO-OCSVM. All the algorithms were applied over the NN-BaIoT dataset at the testing stage. TPR for anomaly detection means predicting the attack whenever it occurs. F P R means predicting benign data as malicious. Therefore, higher values of T P R and lower values of FPR are preferable.
In addition, and as seen in Table 6, SSA–ALO achieved the best G-mean values across all types of IoT devices. In this context, it is worth mentioning that the T P R and F P R could not clearly indicate the performance because the dataset was imbalanced. Therefore, we used the G m e a n measurement, which is commonly used to measure the performance of imbalanced datasets. The average G-mean value of the proposed SSA–ALO was 0.984, which is better than SSA, ALO, GWO-OCSVM, OCSVM, and IF. In addition, it is much higher than LOF. This means that SSA–ALO has a better ability to balance T P R and F P R .
To visually describe the comparisons between these algorithms, Figure 4 shows boxplots of the information in Table 5 and Table 6. As shown in Figure 4, LOF has deficient performance since the T P R and F P R values are the same. This is close to the random classifier, where the TPR and F P R are equal. On the other hand, the proposed SSA–ALO shows different behavior, with a significant difference between the T P R and F P R values. This can be explained by the fact that the hybridization between SSA and ALO can optimize the FS problem better than other algorithms. Moreover, the feature subset found by the SSA–ALO is the best, so it results in the best classification results.
The algorithms were also compared in terms of the running time of the algorithm (detection time) as seen in Table 7. It is clearly shown that the detection time of the SSA–ALO is the lowest among all the algorithms. On average, the SSA–ALO algorithm needs 5 s to detect an attack. This implies that if the IoT devices are attacked, then their functionality will be restored within 5 s. Thus, the time duration of the attack is reduced.
On the other hand, Figure 5 shows that the SSA–ALO algorithm obtains the best convergence behavior. Figure 6, Figure 7, Figure 8 and Figure 9 present the radar charts, which demonstrate the overall performance results in terms of evaluation measures across the various IoT devices. It can be seen that the best feature subset that is found by the SSA–ALO algorithm enhances the results in terms of all the used evaluation measures. In summary, the proposed SSA–ALO demonstrated superior behavior for IoT attack detection in comparison with the other six anomaly detection algorithms.

6. Analysis of the Most Relevant Features

This section presents the most relevant features selected by the proposed SSA–ALO algorithm over the NN-BaIoT dataset during the optimization process. The results show that SSA–ALO obtained the best results in terms of the studied metrics using these relevant subsets of features. As mentioned before, the NN-BaIoT dataset has 115 features. The number of selected features by SSA–ALO to detect a threat to a security camera, baby monitor, doorbell, webcam, and thermostat is eleven, seven, twelve, eleven, and five, respectively. This implies that there is a dimensionality reduction of (90–96%). The following list shows the most relevant features necessary to detect an attack on each type of device:
  • Security camera:
    1.
    H_L1_mean
    2.
    HH_L5_radius
    3.
    HH_L3_weight
    4.
    HH_L3_magnitude
    5.
    HH_L3_radius
    6.
    HH_L1_mean
    7.
    HH_L0.1_mean
    8.
    HH_L0.1_magnitude
    9.
    HH_L0.1_radius
    10.
    HH_iit_L0.1_variance
    11.
    HH_iit_L0.1_mean
  • Baby Monitor:
    1.
    HH_L3_pcc
    2.
    HH_L0.1_magnitude
    3.
    HH_L0.1_radius
    4.
    HH_L0.1_pcc
    5.
    HH_iit_L1_weight
    6.
    HpHp_L3_magnitude
    7.
    HpHp_L3_radius
  • Doorbell
    1.
    HH_L3_magnitude
    2.
    HH_L1_std
    3.
    HH_L1_radius
    4.
    HH_L0.1_weight
    5.
    HH_L0.1_mean
    6.
    HH_L0.1_pcc
    7.
    HH_L0.01_std
    8.
    HH_iit_L3_mean
    9.
    HH_iit_L1_weight
    10.
    HH_iit_L0.1_variance
    11.
    HpHp_L0.1_radius
    12.
    HpHp_L0.01_magnitude
  • Webcam
    1.
    MI_dir_L0.1_mean
    2.
    MI_dir_L0.01_mean
    3.
    H_L5_variance
    4.
    H_L0.1_mean
    5.
    HH_L3_mean
    6.
    HH_L3_pcc
    7.
    HH_L0.1_pcc
    8.
    HH_L0.01_radius
    9.
    HpHp_L1_magnitude
    10.
    HpHp_L0.1_radius
    11.
    HpHp_L0.01_std
  • Thermostat
    1.
    HH_L3_weight
    2.
    HH_L0.1_weight
    3.
    HH_L0.1_radius
    4.
    HH_iit_L1_weight
    5.
    HpHp_L3_mean

