Improving Reliability for Detecting Anomalies in the MQTT Network by Applying Correlation Analysis for Feature Selection Using Machine Learning Techniques

被引:3
作者
Imran [1 ,2 ]
Zuhairi, Megat Farez Azril [1 ]
Ali, Syed Mubashir [1 ,3 ]
Shahid, Zeeshan [4 ]
Alam, Muhammad Mansoor [1 ,5 ,6 ,7 ]
Su'ud, Mazliham Mohd [5 ]
机构
[1] Univ Kuala Lumpur, Malaysian Inst Informat Technol MIIT, Kuala Lumpur 50250, Malaysia
[2] DHA Suffa Univ DSU, Dept Comp Sci, Karachi 75500, Pakistan
[3] Karachi Inst Econ & Technol KIET, Coll Comp & Informat Sci, Karachi 75190, Pakistan
[4] Nazeer Hussain Univ, Fac Engn Pract & Sci, Dept Elect Engn, Karachi 75190, Pakistan
[5] Multimedia Univ, Fac Comp & Informat, Cyberjaya 63100, Malaysia
[6] Riphah Int Univ, Fac Comp, Islamabad 46000, Pakistan
[7] Univ Technol Sydney, Fac Engn & Informat Technol, Sch Comp Sci, Sydney, NSW 2007, Australia
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 11期
关键词
Internet of Things; dataset; MQTT; machine learning; detection system; artificial intelligence; anomaly detection; INTRUSION DETECTION; INTERNET; THINGS; IOT; SERVICE; SCHEME;
D O I
10.3390/app13116753
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Anomaly detection (AD) has captured a significant amount of focus from the research field in recent years, with the rise of the Internet of Things (IoT) application. Anomalies, often known as outliers, are defined as the discovery of anomalous occurrences or observations that differ considerably from the mainstream of the data. The IoT which is described as a network of Internet-based digital sensors that continuously generate massive volumes of data and use to communicate with one another theMessage Queuing Telemetry Transport (MQTT) protocol. Brute-force, Denial-of-Service (DoS), Malformed, Flood, and Slowite attacks are the most common in theMQTT network. One of the significant factors in IoT AD is the time consumed to predict an attack and take preemptive measures. For instance, if an attack is detected late, the loss of attack is irreversible. This paper investigates the time to detect an attack using machine learning approaches and proposes a novel approach that applies correlation analysis to reduce the training and testing time of these algorithms. The new approach has been evaluated on Random Forest, Decision Tree, Naive Bayes, Multi-Layer Perceptron, Artificial Neural Network, Logistic Regression, and Gradient Boost. The findings indicate that the correlation analysis is significantly beneficial in the process of feature engineering, primarily to determine the most relevant features in the MQTT dataset. This is, to the best of our knowledge, the first study on MQTTset that reduces the prediction time for DoS 0.92 (95% CI -0.378, 2.22) reduced to 0.77 (95% CI -0.414, 1.97) and for Malformed 2.92 (95% CI -2.6, 8.44) reduced to 0.49 (95% CI -0.273, 1.25).
引用
收藏
页数:26
相关论文
共 50 条
  • [1] Combating Network Intrusions using Machine Learning Techniques with Multilevel Feature Selection Method
    Olayinka, Tosin Comfort
    Ugwu, Chukwuemeka Christian
    Okhuoya, Omoibu Joseph
    Adetunmbi, Adebayo Olusola
    Popoola, Olugbemiga Solomon
    2022 IEEE NIGERIA 4TH INTERNATIONAL CONFERENCE ON DISRUPTIVE TECHNOLOGIES FOR SUSTAINABLE DEVELOPMENT (IEEE NIGERCON), 2022, : 589 - 593
  • [2] Detecting BGP Anomalies Using Machine Learning Techniques
    Ding, Qingye
    Li, Zhida
    Batta, Prerna
    Trajkovic, Ljiljana
    2016 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2016, : 3352 - 3355
  • [3] Android malware detection applying feature selection techniques and machine learning
    Mohammad Reza Keyvanpour
    Mehrnoush Barani Shirzad
    Farideh Heydarian
    Multimedia Tools and Applications, 2023, 82 : 9517 - 9531
  • [4] Android malware detection applying feature selection techniques and machine learning
    Keyvanpour, Mohammad Reza
    Shirzad, Mehrnoush Barani
    Heydarian, Farideh
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (06) : 9517 - 9531
  • [5] Review on intrusion detection using feature selection with machine learning techniques
    Kalimuthan, C.
    Renjit, J. Arokia
    MATERIALS TODAY-PROCEEDINGS, 2020, 33 : 3794 - 3802
  • [6] Improving Network Security Using Machine Learning Techniques
    Akbar, Shaik
    Chandulal, J. A.
    Rao, K. Nageswara
    Kumar, G. Sudheer
    2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 76 - 80
  • [7] Performance Analysis of Anomaly-Based Network Intrusion Detection Using Feature Selection and Machine Learning Techniques
    Seniaray, Sumedha
    Jindal, Rajni
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 138 (04) : 2321 - 2351
  • [8] IMPROVING SOFTWARE RELIABILITY MODELING USING MACHINE LEARNING TECHNIQUES
    Zou, Fengzhong
    Davis, Joseph
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2008, 18 (07) : 965 - 986
  • [9] Osteoporosis Detection Using Machine Learning Techniques and Feature Selection
    Iliou, Theodoros
    Anagnostopoulos, Christos-Nikolaos
    Anastassopoulos, George
    INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS, 2014, 23 (05)
  • [10] Detecting anomalies in blockchain transactions using machine learning classifiers and explainability analysis
    Hasan, Mohammad
    Rahman, Mohammad Shahriar
    Janicke, Helge
    Sarker, Iqbal H.
    BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2024, 5 (03):