A hybrid approach for efficient feature selection in anomaly intrusion detection for IoT networks

被引:17
作者
Ayad, Aya G. [1 ]
Sakr, Nehal A. [1 ]
Hikal, Noha A. [1 ]
机构
[1] Mansoura Univ, Fac Comp & Informat, Informat Technol Dept, Mansoura 35516, Egypt
关键词
Internet of Things; Intrusion detection system; Machine learning; Real-time; Feature selection;
D O I
10.1007/s11227-024-06409-x
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential growth of Internet of Things (IoT) devices underscores the need for robust security measures against cyber-attacks. Extensive research in the IoT security community has centered on effective traffic detection models, with a particular focus on anomaly intrusion detection systems (AIDS). This paper specifically addresses the preprocessing stage for IoT datasets and feature selection approaches to reduce the complexity of the data. The goal is to develop an efficient AIDS that strikes a balance between high accuracy and low detection time. To achieve this goal, we propose a hybrid feature selection approach that combines filter and wrapper methods. This approach is integrated into a two-level anomaly intrusion detection system. At level 1, our approach classifies network packets into normal or attack, with level 2 further classifying the attack to determine its specific category. One critical aspect we consider is the imbalance in these datasets, which is addressed using the Synthetic Minority Over-sampling Technique (SMOTE). To evaluate how the selected features affect the performance of the machine learning model across different algorithms, namely Decision Tree, Random Forest, Gaussian Naive Bayes, and k-Nearest Neighbor, we employ benchmark datasets: BoT-IoT, TON-IoT, and CIC-DDoS2019. Evaluation metrics encompass detection accuracy, precision, recall, and F1-score. Results indicate that the decision tree achieves high detection accuracy, ranging between 99.82 and 100%, with short detection times ranging between 0.02 and 0.15 s, outperforming existing AIDS architectures for IoT networks and establishing its superiority in achieving both accuracy and efficient detection times.
引用
收藏
页码:26942 / 26984
页数:43
相关论文
共 64 条
[1]   Quantifying Colocalization by Correlation: The Pearson Correlation Coefficient is Superior to the Mander's Overlap Coefficient [J].
Adler, Jeremy ;
Parmryd, Ingela .
CYTOMETRY PART A, 2010, 77A (08) :733-742
[2]   Towards DDoS attack detection using deep learning approach [J].
Aktar, Sharmin ;
Nur, Abdullah Yasin .
COMPUTERS & SECURITY, 2023, 129
[3]   Ensemble technique of intrusion detection for IoT-edge platform [J].
Aldaej, Abdulaziz ;
Ullah, Imdad ;
Ahanger, Tariq Ahamed ;
Atiquzzaman, Mohammed .
SCIENTIFIC REPORTS, 2024, 14 (01)
[4]   Emerging IoT domains, current standings and open research challenges: a review [J].
Ali, Omer ;
Ishak, Mohamad Khairi ;
Bhatti, Muhammad Kamran Liaquat .
PEERJ COMPUTER SCIENCE, 2021, 7 :1-49
[5]   Robust DDoS attack detection with adaptive transfer learning [J].
Anley, Mulualem Bitew ;
Genovese, Angelo ;
Agostinello, Davide ;
Piuri, Vincenzo .
COMPUTERS & SECURITY, 2024, 144
[6]  
[Anonymous], 2006, Data mining concepts and techniques
[7]   A Deep Learning-Based Intrusion Detection Technique for a Secured IoMT System [J].
Awotunde, Joseph Bamidele ;
Abiodun, Kazeem Moses ;
Adeniyi, Emmanuel Abidemi ;
Folorunso, Sakinat Oluwabukonla ;
Jimoh, Rasheed Gbenga .
INFORMATICS AND INTELLIGENT APPLICATIONS, 2022, 1547 :50-62
[8]   Deep Learning Based Hybrid Intrusion Detection Systems to Protect Satellite Networks [J].
Azar, Ahmad Taher ;
Shehab, Esraa ;
Mattar, Ahmed M. ;
Hameed, Ibrahim A. ;
Elsaid, Shaimaa Ahmed .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2023, 31 (04)
[9]  
Bisong E, 2019, BUILDING MACHINE LEA, P59, DOI DOI 10.1007/978-1-4842-4470-8_7
[10]   SMOTE: Synthetic minority over-sampling technique [J].
Chawla, Nitesh V. ;
Bowyer, Kevin W. ;
Hall, Lawrence O. ;
Kegelmeyer, W. Philip .
2002, American Association for Artificial Intelligence (16)