Multi-Criteria Feature Selection Based Intrusion Detection for Internet of Things Big Data

被引:2
作者
Wang, Jie [1 ]
Xiong, Xuanrui [1 ]
Chen, Gaosheng [1 ]
Ouyang, Ruiqi [1 ]
Gao, Yunli [2 ]
Alfarraj, Osama [3 ]
机构
[1] Chongqing Univ Posts & Telecommun, Sch Commun & Informat Engn, Chongqing 400065, Peoples R China
[2] Dalian Univ Technol, Sch Software, Dalian 116024, Peoples R China
[3] King Saud Univ, Community Coll, Comp Sci Dept, Riyadh 11437, Saudi Arabia
关键词
internet of things security; intrusion detection; big data; smart cities; feature selection; ANOMALY DETECTION; DETECTION SYSTEMS; CLASSIFICATION; ALGORITHM;
D O I
10.3390/s23177434
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The rapid growth of the Internet of Things (IoT) and big data has raised security concerns. Protecting IoT big data from attacks is crucial. Detecting real-time network attacks efficiently is challenging, especially in the resource-limited IoT setting. To enhance IoT security, intrusion detection systems using traffic features have emerged. However, these face difficulties due to varied traffic feature formats, hindering fast and accurate detection model training. To tackle accuracy issues caused by irrelevant features, a new model, LVW-MECO (LVW enhanced with multiple evaluation criteria), is introduced. It uses the LVW (Las Vegas Wrapper) algorithm with multiple evaluation criteria to identify pertinent features from IoT network data, boosting intrusion detection precision. Experimental results confirm its efficacy in addressing IoT security problems. LVW-MECO enhances intrusion detection performance and safeguards IoT data integrity, promoting a more secure IoT environment.
引用
收藏
页数:17
相关论文
共 40 条
  • [1] A Survey of Intrusion Detection Systems in Wireless Sensor Networks
    Butun, Ismail
    Morgera, Salvatore D.
    Sankar, Ravi
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) : 266 - 282
  • [2] A Cheap Feature Selection Approach for the K-Means Algorithm
    Capo, Marco
    Perez, Aritz
    Lozano, Jose A.
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2021, 32 (05) : 2195 - 2208
  • [3] Feature selection by multi-objective optimisation: Application to network anomaly detection by hierarchical self-organising maps
    de la Hoz, Emiro
    de la Hoz, Eduardo
    Ortiz, Andres
    Ortega, Julio
    Martinez-Alvarez, Antonio
    [J]. KNOWLEDGE-BASED SYSTEMS, 2014, 71 : 322 - 338
  • [4] A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems
    Eesa, Adel Sabry
    Orman, Zeynep
    Brifcani, Adnan Mohsin Abdulazeez
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (05) : 2670 - 2679
  • [5] Enhancing Multiclass Classification in FARC-HD Fuzzy Classifier: On the Synergy Between n-Dimensional Overlap Functions and Decomposition Strategies
    Elkano, Mikel
    Galar, Mikel
    Antonio Sanz, Jose
    Fernandez, Alberto
    Barrenechea, Edurne
    Herrera, Francisco
    Bustince, Humberto
    [J]. IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2015, 23 (05) : 1562 - 1580
  • [6] High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning
    Erfani, Sarah M.
    Rajasegarar, Sutharshan
    Karunasekera, Shanika
    Leckie, Christopher
    [J]. PATTERN RECOGNITION, 2016, 58 : 121 - 134
  • [7] Solving multi-class problems with linguistic fuzzy rule based classification systems based on pairwise learning and preference relations
    Fernandez, Alberto
    Calderon, Maria
    Barrenechea, Edurne
    Bustince, Humberto
    Herrera, Francisco
    [J]. FUZZY SETS AND SYSTEMS, 2010, 161 (23) : 3064 - 3080
  • [8] Combining predictions in pairwise classification: An optimal adaptive voting strategy and its relation to weighted voting
    Huellermeier, Eyke
    Vanderlooy, Stijn
    [J]. PATTERN RECOGNITION, 2010, 43 (01) : 128 - 142
  • [9] A feature selection approach to find optimal feature subsets for the network intrusion detection system
    Kang, Seung-Ho
    Kim, Kuinam J.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (01): : 325 - 333
  • [10] An efficient k-means clustering algorithm:: Analysis and implementation
    Kanungo, T
    Mount, DM
    Netanyahu, NS
    Piatko, CD
    Silverman, R
    Wu, AY
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2002, 24 (07) : 881 - 892