7. Conclusions and Future Work

IoT botnet attacks are brutal due to several reasons, such as the rapid increase in the number of connected IoT devices, the vulnerability of these objects to security breaches, and the fact that the attacked devices may not show any symptoms of threat. This study aims to detect IoT botnet breaches by utilizing ant lion optimization, salp swarm optimization, and the proposed hybrid SSA–ALO algorithm. The results on the NN-BaIoT dataset demonstrated the efficiency of the SSA–ALO. The new hybrid algorithm proved its efficiency compared to six other algorithms in terms of the studied evaluation metrics for all IoT device types under study. In addition, it needed the least time to detect an attack. Meanwhile, it reduced the number of selected features. The hybrid SSA–ALO algorithm has an excellent trade-off between the global search and the local search. The algorithm can increase the solutions’ diversity and avoid premature convergence. For future work, we have a few ideas that can be investigated:
  • Developing a parallel version of the hybrid SSA–ALO to work on a distributed framework.
  • Using the proposed method on other applications such as those from genetic and microarray.

Author Contributions

These authors contributed equally to this work. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors would like to acknowledge the support of Prince Sultan University for paying the Article Processing Charges (APC) of this publication.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Alieyan, K.; Almomani, A.; Abdullah, R.; Almutairi, B.; Alauthman, M. Botnet and Internet of Things (IoTs): A Definition, Taxonomy, Challenges, and Future Directions. In Research Anthology on Combating Denial-of-Service Attacks; IGI Global: Hershey, PA, USA, 2021; pp. 138–150. [Google Scholar]
  2. Hamid, H.; Noor, R.M.; Omar, S.N.; Ahmedy, I.; Anjum, S.S.; Shah, S.A.A.; Kaur, S.; Othman, F.; Tamil, E.M. IoT-based botnet attacks systematic mapping study of literature. Scientometrics 2021, 126, 2759–2800. [Google Scholar] [CrossRef]
  3. Dange, S.; Chatterjee, M. IoT Botnet: The Largest Threat to the IoT Network. In Data Communication and Networks; Springer: Berlin/Heidelberg, Germany, 2020; pp. 137–157. [Google Scholar]
  4. Viriyasitavat, W.; Da Xu, L.; Bi, Z.; Hoonsopon, D. Blockchain technology for applications in internet of things—Mapping from system design perspective. IEEE Internet Things J. 2019, 6, 8155–8168. [Google Scholar] [CrossRef]
  5. Nguyen, H.T.; Ngo, Q.D.; Le, V.H. A novel graph-based approach for IoT botnet detection. Int. J. Inf. Secur. 2020, 19, 567–577. [Google Scholar] [CrossRef]
  6. Qaddoura, R.; Al-Zoubi, A.; Almomani, I.; Faris, H. A Multi-Stage Classification Approach for IoT Intrusion Detection Based on Clustering with Oversampling. Appl. Sci. 2021, 11, 3022. [Google Scholar] [CrossRef]
  7. Idrissi, I.; Boukabous, M.; Azizi, M.; Moussaoui, O.; El Fadili, H. Toward a deep learning-based intrusion detection system for IoT against botnet attacks. IAES Int. J. Artif. Intell. 2021, 10, 110. [Google Scholar]
