IoBT Intrusion Detection System using Machine Learning

被引:6
作者
Alkanjr, Basmh [1 ]
Alshammari, Thamer [1 ]
机构
[1] Florida Atlantic Univ, Dept Elect Engn & Comp Sci, Boca Raton, FL 33431 USA
来源
2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC | 2023年
关键词
IoBT; Intrusion Detection system; IDS; security; Machine Learning; INTERNET; CHALLENGES;
D O I
10.1109/CCWC57344.2023.10099340
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet of Battlefield Things (IoBT) is a granular approach to military operational effectiveness that draws inspiration from the Internet of Things (IoT) paradigm. Rather than networking home appliances and light fixtures to optimize their energy usage, IoBT connects military assets and systems such as combat equipment, personal devices, armored and unmanned vehicles, and sensors. The resulting system is both an information gathering and distribution network that augments battlefield efficiency, autonomy, and real-time decision-making capabilities of the personnel. The modular approach of IoBT is both its biggest advantage and its Achilles' heel. An IoBT can be seamlessly adapted and scaled according to the battlefield needs, but the availability and accuracy of the data shared between nodes is vulnerable to tampering, errors, and hacking. Subsequently, malicious actors can access confidential data, taint it, or prevent parts of IoBT from functioning. To fortify the cybersecurity aspect of IoBT, all involved personnel should maintain the quality of the information, which includes its integrity and confidentiality. To detect intrusion in IoBT, we propose a multi-faceted intrusion detection system that meshes ensemble methods with supervised machine learning to detect and report anomalies. We used CIC-IDS-2017 and CIC-IDS-2018 intrusion datasets for benchmarking classifiers, dividing them into a 70:30 ratio. The performance of the hybrid IDS model is finely tuned to deliver a high detection rate and low false positives rate.
引用
收藏
页码:886 / 892
页数:7
相关论文
共 25 条
[1]   Effect of Data Scaling Methods on Machine Learning Algorithms and Model Performance [J].
Ahsan, Md Manjurul ;
Mahmud, M. A. Parvez ;
Saha, Pritom Kumar ;
Gupta, Kishor Datta ;
Siddique, Zahed .
TECHNOLOGIES, 2021, 9 (03)
[2]  
Aickelin U, 2004, LECT NOTES COMPUT SC, V3239, P316
[3]   A Survey of Random Forest Based Methods for Intrusion Detection Systems [J].
Alves Resende, Paulo Angelo ;
Drummond, Andre Costa .
ACM COMPUTING SURVEYS, 2018, 51 (03)
[4]  
Anitha A. Arul, 2022, International Journal of Computer Networks and Applications, V9, P38, DOI 10.22247/ijcna/2022/211599
[5]  
Barnaghi P, 2012, INT J SEMANT WEB INF, V8, P1, DOI [10.4018/jswis.201201010149, 10.4018/jswis.2012010101]
[6]   A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems [J].
Benkhelifa, Elhadj ;
Welsh, Thomas ;
Hamouda, Walaa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04) :3496-3509
[7]  
Choubisa M, 2022, 2022 INT C IOT BLOCK, P1, DOI [DOI 10.1109/ICIBT52874.2022.9807766, 10.1109/ICIBT52874.2022.9807766]
[8]  
Desai MG, 2020, 2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), P316, DOI 10.1109/UEMCON51285.2020.9298146
[9]   Random Forest Modeling for Network Intrusion Detection System [J].
Farnaaz, Nabila ;
Jabbar, M. A. .
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 :213-217
[10]   A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems [J].
Hindy, Hanan ;
Brosset, David ;
Bayne, Ethan ;
Seeam, Amar ;
Tachtatzis, Christos ;
Atkinson, Robert ;
Bellekens, Xavier .
IEEE ACCESS, 2020, 8 :104650-104675