Research Article Open Access

Generating IoT Specific Anomaly Datasets Using Cooja Simulator (Contiki-OS) and Performance Evaluation of Deep Learning Model Coupled with Aquila Optimizer

Vandana Choudhary1, Sarvesh Tanwar1 and Tanupriya Choudhury2
  • 1 Department of Computer Science and Engineering, Amity Institute of Information Technology, Amity University Uttar Pradesh, India
  • 2 Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, Uttarakhand, India

Abstract

In recent times, the massive expansion of the Internet of Things (IoT) has transformed various facets of everyday life and industries. The compelling cause behind the widespread adoption of IoT is the increasing availability of affordable, compact, and energy-efficient computing devices. While these devices offer significant benefits, they also raise substantial security and privacy challenges. Consequently, safeguarding IoT networks and devices is imperative. To raise a robust security system for IoT networks, it is crucial to have an efficient anomaly-based intrusion detection system. In this study, we introduce a meticulous methodology to create IoT-specific datasets. Utilizing the Contiki-OS Cooja simulator, we generate datasets representative of real-world IoT security threats, including sinkholes, version numbers, and flooding attacks. We then evaluate the performance of a Convolutional Neural Network paired with an Aquila Optimizer (CNN-AO) using these self-generated datasets, by employing metrics such as accuracy, precision, recall, F1-score, sensitivity, specificity, and false alarm rate. Additionally, we compare the effectiveness of CNN and LSTM models in distinguishing between benign and malicious traffic. Our findings demonstrate that the CNN-AO model surpasses other models in accurately classifying normal and malicious traffic with an accuracy of 99.22, 99.77, and 99.55% for our self-generated malicious datasets based on sinkhole attack, version number attack, and flooding attack respectively. This novel approach not only establishes a solid foundation for future investigations in this domain but also provides valuable insights into enhancing IoT system security. In this study, we contribute to the field by introducing a robust methodology for IoT-specific dataset generation and evaluating a cutting-edge CNN-AO model for intrusion detection. Furthermore, it is crucial to note that this research was conducted with utmost ethical consideration. Ethical guidelines and data privacy concerns were meticulously addressed during the generation of IoT datasets and the simulation of real-world attack scenarios, ensuring the responsible conduct of our study.

Journal of Computer Science
Volume 20 No. 4, 2024, 365-378

DOI: https://doi.org/10.3844/jcssp.2024.365.378

Submitted On: 20 September 2023 Published On: 1 February 2024

How to Cite: Choudhary, V., Tanwar, S. & Choudhury, T. (2024). Generating IoT Specific Anomaly Datasets Using Cooja Simulator (Contiki-OS) and Performance Evaluation of Deep Learning Model Coupled with Aquila Optimizer. Journal of Computer Science, 20(4), 365-378. https://doi.org/10.3844/jcssp.2024.365.378

  • 1,270 Views
  • 766 Downloads
  • 7 Citations

Download

Keywords

  • Internet of Things
  • Intrusion Detection System (IDS)
  • Dataset Generation
  • Sinkhole Attack
  • Version Attack
  • Flooding Attack
  • Deep Learning