A Novel Approach for 1D-CNN Hyperparameter Optimization in IoT Attack Detection using Particle Swarm Optimization
DOI:
https://doi.org/10.54654/isj.v1i24.1097Keywords:
IoT attack detection, one-dimensional convolutional neural network (1D-CNN), particle swarm optimization (PSO), hyperparameter optimization (HPO), multi-objective optimizationTóm tắt
This study proposes a hyperparameter optimization method for one-dimensional convolutional neural network using the Particle Swarm Optimization algorithm based on a Pareto multi-objective approach to improve the performance of IoT attack detection systems. Specifically, this study enhances the PSO algorithm by introducing an automatic termination criterion for optimization loops and proposes an early stopping mechanism, along with the optimization of the early stopping patience during the 1D-CNN model training process, thereby reducing computational costs and aligning with the resource-constrained hardware conditions of IoT. Additionally, a multi-objective optimization function is developed to balance detection performance and resource efficiency by combining validation accuracy with the 1D-CNN's execution time. The proposed method is evaluated on the Edge-IIoTset dataset. Experimental results demonstrate that the optimized model reduces execution time by 48-63% compared to the baseline model while maintaining high accuracy (over 94%). This research not only provides a practical solution for IoT security but also pioneers a novel approach to integrating evolutionary algorithms into adaptive deep learning systems and introduces a flexible method for hardware-constrained devices.
Downloads
References
. L. S. Vailshery, "Number of IoT connections worldwide 2022-2033" (2025), [Accessed: 01/03/2025], https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/.
. L. Xiao, X. Wan, X. Lu, Y. Zhang, and D. Wu, "IoT security techniques based on machine learning: How do IoT devices use AI to enhance security?", IEEE Signal Processing Magazine, vol. 35, no. 5, pp. 41–49, 2018, doi: 10.1109/MSP.2018.2825478.
. M. K. Hooshmand and M. D. Huchaiah, "Network Intrusion Detection with 1D Convolutional Neural Networks", Digital Technologies Research and Applications, vol. 1, no. 2, pp. 66–75, 2022, doi: 10.54963/dtra.v1i2.64.
. L. T. H. Van, P. V. Huong, and N. H. Minh, "The Multi-objective Optimization of the Convolutional Neural Network for the Problem of IoT System Attack Detection", in Modelling, Computation and Optimization in Information Systems and Management Sciences (MCO 2021), Lecture Notes in Networks and Systems, vol. 363, Springer, 2021, pp. 350–360.
. L. T. H. Van, L. D. Thuan, P. V. Huong, and N. H. Minh, "A New Method to Improve the CNN Configuration for IoT Attack Detection Problem based on the Genetic Algorithm and Multi-Objective Approach", in 2024 1st International Conference On Cryptography And Information Security (VCRIS), Hanoi, Vietnam, 2024, pp. 1-9.
. D. Kilichev and W. Kim, "Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO", Mathematics, vol. 11, no. 17, 2023, doi: 10.3390/math11173724.
. A. El-Ghamry, A. Darwish and A. E. Hassanien, "An optimized CNN-based intrusion detection system for reducing risks in smart farming", Internet of Things, vol. 22, 2023, doi: 10.1016/j.iot.2023.100709.
. X. Kan, Y. Fan, Z. Fang, L. Cao, N. N. Xiong, D. Yang and X. Li, "A novel IoT network intrusion detection approach based on Adaptive Particle Swarm Optimization Convolutional Neural Network", Information Sciences, vol. 568, pp. 147-162, 2021, doi: 10.1016/j.ins.2021.03.060.
. A. Bahaa, A. Sayed, L. Elfangary, and H. Fahmy, "A novel hybrid optimization enabled robust CNN algorithm for an IoT network intrusion detection approach", PLOS ONE, vol. 17, no. 12, 2022, doi: 10.1371/journal.pone.0278493.
. L. Yang and A. Shami, "A Transfer Learning and Optimized CNN Based Intrusion Detection System for Internet of Vehicles", in ICC 2022 - IEEE International Conference on Communications, Seoul, Republic of Korea, 2022, pp. 2774–2779.
. K. Aguerchi, Y. Jabrane, M. Habba, and A. H. El Hassani, "A CNN hyperparameters optimization based on particle swarm optimization for mammography breast cancer classification", Journal of Imaging, vol. 10, no. 2, 2024, doi: 10.3390/jimaging10020030.
. M. A. Ferrag, O. Friha, D. Hamouda, L. Maglaras and H. Janicke, "Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning", IEEE Access, vol. 10, pp. 40281-40306, 2022, doi: 10.1109/ACCESS.2022.3165809.
. D. Kilichev, D. Turimov and W. Kim, "Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models", Mathematics, vol. 12, no. 4, 2024, doi: 10.3390/math12040571.
. P. V. Huong, L. T. H. Van, và P. S. Nguyen, “Detecting Web Attacks Based on Clustering Algorithm and Multi‑branch CNN,” Journal of Science and Technology on Information Security, vol. 2, no. 12, pp. 31–37, Jul. 2021, doi: 10.54654/isj.v2i12.120.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).