Intrusion Detection in Internet of Things With MQTT Protocol-An Accurate and Interpretable Genetic-Fuzzy Rule-Based Solution

被引:15
作者
Gorzalczany, Marian B. [1 ]
Rudzinski, Filip [1 ]
机构
[1] Kielce Univ Technol, Dept Elect & Comp Engn, PL-25314 Kielce, Poland
来源
IEEE INTERNET OF THINGS JOURNAL | 2022年 / 9卷 / 24期
关键词
Data mining (DM); fuzzy rule-based classi-fiers (FRBCs); Internet of Things (IoT); interpretable intrusiondetection; intrusion detection systems; machine learning (ML); MQTT protocol; multiobjective evolutionary optimization; IOT; OPTIMIZATION; NETWORK; SMART; CLASSIFICATION; SELECTION;
D O I
10.1109/JIOT.2022.3194837
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article addresses the problem of an accurate and interpretable intrusion detection in Internet of Things (IoT) systems using the knowledge-discovery data-mining/machine-learning approach proposed by us. This approach-implemented as a fuzzy rule-based classifier-employs our generalization of the well-known multiobjective evolutionary optimization algorithm to optimize the accuracy-interpretability tradeoff of the IoT intrusion detection systems (IoT IDSs). The main contribution of this work is the design of accurate and interpretable IoT IDSs from the most recently published data-referred to as MQTT-IOT-IDS2020 data sets-describing the behavior of an MQTT-protocol-based IoT system. A comparison with seven available alternative approaches was also performed demonstrating that the approach proposed by us significantly outperforms alternative methods in terms of interpretability of intrusion-detection decisions made while remaining competitive or superior in terms of the accuracy of those decisions.
引用
收藏
页码:24843 / 24855
页数:13
相关论文
共 85 条
[1]   Intrusion detection using a fuzzy genetics-based learning algorithm [J].
Abadeh, M. Sanlee ;
Habibi, J. ;
Lucas, C. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) :414-428
[2]   RETRACTED: Internet of Things (IoT) and its impact on supply chain: A framework for building smart, secure and efficient systems (Retracted article. See vol. 128, pg. 568, 2022) [J].
Abdel-Basset, Mohamed ;
Manogaran, Gunasekaran ;
Mohamed, Mai .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 :614-628
[3]  
Abraham A., 2007, Int. J. Netw. Secur, V4, P328
[4]   An Efficient Deep-Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks [J].
Abu Al-Haija, Qasem ;
Zein-Sabatto, Saleh .
ELECTRONICS, 2020, 9 (12) :1-26
[5]   Internet of Things (IoT) for Smart Precision Agriculture and Farming in Rural Areas [J].
Ahmed, Nurzaman ;
De, Debashis ;
Hussain, Md. Iftekhar .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (06) :4890-4899
[6]   The Rise of Internet of Things (IoT) in Big Healthcare Data: Review and Open Research Issues [J].
Alansari, Zainab ;
Soomro, Safeeullah ;
Belgaum, Mohammad Riyaz ;
Shamshirband, Shahaboddin .
PROGRESS IN ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, VOL 2, 2018, 564 :675-685
[7]   Scanning the Industry 4.0: A Literature Review on Technologies for Manufacturing Systems [J].
Alcacer, V. ;
Cruz-Machado, V. .
ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2019, 22 (03) :899-919
[8]  
Alshammari R, 2007, CNSR 2007: PROCEEDINGS OF THE FIFTH ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, P345
[9]   Mutual information-based feature selection for intrusion detection systems [J].
Amiri, Fatemeh ;
Yousefi, MohammadMahdi Rezaei ;
Lucas, Caro ;
Shakery, Azadeh ;
Yazdani, Nasser .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) :1184-1199
[10]  
Amor NB, 2004, P 2004 ACM S APPL CO, P420