IoT malicious traffic identification using wrapper-based feature selection mechanisms

被引:195
作者
Shafiq, Muhammad [1 ]
Tian, Zhihong [1 ]
Bashir, Ali Kashif [2 ]
Du, Xiaojiang [3 ]
Guizani, Mohsen [4 ]
机构
[1] GuangZhou Univ, Inst Adv Technol, Dept Cyberspace, Guangzhou 510006, Peoples R China
[2] Metropolitan Univ, Dept Comp & Math, Manchester, Lancs, England
[3] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[4] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
基金
中国国家自然科学基金;
关键词
Feature selection; Internet of things; Cybersecurity; Attacks; Classification; Idntification; Machine learning; SET-THEORETIC APPROACH; KEY MANAGEMENT SCHEME; BIJECTIVE SOFT SET; INTERNET; ATTACKS; GAME;
D O I
10.1016/j.cose.2020.101863
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification in IoT risk management. However, due to inaccurate feature selection, ML techniques misclassify a number of malicious traffic in smart IoT network for secured smart applications. To address the problem, it is very important to select features set that carry enough information for accurate smart IoT anomaly and intrusion traffic identification. In this paper, we firstly applied bijective soft set for effective feature selection to select effective features, and then we proposed a novel CorrACC feature selection metric approach. Afterward, we designed and developed a new feature selection algorithm named Corracc based on CorrACC, which is based on wrapper technique to filter the features and select effective feature for a particular ML classifier by using ACC metric. For the evaluation our proposed approaches, we used four different ML classifiers on the BoT-IoT dataset. Experimental results obtained by our algorithms are promising and can achieve more than 95% accuracy. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:11
相关论文
共 62 条
[41]  
Shafiq M, 2016, PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS
[42]  
IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY
[43]  
IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), P58, DOI [10.1109/HPCC-SmartCity-DSS.2016.220, 10.1109/HPCC-SmartCity-DSS.2016.0019]
[44]  
Shafiq M, 2016, INT CONF IT CONVERGE, P76
[45]  
Soe Y N., 2019, International conference on advanced information networking and applications, P458
[46]   A Correlation-Change Based Feature Selection Method for IoT Equipment Anomaly Detection [J].
Su, Shen ;
Sun, Yanbin ;
Gao, Xiangsong ;
Qiu, Jing ;
Tian, Zhihong .
APPLIED SCIENCES-BASEL, 2019, 9 (03)
[47]   Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services [J].
Tan, Qingfeng ;
Gao, Yue ;
Shi, Jinqiao ;
Wang, Xuebin ;
Fang, Binxing ;
Tian, Zhihong .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :1584-1593
[48]  
Tian Z., 2019, IEEE INTERNET THINGS
[49]   Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory [J].
Tian, Zhihong ;
Gao, Xiangsong ;
Su, Shen ;
Qiu, Jing ;
Du, Xiaojiang ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (06) :5971-5980
[50]   Block-DEF: A secure digital evidence framework using blockchain [J].
Tian, Zhihong ;
Li, Mohan ;
Qiu, Meikang ;
Sun, Yanbin ;
Su, Shen .
INFORMATION SCIENCES, 2019, 491 :151-165