  8. Qaddoura, R.; Al-Zoubi, A.M.; Faris, H.; Almomani, I. A Multi-Layer Classification Approach for Intrusion Detection in IoT Networks Based on Deep Learning. Sensors 2021, 21, 2987. [Google Scholar] [CrossRef] [PubMed]
  9. Aljarah, I.; Mafarja, M.; Heidari, A.A.; Faris, H.; Mirjalili, S. Multi-Verse Optimizer: Theory, Literature Review, and Application in Data Clustering; Nature-Inspired Optimizers: Berlin/Heidelberg, Germany, 2020; pp. 123–141. [Google Scholar]
  10. Faris, H.; Aljarah, I.; Al-Madi, N.; Mirjalili, S. Optimizing the learning process of feedforward neural networks using lightning search algorithm. Int. J. Artif. Intell. Tools 2016, 25, 1650033. [Google Scholar] [CrossRef]
  11. Mafarja, M.; Heidari, A.A.; Faris, H.; Mirjalili, S.; Aljarah, I. Dragonfly Algorithm: Theory, Literature Review, and Application in Feature Selection; Nature-Inspired Optimizers: Berlin/Heidelberg, Germany, 2020; pp. 47–67. [Google Scholar]
  12. Al Shorman, A.; Faris, H.; Aljarah, I. Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection. J. Ambient. Intell. Humaniz. Comput. 2020, 11, 2809–2825. [Google Scholar] [CrossRef]
  13. Khurma, R.A.; Aljarah, I.; Sharieh, A.; Mirjalili, S. Evolopy-fs: An open-source nature-inspired optimization framework in python for feature selection. In Evolutionary Machine Learning Techniques; Springer: Berlin/Heidelberg, Germany, 2020; pp. 131–173. [Google Scholar]
  14. Pamukov, M.E.; Poulkov, V.K.; Shterev, V.A. Negative selection and neural network based algorithm for intrusion detection in iot. In Proceedings of the 2018 41st International Conference on Telecommunications and Signal Processing (TSP), Athens, Greece, 4–6 July 2018; pp. 1–5. [Google Scholar]
  15. Mehmood, A.; Mukherjee, M.; Ahmed, S.H.; Song, H.; Malik, K.M. NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks. J. Supercomput. 2018, 74, 5156–5170. [Google Scholar] [CrossRef]
  16. Xiao, L.; Wan, X.; Lu, X.; Zhang, Y.; Wu, D. IoT security techniques based on machine learning: How do IoT devices use AI to enhance security? IEEE Signal Process. Mag. 2018, 35, 41–49. [Google Scholar] [CrossRef]
  17. Shaikh, F.; Bou-Harb, E.; Crichigno, J.; Ghani, N. A machine learning model for classifying unsolicited iot devices by observing network telescopes. In Proceedings of the 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), Limassol, Cyprus, 25–29 June 2018; pp. 938–943. [Google Scholar]
  18. Liu, L.; Xu, B.; Zhang, X.; Wu, X. An intrusion detection method for internet of things based on suppressed fuzzy clustering. EURASIP J. Wirel. Commun. Netw. 2018, 2018, 1–7. [Google Scholar] [CrossRef] [Green Version]
  19. Rathore, S.; Park, J.H. Semi-supervised learning based distributed attack detection framework for IoT. Appl. Soft Comput. 2018, 72, 79–89. [Google Scholar] [CrossRef]
  20. Moustafa, N.; Turnbull, B.; Choo, K.K.R. An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet Things J. 2018, 6, 4815–4830. [Google Scholar] [CrossRef]
  21. Hamamoto, A.H.; Carvalho, L.F.; Sampaio, L.D.H.; Abrão, T.; Proença, M.L., Jr. Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Syst. Appl. 2018, 92, 390–402. [Google Scholar] [CrossRef]
