IoT malicious traffic identification using wrapper-based feature selection mechanisms

被引:193
作者
Shafiq, Muhammad [1 ]
Tian, Zhihong [1 ]
Bashir, Ali Kashif [2 ]
Du, Xiaojiang [3 ]
Guizani, Mohsen [4 ]
机构
[1] GuangZhou Univ, Inst Adv Technol, Dept Cyberspace, Guangzhou 510006, Peoples R China
[2] Metropolitan Univ, Dept Comp & Math, Manchester, Lancs, England
[3] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[4] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
基金
中国国家自然科学基金;
关键词
Feature selection; Internet of things; Cybersecurity; Attacks; Classification; Idntification; Machine learning; SET-THEORETIC APPROACH; KEY MANAGEMENT SCHEME; BIJECTIVE SOFT SET; INTERNET; ATTACKS; GAME;
D O I
10.1016/j.cose.2020.101863
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification in IoT risk management. However, due to inaccurate feature selection, ML techniques misclassify a number of malicious traffic in smart IoT network for secured smart applications. To address the problem, it is very important to select features set that carry enough information for accurate smart IoT anomaly and intrusion traffic identification. In this paper, we firstly applied bijective soft set for effective feature selection to select effective features, and then we proposed a novel CorrACC feature selection metric approach. Afterward, we designed and developed a new feature selection algorithm named Corracc based on CorrACC, which is based on wrapper technique to filter the features and select effective feature for a particular ML classifier by using ACC metric. For the evaluation our proposed approaches, we used four different ML classifiers on the BoT-IoT dataset. Experimental results obtained by our algorithms are promising and can achieve more than 95% accuracy. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:11
相关论文
共 62 条
[1]   Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications [J].
Abu Alsheikh, Mohammad ;
Lin, Shaowei ;
Niyato, Dusit ;
Tan, Hwee-Pink .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04) :1996-2018
[2]   Designing Future Disaster Response TeamWearables from a Grounding in Practice [J].
Alharthi, Sultan A. ;
Sharma, Hitesh Nidhi ;
Sunka, Sachin ;
Dolgov, Igor ;
Toups, Zachary O. .
PROCEEDINGS OF THE TECHNOLOGY, MIND, AND SOCIETY CONFERENCE (TECHMINDSOCIETY'18), 2018,
[3]  
[Anonymous], [No title captured]
[4]  
[Anonymous], [No title captured]
[5]  
[Anonymous], [No title captured]
[6]  
[Anonymous], AMOUNT MALWARE TARGE
[7]  
[Anonymous], [No title captured]
[8]   An optimal multitier resource allocation of cloud RAN in 5G using machine learning [J].
Bashir, Ali Kashif ;
Arul, Rajakumar ;
Basheer, Shakila ;
Raja, Gunasekaran ;
Jayaraman, Ramkumar ;
Qureshi, Nawab Muhammad Faseeh .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (08)
[9]   Soft set theory and uni-int decision making [J].
Cagman, Naim ;
Enginoglu, Serdar .
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2010, 207 (02) :848-855
[10]  
Dash M., 1997, Intelligent Data Analysis, V1