Prediction of IIoT traffic using a modified whale optimization approach integrated with random forest classifier

被引:20
作者
Ikram, Sumaiya Thaseen [1 ]
Priya, V [1 ]
Anbarasu, B. [1 ]
Cheng, Xiaochun [2 ]
Ghalib, Muhammad Rukunuddin [1 ]
Shankar, Achyut [3 ]
机构
[1] Vellore Inst Technol, Sch Informat Technol & Engn, Vellore 632014, Tamil Nadu, India
[2] Middlesex Univ, Dept Comp Commun, London, England
[3] Amity Univ, Dept Comp Sci, Noida, Uttar Pradesh, India
基金
英国科研创新办公室;
关键词
Accuracy; Feature selection; Multi-objective; Evolutionary computation; Random forest; Whale optimization; QUALITY CHARACTERISTICS SELECTION; INDUSTRIAL INTERNET; ALGORITHM; NETWORKS; IOT;
D O I
10.1007/s11227-021-04284-4
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Several organizations are implementing large-scale Internet of Things (IoT)-based ecosystems, such as Industrial IoT (IIoT). Such systems are vulnerable to new threats and intrusions because of the nature of their networks. It is necessary to secure such systems by developing feature selection integrated with robust machine learning models. In this paper, a two-phase IIoT traffic prediction model is built for detecting normal and anomalous IIoT behavior. The system is divided into two phases. In the first phase, multi-objective non-dominated sorting with whale optimization approach (MNSWOA) and ideal point method (IPM) is implemented for feature selection. The key quality attributes are retrieved for effective classification. In the second phase, the feature selection results are sent to the random forest (RF) classifier for traffic prediction. Experimental results on IIoT datasets, namely CTU-13, AWID and Gas-Water show that the proposed technique MNSWOA-IPM-RF obtains enhanced performance in terms of accuracy, true positive rate, true negative rate and area under the ROC curve. Also, comparisons indicate that the proposed MNSWOA-IPM-RF model has superior results than benchmark multi-objective optimization techniques.
引用
收藏
页码:10725 / 10756
页数:32
相关论文
共 44 条
[1]   Deep-IFS: Intrusion Detection Approach for Industrial Internet of Things Traffic in Fog Environment [J].
Abdel-Basset, Mohamed ;
Chang, Victor ;
Hawash, Hossam ;
Chakrabortty, Ripon K. ;
Ryan, Michael .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (11) :7704-7715
[2]   TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems [J].
Alsaedi, Abdullah ;
Moustafa, Nour ;
Tari, Zahir ;
Mahmood, Abdun ;
Anwar, Adnan .
IEEE ACCESS, 2020, 8 :165130-165150
[3]   Optimizing multi-objective PSO based feature selection method using a feature elitism mechanism [J].
Amoozegar, Maryam ;
Minaei-Bidgoli, Behrouz .
EXPERT SYSTEMS WITH APPLICATIONS, 2018, 113 :499-514
[4]   Hybrid approach to intrusion detection in fog-based IoT environments [J].
de Souza, Cristiano Antonio ;
Westphall, Carlos Becker ;
Machado, Renato Bobsin ;
Mangueira Sobral, Joao Bosco ;
Vieira, Gustavo dos Santos .
COMPUTER NETWORKS, 2020, 180
[5]   An Evolutionary Many-Objective Optimization Algorithm Using Reference-Point-Based Nondominated Sorting Approach, Part I: Solving Problems With Box Constraints [J].
Deb, Kalyanmoy ;
Jain, Himanshu .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2014, 18 (04) :577-601
[6]   A novel Hybrid Genetic Local Search Algorithm for feature selection and weighting with an application in strategic decision making in innovation management [J].
Eroglu, Duygu Yilmaz ;
Kilic, Kemal .
INFORMATION SCIENCES, 2017, 405 :18-32
[7]   Efficient and Secure Data Sharing for 5G Flying Drones: A Blockchain-Enabled Approach [J].
Feng, Chaosheng ;
Yu, Keping ;
Bashir, Ali Kashif ;
Al-Otaibi, Yasser D. ;
Lu, Yang ;
Chen, Shengbo ;
Zhang, Di .
IEEE NETWORK, 2021, 35 (01) :130-137
[8]  
Ghosh, 2021, COMPUTATIONALLY INTE, V950, P39
[9]   Pareto front feature selection based on artificial bee colony optimization [J].
Hancer, Emrah ;
Xue, Bing ;
Zhang, Mengjie ;
Karaboga, Dervis ;
Akay, Bahriye .
INFORMATION SCIENCES, 2018, 422 :462-479
[10]   Increasing the Trustworthiness in the Industrial IoT Networks Through a Reliable Cyberattack Detection Model [J].
Hassan, Mohammad Mehedi ;
Gumaei, Abdu ;
Huda, Shamsul ;
Almogren, Ahmad .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (09) :6154-6162