A Combined Leading Ensemble Decision Classifier Module (CLEDCM) for Intrusion Detection in IoT

被引:0
作者
Savita, Pankaj [1 ]
Agrawal, Sanjay [1 ]
机构
[1] Natl Inst Tech Teachers Training & Res, Dept Comp Sci & Engn, Bhopal, India
来源
2024 16TH INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING, ICCAE 2024 | 2024年
关键词
Cyber Security; Machine Learning; IoT; Feature Selection; Anomaly Detection; DETECTION SYSTEMS; INTERNET;
D O I
10.1109/ICCAE59995.2024.10569930
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) suffers from different types of attacks due to the vulnerability present in devices. Cyber security has become a critical concern in protecting IoT networks from malicious activities and ensuring the privacy and integrity of the data transmitted. It also develops a demand for advanced technology procedures to boost the security of IoT networks. One approach gaining attraction in addressing this challenge is by deploying ensemble machine or Deep learning models for identifying the attack categories and then preventing them, in cyber security. In the Ensemble mechanism, every model or framework of the Machine learning classifier will be trained on multiple subsets of features and data instances within controlled ratios, making them capable of capturing different aspects of the attack patterns. In ensemble techniques the best-predicted values of every individual classifier will be merged up to make up a superior model with great accuracy level so that the predictions ever made will match up to great accuracy and model needs as well. This study combines the results and metrics fetched from 4 base classifiers LightGBM, Random Forest classifier (RFC), XGBoost, and CatBoost, and merged it into a Combined Leading Ensemble Decision Classifier Module (CLEDCM) for the prediction of every record or tuple to find the accurate class it belongs to in case of Multiclass classification scenarios on IOT based Datasets (i.e. NSL-KDD, NF-BOT-IOT datasets). CLEDCM merges the prediction from all the major 4 classifiers in such a way, that the overall Accuracy % and f1-score will get increased by fetching the best prediction from all base classifiers in a group individually Class-wise. In the results, we observed that our proposed model got the highest accuracy of 99.94% for NSL-KDD test data for Multiclass classification in comparison to other base classifiers.
引用
收藏
页码:630 / 635
页数:6
相关论文
共 22 条
[1]   Statistic Approached Dynamically Detecting Security Threats and Updating a Signature-Based Intrusion Detection System's Database in NGN [J].
Abdiyeva-Aliyeva, Gunay ;
Hematyar, Mehran .
JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2022, 13 (05) :524-529
[2]   Survey on Anomaly Detection using Data Mining Techniques [J].
Agrawal, Shikha ;
Agrawal, Jitendra .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 :708-713
[3]  
Al-Jarrah Omar, 2016, Journal of Advances in Information Technology, V6, P1, DOI [10.12720/jait.6.1.1-8, 10.12720/jait.6.1.1-8]
[4]  
Alanazi S, 2015, 2015 17TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATION & SERVICES (HEALTHCOM), P205, DOI 10.1109/HealthCom.2015.7454499
[5]   Deep recurrent neural network for IoT intrusion detection system [J].
Almiani, Muder ;
AbuGhazleh, Alia ;
Al-Rahayfeh, Amer ;
Atiewi, Saleh ;
Razaque, Abdul .
SIMULATION MODELLING PRACTICE AND THEORY, 2020, 101
[6]   Network Intrusion Detection Using Machine Learning Techniques [J].
Almutairi, Yasmeen ;
Alhazmi, Bader ;
Munshi, Amr .
ADVANCES IN SCIENCE AND TECHNOLOGY-RESEARCH JOURNAL, 2022, 16 (03) :193-206
[7]   A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions [J].
Asharf, Javedz ;
Moustafa, Nour ;
Khurshid, Hasnat ;
Debie, Essam ;
Haider, Waqas ;
Wahab, Abdul .
ELECTRONICS, 2020, 9 (07)
[8]   A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems [J].
Benkhelifa, Elhadj ;
Welsh, Thomas ;
Hamouda, Walaa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04) :3496-3509
[9]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[10]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176