Enhancing IoT security: A comparative study of feature reduction techniques for intrusion detection system

被引:2
作者
Li, Jing [1 ]
Chen, Hewan [2 ]
Shahizan, Mohd Othman [1 ]
Yusuf, Lizawati Mi [1 ]
机构
[1] Univ Technol Malaysia, Johor Baharu, Malaysia
[2] China Jiliang Univ, Hangzhou, Peoples R China
来源
INTELLIGENT SYSTEMS WITH APPLICATIONS | 2024年 / 23卷
关键词
Internet of things; Intrusion detection; Feature reduction; Machine learning; Attack classification; FEATURE-SELECTION; DETECTION MODEL; DECISION TREE; CLASSIFIER; ENSEMBLE; SVM;
D O I
10.1016/j.iswa.2024.200407
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet of Things (IoT) devices are extensively utilized but are susceptible to cyberattacks, posing significant security challenges. To mitigate these threats, machine learning techniques have been implemented for network intrusion detection in IoT environments. These techniques commonly employ various feature reduction methods, prior to inputting data into models, in order to enhance the efficiency of detection processes to meet real-time requirements. This study provides a comprehensive comparison of feature selection (FS) and feature extraction (FE) techniques for network intrusion detection systems (NIDS) in IoT environments, utilizing the TON-IoT and BoT-IoT datasets for both binary and multi-class classification tasks. We evaluated FS methods, including Pearson correlation and Chi-square, and FE methods, such as Principal Component Analysis (PCA) and Autoencoders (AE), across five classic machine learning models: Decision Tree (DT), Random Forest (RF), Naive Bayes (NB), k-Nearest Neighbors (kNN), and Multi-Layer Perceptron (MLP). Our analysis revealed that FE techniques generally achieve higher accuracy and robustness compared to FS methods, with RF paired with AE delivering superior performance despite higher computational demands. DTs are most effective with smaller feature sets, while MLPs excel with larger sets. Chi-square is identified as the most efficient FS method, balancing performance and computational efficiency, whereas PCA outperforms AE in runtime efficiency. The study also highlights that FE methods are more effective for complex datasets and less sensitive to feature set size, whereas FS methods show significant performance improvements with more informative features. Despite the higher computational costs of FE methods, they demonstrate a greater capability to detect diverse attack types, making them particularly suitable for complex IoT environments. These findings are crucial for both academic research and industry applications, providing insights into optimizing detection performance and computational efficiency in NIDS for IoT networks.
引用
收藏
页数:40
相关论文
共 65 条
  • [1] Efficient Network Intrusion Detection Using PCA-Based Dimensionality Reduction of Features
    Abdulhammed, Razan
    Faezipour, Miad
    Musafer, Hassan
    Abuzneid, Abdelshakour
    [J]. 2019 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2019), 2019,
  • [2] A novel SVM-kNN-PSO ensemble method for intrusion detection system
    Aburomman, Abdulla Amin
    Reaz, Mamun Bin Ibne
    [J]. APPLIED SOFT COMPUTING, 2016, 38 : 360 - 372
  • [3] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [4] Almseidin M, 2017, I S INTELL SYST INFO, P277, DOI 10.1109/SISY.2017.8080566
  • [5] Multilayer Perceptron: an Intelligent Model for Classification and Intrusion Detection
    Amato, Flora
    Mazzocca, Nicola
    Vivenzio, Emilio
    Moscato, Francesco
    [J]. 2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 686 - 691
  • [6] Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
    Ambusaidi, Mohammed A.
    He, Xiangjian
    Nanda, Priyadarsi
    Tan, Zhiyuan
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) : 2986 - 2998
  • [7] Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection
    Aminanto, Muhamad Erza
    Choi, Rakyong
    Tanuwidjaja, Harry Chandra
    Yoo, Paul D.
    Kim, Kwangjo
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) : 621 - 636
  • [8] Mutual information-based feature selection for intrusion detection systems
    Amiri, Fatemeh
    Yousefi, MohammadMahdi Rezaei
    Lucas, Caro
    Shakery, Azadeh
    Yazdani, Nasser
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) : 1184 - 1199
  • [9] A hybrid method consisting of GA and SVM for intrusion detection system
    Aslahi-Shahri, B. M.
    Rahmani, R.
    Chizari, M.
    Maralani, A.
    Eslami, M.
    Golkar, M. J.
    Ebrahimi, A.
    [J]. NEURAL COMPUTING & APPLICATIONS, 2016, 27 (06) : 1669 - 1676
  • [10] Network Intrusion Detection for IoT Security Based on Learning Techniques
    Chaabouni, Nadia
    Mosbah, Mohamed
    Zemmari, Akka
    Sauvignac, Cyrille
    Faruki, Parvez
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03): : 2671 - 2701