Attack Detection in IoT Network Using Support Vector Machine and Improved Feature Selection Technique

被引:3
作者
Ben Henda, Noura [1 ]
Msolli, Amina [1 ]
Haggui, Imen [1 ]
Helali, Abdelhamid [1 ]
Maaref, Hassen [1 ]
机构
[1] Univ Monastir, Fac Sci Monastir, Microoptoelectron & Nanostruct Lab, Monastir, Tunisia
关键词
IoT; Intrusion detection; IDS; Machine learning; SVM; Feature selection; INTRUSION DETECTION; DIMENSIONALITY REDUCTION;
D O I
10.1007/s10922-024-09871-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a result of the rapid advancement of technology, the Internet of Things (IoT) has emerged as an essential research question, capable of collecting and sending data through a network between linked items without the need for human interaction. However, these interconnected devices often encounter challenges related to data security, encompassing aspects of confidentiality, integrity, availability, authentication, and privacy, particularly when facing potential intruders. Addressing this concern, our study propose a novel host-based intrusion detection system grounded in machine learning. Our approach incorporates a feature selection (FS) technique based on the correlation between features and a ranking function utilizing Support Vector Machine (SVM). The experimentation, conducted on the NSL-KDD dataset, demonstrates the efficacy of our methodology. The results showcase superiority over comparable approaches in both binary and multi-class classification scenarios, achieving remarkable accuracy rates of 99.094% and 99.11%, respectively. This underscores the potential of our proposed system in enhancing security measures for IoT devices.
引用
收藏
页数:20
相关论文
共 31 条
[1]   Intrusion detection in internet of things using supervised machine learning based on application and transport layer features using UNSW-NB15 data-set [J].
Ahmad, Muhammad ;
Riaz, Qaiser ;
Zeeshan, Muhammad ;
Tahir, Hasan ;
Haider, Syed Ali ;
Khan, Muhammad Safeer .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
[2]  
Ahmad Tohari, 2019, ICIC Express Letters, V13, P93, DOI 10.24507/icicel.13.02.93
[3]   A feature reduced intrusion detection system using ANN classifier [J].
Akashdeep ;
Manzoor, Ishfaq ;
Kumar, Neeraj .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 88 :249-257
[4]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[5]   Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection [J].
Al-Qatf, Majjed ;
Yu Lasheng ;
Al-Habib, Mohammed ;
Al-Sabahi, Kamal .
IEEE ACCESS, 2018, 6 :52843-52856
[6]   Using weighted Support Vector Machine to address the imbalanced classes problem of Intrusion Detection System [J].
Alabdallah, Alaeddin ;
Awad, Mohammed .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (10) :5143-5158
[7]   IoT Intrusion Detection Using Machine Learning with a Novel High Performing Feature Selection Method [J].
Albulayhi, Khalid ;
Abu Al-Haija, Qasem ;
Alsuhibany, Suliman A. ;
Jillepalli, Ananth A. ;
Ashrafuzzaman, Mohammad ;
Sheldon, Frederick T. .
APPLIED SCIENCES-BASEL, 2022, 12 (10)
[8]   Differential Evolution Wrapper Feature Selection for Intrusion Detection System [J].
Almasoudy, Faezah Hamad ;
Al-Yaseen, Wathiq Laftah ;
Idrees, Ali Kadhum .
INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 :1230-1239
[9]   Computational Intelligence Algorithms to Handle Dimensionality Reduction for Enhancing Intrusion Detection System [J].
Alsaadi, Husam Ibrahiem ;
Almuttairi, Rafah M. ;
Bayat, Oguz ;
Ucani, Osman Nuri .
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2020, 36 (02) :293-308
[10]  
Bansal Ashu, 2018, Advances in Computing and Data Sciences: Second International Conference, ICACDS 2018, Dehradun, India, April 20-21, 2018, Revised Selected Papers, Part I. Communications in Computer and Information Science (905), P372, DOI 10.1007/978-981-13-1810-8_37