MULTI-
OBJECTIVE INTELLIGENT
COMPUTATIONAL ALGORITHMS:
AN APPROACH TOWARD
INTRUSION DETECTION IN
INTERNET OF THINGS ERA
BY MARIA HABIB
SUPERVISED
BY DR. IBRAHIM ALJARAH
THURSDAY 25, 2019
Outline
Introduction Quick
Background
Glance to
Literature Review
Methodology Results Conclusion
Introduction
(IoT)
https://www.astellia.com/solutions/technologies/harness-the-business-potential-of-iot/
Introduction
Whydoes the security
ofIoT devices matter
tous?
Gartner Inc. has estimated the number of
IoT connected will reach 20.6 billion
devices in 2020.
The economical gain of IoT, it has reached
a peak of $120 billion in 2016, and will
reach $6.2 trillion by 2027.
Introduction
IoTCont. ..
Hewlett Packard (HP) reports that 80% failed
to have adequate password complexity.
In 2015, a drug pump was hacked, and the
attacker has increased the dosage of drug for
the patient without the notice of nurses.
Mirai (IoT botnet) malware in 2016 infected
up to 300,000 devices.
Objective
Several security solutions have been
proposed were led to heavy
computational load.
• Used simulated (were no real) IoT datasets.
• Limited number of IoT attacks.
Designing an approach for
IDSs based on machine learning
(multi-objective evolutionary
algorithms) for real IoT networks.
Multi-
Objective
Optimization
(MOO)
 Two or three objective functions.
 Dominance vs relational operators .
 Pareto optimal set (non-dominated).
f1 & f2 are minimization objectives
(b) dominates (c)
(a & b) are non-dominated solutions
(15,3)
(10,2)
(8,3)
Feature
Selection
Optimization
IoT results in big, high-dimensional data.
Designing a machine learning based IDS for IoT
requires preprocessing large amount of features.
Feature selection considered NP-hard optimization
problem for high-dimensional data.
Metaheuristics.
Metaheuristics are nature-inspired algorithms that
mimic the natural evolution process and inspired
by the Darwinian principles in nature.
Nature-Inspired
Algorithms
Evolutionary-
based
Swarm-based
Evolutionary
Algorithms
John Henry Holland
EAs were the root, which basically established by Holland.
https://en.wikipedia.org/wiki/John_Henry_Holland
Multi-objective
(MOO)
vs
Single-
objective
(SOO)
MOO can produce efficient set of solutions (trade-off) at
single run, whereas SOO needs running so many times.
MOO does not require a priori knowledge (preferences)
before model building, SOO needs a priori knowledge to
design the fitness function.
MOO avoid the burden of weights tuning of the objective
function.
PSO is metaheuristic algorithm that inspired by the social
behavior of bird flocking or fish schooling.
Population of particles, each has velocity & position.
Follows pbest, gbest to move within the search space.
PSO
MOPSO
Classical MOPSO (2002) the first attempt
to extend PSO into MOPSO (high probability to
stuck in local optimal & premature convergence).
MOPSO (2004), secondary external
archive, and a mutation operator.
to update gbest
Glance to
RelatedWorks
RF, NB, NN, Gradient Boosting utilized for attacks detection in IoT.
Hamamoto et al. (2018) designed network anomaly detection
technique based on genetic algorithm and fuzzy logic.
Hajimirzaei and Navimipour (2018) proposed IDS that classifies
network traffic into normal and malicious using Multilayer
Perceptron that trained by Artificial Bee Colony algorithm.
Sanchez-Pi et al. (2018) applied Voronoi diagram-based
Evolutionary Algorithm (VorEAl) in order to detect intrusions using
"Australian defense force academy Linux" dataset (doesn't represent
real IoT traffic).
Very few implemented EAs or MOEAs for IDSs for IoT.
Methodology
Design A modified MOPSO based on Lévy Flight (with
sensitivity analysis).
Compare The modified MOPSO with the
original MOPSO (Coello,2004).
Compare The performance of modified MOPSO with
other MOEAs.
Compare The modified MOPSO with filter-
based methods.
Binary
MOPSO
Sigmoid(S1)
Particles’ positions vector encode all features
Multi-Objective
FeatureSelection
Fitness
Formulation
Positive: Anomaly
Negative: Normal
Lévy Flight &
Lévy
Distribution
Paul Pierre Lévy
Lévy distribution: heavy-tailed distribution, with large step length.
​Lévy Flight is a random walk where the jump's size follows Lévy distribution.
Examples: foraging behavior of bacteria, albatross, and bumblebees.
https://seekingalpha.com/article/3670366
Modified
MOPSO
(pg. 70)
Methodology
Flowchart
All using Matlab & 30 runs
Created
Datasets
UCI(2018)
A stratified samples were created (2000 instances)
Normal class is the minor class & Anomaly is the major class
Attacks
Distributions
forTraining &
Testing
Evaluation
Measures
(Eqs. Inpgs. 78-80)
Accuracy
True Positive Rate (TPR)
False Alarm Rate (FAR)
True Negative Rate (TNR)
G-mean
Area Under Curve (AUC)
No. of Features
Sensitivity
Analysis
(Avg. FAR)
Sensitivity
Analysis
(Avg.G-mean)
MOPSO-Lévy
vs
MOPSO
(pg. 88)
MOPSO-Levy best in 5 of 7
MOPSO-Lévy
vs
MOPSO
(pg. 88)
MOPSO-Lévy
vs MOPSO
(AveragePareto
Front)
Error rate=1-accuracy
pg. 90
MOPSO-Lévy
vs MOEAs
(Avg. FAR)
MOPSO-Lévy
vs MOEAs
(Avg.G-mean)
MOPSO-Lévy
vs MOEAs
(Average
Pareto Front)
Error rate=1-accuracy
MOPSO-Lévy
vs MOEAs
P-values
(avg.G-mean)
MOPSO-Lévy
vs Filter
Methods
(Accuracy)
Conclusion
Designed an approach machine learning-based intrusion
detection for IoT (Multi-Objective evolutionary approach).
The proposed approach compared with original MOPSO,
MOEAs, filter-based method.
The proposed approach achieved very good results to be
recommened for IDSs.
https://fineartamerica.com
Thanks
Any question?

Multi-objective evolutionary algorithms for IDSs for IoT