  22. Bin Ahmad, M.; Akram, A.; Asif, M.; Ur-Rehman, S. Using genetic algorithm to minimize false alarms in insider threats detection of information misuse in windows environment. Math. Probl. Eng. 2014, 2014, 179109. [Google Scholar] [CrossRef]
  23. Hajimirzaei, B.; Navimipour, N.J. Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Express 2019, 5, 56–59. [Google Scholar] [CrossRef]
  24. Ali, M.H.; Al Mohammed, B.A.D.; Ismail, A.; Zolkipli, M.F. A new intrusion detection system based on fast learning network and particle swarm optimization. IEEE Access 2018, 6, 20255–20261. [Google Scholar] [CrossRef]
  25. Selvakumar, B.; Muneeswaran, K. Firefly algorithm based feature selection for network intrusion detection. Comput. Secur. 2019, 81, 148–155. [Google Scholar]
  26. Panigrahi, A.; Patra, M.R. A Layered Approach to Network Intrusion Detection Using Rule Learning Classifiers with Nature-Inspired Feature Selection. In Progress in Computing, Analytics and Networking; Springer: Berlin/Heidelberg, Germany, 2018; pp. 215–223. [Google Scholar]
  27. Raza, S.; Wallgren, L.; Voigt, T. SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 2013, 11, 2661–2674. [Google Scholar] [CrossRef]
  28. Li, J.; Zhao, Z.; Li, R.; Zhang, H. Ai-based two-stage intrusion detection for software defined iot networks. IEEE Internet Things J. 2018, 6, 2093–2102. [Google Scholar] [CrossRef] [Green Version]
  29. Xue, Y.; Jia, W.; Zhao, X.; Pang, W. An evolutionary computation based feature selection method for intrusion detection. Secur. Commun. Netw. 2018, 2018, 2492956. [Google Scholar] [CrossRef]
  30. Popoola, E.; Adewumi, A.O. Efficient Feature Selection Technique for Network Intrusion Detection System Using Discrete Differential Evolution and Decision. IJ Netw. Secur. 2017, 19, 660–669. [Google Scholar]
  31. Guendouzi, W.; Boukra, A. GAB-BBO: Adaptive Biogeography Based Feature Selection Approach for Intrusion Detection. Int. J. Comput. Intell. Syst. 2017, 10, 914–935. [Google Scholar] [CrossRef] [Green Version]
  32. Gharaee, H.; Hosseinvand, H. A new feature selection IDS based on genetic algorithm and SVM. In Proceedings of the 2016 8th International Symposium on Telecommunications (IST), Tehran, Iran, 27–28 September 2016; pp. 139–144. [Google Scholar]
  33. Mirjalili, S.; Gandomi, A.H.; Mirjalili, S.Z.; Saremi, S.; Faris, H.; Mirjalili, S.M. Salp Swarm Algorithm: A bio-inspired optimizer for engineering design problems. Adv. Eng. Softw. 2017, 114, 163–191. [Google Scholar] [CrossRef]
  34. Mirjalili, S. The ant lion optimizer. Adv. Eng. Softw. 2015, 83, 80–98. [Google Scholar] [CrossRef]
  35. Meidan, Y.; Bohadana, M.; Mathov, Y.; Mirsky, Y.; Shabtai, A.; Breitenbacher, D.; Elovici, Y. N-baiot—Network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Comput. 2018, 17, 12–22. [Google Scholar] [CrossRef] [Green Version]
  36. Asuncion, A.; Newman, D. UCI Machine Learning Repository; University of California: Irvine, CA, USA, 2007. [Google Scholar]
