Developing a hybrid feature selection method to detect botnet attacks in IoT devices

被引:4
作者
Alshaeaa, Hyder Yahya [1 ]
Ghadhban, Zainab Mohammed [2 ]
机构
[1] Univ Thi Qar, Coll Educ Pure Sci, Dept Comp Sci, Thi Qar 64001, Iraq
[2] Minist Educ, Thi Qar Educ Directorate, Thi Qar, Iraq
关键词
Botnet attack; Methods select features; Machine learning models; Binary classification; Multi; -classification; NETWORK; SYSTEM;
D O I
10.1016/j.kjs.2024.100222
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The Internet of Things, or IoT, is an important technology applied in various applications such as smart homes and innovative healthcare. Due to its architecture, IoT-based devices suffer from various security challenges, most commonly, botnet attacks. This article aims to develop a hybrid feature selection method to find the most influential features based on three feature selection methods, correlation, generalized normal distribution optimization, and lasso, to detect botnet attacks in IoT devices. The UNSW-NB15 dataset is used to assess the proposed system. Several classification models including decision tree (DT), random forest (RF), k-nearest neighbors (KNN), adaptive boosting (AdaBoost), and bagging are utilized for the classification purpose. The proposed system was evaluated using several performance metrics. The results showed the correlation feature selection method had the most accurate botnet attack detection rate. RF also outperformed other models with a 95.11% detection rate in binary classification and 83.96% in multi-classification. On the other hand, results showed that the proposed hybrid method outperformed the feature selection methods with an increase of about 3% in both classifications. The AdaBoost model achieved an accuracy of 99.28% with binary classification by using 18 features, and the RF model achieved an accuracy of 86.62% with multi-classification by using 22 features. The robustness and efficacy of the proposed approach were demonstrated by comparing the study's results with several other studies that have used the same dataset. The results of the study can be implemented in real applications to detect network interference of a dynamic nature in real-time and assist intrusion detection systems (IDS) in addressing these attacks.
引用
收藏
页数:13
相关论文
共 50 条
[1]   An Efficient Network Intrusion Detection and Classification System [J].
Ahmad, Iftikhar ;
Ul Haq, Qazi Emad ;
Imran, Muhammad ;
Alassafi, Madini O. ;
AlGhamdi, Rayed A. .
MATHEMATICS, 2022, 10 (03)
[2]   Binary Simulated Normal Distribution Optimizer for feature selection: Theory and application in COVID-19 datasets [J].
Ahmed, Shameem ;
Sheikh, Khalid Hassan ;
Mirjalili, Seyedali ;
Sarkar, Ram .
EXPERT SYSTEMS WITH APPLICATIONS, 2022, 200
[3]   Enhancing Machine Learning Prediction in Cybersecurity Using Dynamic Feature Selector [J].
Ahsan, Mostofa ;
Gomes, Rahul ;
Chowdhury, Md. Minhaz ;
Nygard, Kendall E. .
JOURNAL OF CYBERSECURITY AND PRIVACY, 2021, 1 (01) :199-218
[4]   Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments [J].
Aldhyani, Theyazn H. H. ;
Alkahtani, Hasan .
SENSORS, 2022, 22 (13)
[5]   Botnet Attack Detection Using Local Global Best Bat Algorithm for Industrial Internet of Things [J].
Alharbi, Abdullah ;
Alosaimi, Wael ;
Alyami, Hashem ;
Rauf, Hafiz Tayyab ;
Damasevicius, Robertas .
ELECTRONICS, 2021, 10 (11)
[6]   Threat Analysis and Distributed Denial of Service (DDoS) Attack Recognition in the Internet of Things (IoT) [J].
Ali, Mohammed Hasan ;
Jaber, Mustafa Musa ;
Abd, Sura Khalil ;
Rehman, Amjad ;
Awan, Mazhar Javed ;
Damasevicius, Robertas ;
Bahaj, Saeed Ali .
ELECTRONICS, 2022, 11 (03)
[7]  
Alshamkhany Mustafa, 2020, 2020 14th International Conference on Innovations in Information Technology (IIT), P203, DOI 10.1109/IIT50501.2020.9299061
[8]   A Modified Grey Wolf Optimization Algorithm for an Intrusion Detection System [J].
Alzaqebah, Abdullah ;
Aljarah, Ibrahim ;
Al-Kadi, Omar ;
Damasevicius, Robertas .
MATHEMATICS, 2022, 10 (06)
[9]   A Supervised Intrusion Detection System for Smart Home IoT Devices [J].
Anthi, Eirini ;
Williams, Lowri ;
Slowinska, Malgorzata ;
Theodorakopoulos, George ;
Burnap, Pete .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :9042-9053
[10]   Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm [J].
Asgharzadeh, Hossein ;
Ghaffari, Ali ;
Masdari, Mohammad ;
Gharehchopogh, Farhad Soleimanian .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2023, 175 :1-21