Enhancing Security in Industrial IoT Networks: Machine Learning Solutions for Feature Selection and Reduction

被引:0
作者
Houkan, Ahmad [1 ]
Sahoo, Ashwin Kumar [1 ]
Gochhayat, Sarada Prasad [2 ]
Sahoo, Prabodh Kumar [3 ]
Liu, Haipeng [4 ]
Khalid, Syed Ghufran [5 ]
Jain, Prince [3 ]
机构
[1] C V Raman Global Univ, Dept Elect Engn, Bhubaneswar 752054, Odisha, India
[2] Indian Inst Technol Jammu, Dept Comp Sci Engn, Jammu 181221, Jammu & Kashmir, India
[3] Parul Univ, Parul Inst Technol, Dept Mechatron Engn, Vadodara 391760, Gujarat, India
[4] Coventry Univ, Ctr Intelligent Healthcare, Coventry CV1 5RW, England
[5] Nottingham Trent Univ, Sch Sci & Technol, Nottingham NG11 8NF, England
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Feature extraction; Industrial Internet of Things; Accuracy; Intrusion detection; Classification algorithms; Principal component analysis; Data models; Support vector machines; Anomaly detection; Training; Intrusion detection system; feature selection; feature reduction; minimum redundancy maximum relevance; principal component analysis;
D O I
10.1109/ACCESS.2024.3481459
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing deployment of Internet of Things devices has introduced significant cyber security challenges, creating a need for robust intrusion detection systems. This research focuses on improving anomaly detection in industrial Internet of Things networks through feature reduction and selection. Experiments were performed to compare the effectiveness of Minimum Redundancy Maximum Relevance for feature selection with Principal Component Analysis for feature reduction. Six machine learning algorithms-Decision Trees, k-nearest neighbors, Gaussian Support Vector Machine, Neural Network, Support Vector Machines kernel, and Logistic Regression Kernel-were evaluated for both binary and multi-class classification using feature sets of 4, 12, 23, 50, and 79 features. The results reveal that Minimum Redundancy Maximum Relevance is superior to Principal Component Analysis in identifying crucial features. Notably, Minimum Redundancy Maximum Relevance achieves high accuracy with just 12 features, where the Decision Tree classifier reached an outstanding 99.9% accuracy in binary classification, and k-nearest neighbors achieved 99% accuracy in multi-class classification. The article emphasizes the critical role of feature engineering, with a specific focus on feature selection and reduction, and elaborates on applying MRMR and PCA algorithms to various feature sets. By comparing these methods, it showcases their influence on both model performance and complexity, leading to the development of more efficient and precise intrusion detection systems for Industrial IoT networks. What sets this study apart from previous ones is its novel demonstration of how these techniques significantly reduce training time and model complexity while maintaining or even improving performance, confirming the effectiveness of strategic feature utilization in strengthening Industrial IoT security by balancing accuracy, speed, and model size.
引用
收藏
页码:160864 / 160883
页数:20
相关论文
共 48 条
  • [1] Abraham A., 2007, Int. J. Netw. Secur, V4, P328
  • [2] Agrawal K., 2019, International Journal of Information Dissemination and Technology, V9, P186, DOI 10.5958/2249-5576.2019.00036.0
  • [3] IoT Intrusion Detection Using Machine Learning with a Novel High Performing Feature Selection Method
    Albulayhi, Khalid
    Abu Al-Haija, Qasem
    Alsuhibany, Suliman A.
    Jillepalli, Ananth A.
    Ashrafuzzaman, Mohammad
    Sheldon, Frederick T.
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (10):
  • [4] Intelligent Hybrid Model to Enhance Time Series Models for Predicting Network Traffic
    Aldhyani, Theyazn H. H.
    Alrasheedi, Melfi
    Alqarni, Ahmed Abdullah
    Alzahrani, Mohammed Y.
    Bamhdi, Alwi M.
    [J]. IEEE ACCESS, 2020, 8 : 130431 - 130451
  • [5] Intrusion Detection System to Advance Internet of Things Infrastructure-Based Deep Learning Algorithms
    Alkahtani, Hasan
    Aldhyani, Theyazn H. H.
    [J]. COMPLEXITY, 2021, 2021
  • [6] RETRACTED: Adaptive Anomaly Detection Framework Model Objects in Cyberspace (Retracted article. See vol. 2023, 2023)
    Alkahtani, Hasan
    Aldhyani, Theyazn H. H.
    Al-Yaari, Mohammed
    [J]. APPLIED BIONICS AND BIOMECHANICS, 2020, 2020
  • [7] Challenges of Malware Detection in the IoT and a Review of Artificial Immune System Approaches
    Alrubayyi, Hadeel
    Goteng, Gokop
    Jaber, Mona
    Kelly, James
    [J]. JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2021, 10 (04)
  • [8] Anomaly-Based Intrusion Detection Systems in IoT Using Deep Learning: A Systematic Literature Review
    Alsoufi, Muaadh A.
    Razak, Shukor
    Siraj, Maheyzah Md
    Nafea, Ibtehal
    Ghaleb, Fuad A.
    Saeed, Faisal
    Nasser, Maged
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (18):
  • [9] An Intrusion Detection and Classification System for IoT Traffic with Improved Data Engineering
    Alsulami, Abdulaziz A.
    Abu Al-Haija, Qasem
    Tayeb, Ahmad
    Alqahtani, Ali
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (23):
  • [10] Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
    Ambusaidi, Mohammed A.
    He, Xiangjian
    Nanda, Priyadarsi
    Tan, Zhiyuan
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) : 2986 - 2998