  37. Domingues, R.; Filippone, M.; Michiardi, P.; Zouaoui, J. A comparative evaluation of outlier detection algorithms: Experiments and analyses. Pattern Recognit. 2018, 74, 406–421. [Google Scholar] [CrossRef]
Figure 1. The chain of salps and the single salp.
Figure 1. The chain of salps and the single salp.
Symmetry 13 01377 g001
Figure 2. The ants and the ant lion.
Figure 2. The ants and the ant lion.
Symmetry 13 01377 g002
Figure 3. The proposed methodology diagram.
Figure 3. The proposed methodology diagram.
Symmetry 13 01377 g003
Figure 4. Boxplots to represent clearly the results in Table 5 and Table 6. (a) TPR, (b) FPR, (c) G-mean.
Figure 4. Boxplots to represent clearly the results in Table 5 and Table 6. (a) TPR, (b) FPR, (c) G-mean.
Symmetry 13 01377 g004
Figure 5. The convergence curves for SSA–ALO algorithm.
Figure 5. The convergence curves for SSA–ALO algorithm.
Symmetry 13 01377 g005
Figure 6. G-mean results for the SSA–ALO and other algorithms.
Figure 6. G-mean results for the SSA–ALO and other algorithms.
Symmetry 13 01377 g006
Figure 7. TPR results for the SSA–ALO and other algorithms.
Figure 7. TPR results for the SSA–ALO and other algorithms.
Symmetry 13 01377 g007
Figure 8. FPR results for the SSA–ALO and other algorithms.
Figure 8. FPR results for the SSA–ALO and other algorithms.
Symmetry 13 01377 g008
Figure 9. Time results for detecting attacks for the SSA–ALO and other algorithms.
Figure 9. Time results for detecting attacks for the SSA–ALO and other algorithms.
Symmetry 13 01377 g009
Table 1. N-BaIoT dataset main attack categories and record distribution.
Table 1. N-BaIoT dataset main attack categories and record distribution.
BASHLITEMirai
ScanningSpammingFloodingScanningFlooding
Auto ScanJunkCOMBOTCPUDPAuto ScanTCPUDP
255,111261,789515,156859,850946,366537,9791,377,1201,753,303
255,111776,9451,806,216537,9793,130,423
Table 2. The N-BaIoT dataset features.
Table 2. The N-BaIoT dataset features.
ValueMeasureAggregated by# Features
The size of outbound packetsMean VarianceSource IP, Source MAC-IP, Channel, Socket8
Packet countNumberSource IP, Source MAC-IP, Channel, Socket4
Packet jitterMean, Variance, NumberChannel3
Packet sizeMagnitude, Radius, Covariance, Correlation CoefficientChannel Socket8
Table 3. N-BaIoT dataset records according to IoT device and attack class.
Table 3. N-BaIoT dataset records according to IoT device and attack class.
Model of DeviceType of DeviceBenignBASHLITEMiraiTot Attacks
ComboJunkScanTCPUDPAckScanSynUDPUDPPlain
DanminiDoorbell40,39559,71829,06829,84992,141105,874102,195107,685122,573237,66581,982968,750
EnnioDoorbell34,69253,01429,79728,120101,536103,93300000316,400
EcobeeThermostat13,11153,01230,31227,49495,021104,791113,28543,192116,807151,48187,368822,763
Philips B120N/10Baby monitor160,13758,15228,34927,85992,581105,78291,123103,621118,128217,03480,808923,437
Provision PT-737ESec. camera55,16961,38030,89829,297104,510104,01160,55496,78165,746156,24856,681766,106
Provision PT-838Sec. camera91,55557,53029,06828,39789,387104,65857,99797,09661,851158,60853,785738,377
SH XCS7-1002-WHTSec. camera42,78454,28328,57927,82588,816103,720111,48045,930125,715151,87978,244816,471
SH XCS7-1003-WHTSec. camera17,93659,39827,41328,57298,075102,980107,18743,674122,479157,08484,436831,298
Samsung SNH 1011 NWebcam46,81758,66928,30527,69897,783110,61700000323,072
502,596515,156261,789255,111859,850946,366643,821537,979733,2991,229,999523,3046,506,674
Table 4. The division of NN-BaIoT dataset into training, optimization, and testing stages.
Table 4. The division of NN-BaIoT dataset into training, optimization, and testing stages.
Device TypeTrainingOptimizationTesting
No. of
Benign Instances
No. of
Benign Instances
No. of
Malicious Instances
No. of
Benign Instances
No. of
Malicious Instances
Baby monitor53,37953,379307,81253,379615,625
Doorbell25,02925,029428,38325,029856,767
Security camera69,14869,1481,050,75069,1482,101,502
Thermostat43714370274,2544370548,509
Webcam15,60715,605107,69015,605215,382
Table 5. TPR and FPR results.
Table 5. TPR and FPR results.
Device TypeSSA–ALOSSAALOIF [37]LOF [37]OCSVM [12]GWO-OCSVM [12]
TPRFPRTPRFPRTPRFPRTPRFPRTPRFPRTPRFPRTPRFPR
Thermostat0.9950.0020.9930.0030.9910.0020.9920.1010.0010.0010.4980.1390.9600.009
Webcam0.9990.0220.9990.1450.9990.1690.9990.6920.0010.0010.9990.1860.9990.037
Baby monitor0.9890.0020.9480.0490.9770.0610.6180.0030.0040.0040.2340.0010.9910.016
Doorbell0.9980.0680.9720.1200.9820.0970.8260.0100.0010.0010.9230.0030.9950.083
Security camera0.9740.0510.8310.0390.8360.0270.9990.4190.0010.0010.8130.0390.9820.098
Average0.9910.0290.9490.0710.9570.0710.8870.2450.0020.0020.6930.0740.9850.489
Table 6. G-mean results.
Table 6. G-mean results.
Device TypeG-Mean
SSA–ALOSSAALOIF [37]LOF [37]OCSVM [12]GWO-OCSVM [12]
Thermostat0.9960.9950.9940.9440.0320.6550.975
Webcam0.9880.9240.9110.5550.0320.9020.981
Baby monitor0.9930.9490.9580.7850.0630.4790.987
Doorbell0.9640.9250.9420.9040.0320.9590.956
Security camera0.9610.8940.9010.7620.0320.8840.941
Average0.9840.9520.9310.7890.0990.7760.968
Table 7. Average time for detecting attack on NN-BaIoT dataset.
Table 7. Average time for detecting attack on NN-BaIoT dataset.
Device TypeAverage Detection Time (s)
SSA–ALOSSAALOIF [37]LOF [37]OCSVM [12]GWO-OCSVM [12]
Thermostat0.0350.3900.4203.3251.1070.0870.047
Webcam0.0910.8210.19911.5892.8750.4060.156
Baby monitor0.4330.7490.55249.69833.3171.8890.622
Doorbell1.4471.9632.33118.2087.7531.5701.099
Security camera22.65929.85631.58842.39829.57936.54927.837
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Abu Khurma, R.; Almomani, I.; Aljarah, I. IoT Botnet Detection Using Salp Swarm and Ant Lion Hybrid Optimization Model. Symmetry 2021, 13, 1377. https://doi.org/10.3390/sym13081377

AMA Style

Abu Khurma R, Almomani I, Aljarah I. IoT Botnet Detection Using Salp Swarm and Ant Lion Hybrid Optimization Model. Symmetry. 2021; 13(8):1377. https://doi.org/10.3390/sym13081377

Chicago/Turabian Style

Abu Khurma, Ruba, Iman Almomani, and Ibrahim Aljarah. 2021. "IoT Botnet Detection Using Salp Swarm and Ant Lion Hybrid Optimization Model" Symmetry 13, no. 8: 1377. https://doi.org/10.3390/sym13081377

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop