A machine learning-based intrusion detection for detecting internet of things network attacks

被引:100
作者
Saheed, Yakub Kayode [1 ]
Abiodun, Aremu Idris [2 ]
Misra, Sanjay [3 ]
Holone, Monica Kristiansen [3 ]
Colomo-Palacios, Ricardo [3 ]
机构
[1] Amer Univ Nigeria, Sch IT & Comp, Yola, Nigeria
[2] Lagos State Polytech, Dept Comp Sci, Ikorodu, Nigeria
[3] Ostfold Univ Coll, Dept Comp Sci & Commun, Halden, Norway
基金
芬兰科学院;
关键词
Intrusion Detection System; Machine Learning; Internet of Things; Min-max Normalization; UNSWNB-15; Principal Component Analysis; Cat boost; XgBoost; FEATURE-SELECTION; SECURITY; PRIVACY; SCHEME; FRAMEWORK; HYBRID;
D O I
10.1016/j.aej.2022.02.063
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The Internet of Things (IoT) refers to the collection of all those devices that could connect to the Internet to collect and share data. The introduction of varied devices continues to grow tremendously, posing new privacy and security risks-the proliferation of Internet connections and the advent of new technologies such as the IoT. Various and sophisticated intrusions are driving the IoT paradigm into computer networks. Companies are increasing their investment in research to improve the detection of these attacks. By comparing the highest rates of accuracy, institutions are picking intelligent procedures for testing and verification. The adoption of IoT in the different sectors, including health, has also continued to increase in recent times. Where the IoT applications became well known for technology researchers and developers. Unfortunately, the striking challenge of IoT is the privacy and security issues resulting from the energy limitations and scalability of IoT devices. Therefore, how to improve the security and privacy challenges of IoT remains an important problem in the computer security field. This paper proposes a machine learning-based intrusion detection system (ML-IDS) for detecting IoT network attacks. The primary objective of this research focuses on applying ML-supervised algorithm-based IDS for IoT. In the first stage of this research methodology, feature scaling was done using the Minimum-maximum (min-max) concept of normalization on the UNSW-NB15 dataset to limit information leakage on the test data. This dataset is a mixture of contemporary attacks and normal activities of network traffic grouped into nine different attack types. In the next stage, dimensionality reduction was performed with Principal Component Analysis (PCA). Lastly, six proposed machine learning models were used for the analysis. The experimental results of our findings were evaluated in terms of validation data set, accuracy, the area under the curve, recall, F1, precision, kappa, and Mathew correlation coef- ficient (MCC). The findings were also benchmarked with the existing works, and our results were competitive with an accuracy of 99.9% and MCC of 99.97%. (c) 2022 THE AUTHORS. Published by Elsevier BV on behalf of Faculty of Engineering, Alexandria University This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/ licenses/by-nc-nd/4.0/).
引用
收藏
页码:9395 / 9409
页数:15
相关论文
共 88 条
[1]   A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective [J].
Abdul-Ghani, Hezam Akram ;
Konstantas, Dimitri .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2019, 8 (02)
[2]   Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection [J].
Abdulhammed, Razan ;
Musafer, Hassan ;
Alessa, Ali ;
Faezipour, Miad ;
Abuzneid, Abdelshakour .
ELECTRONICS, 2019, 8 (03)
[3]   Security in Internet of Things: issues, challenges, taxonomy, and architecture [J].
Adat, Vipindev ;
Gupta, B. B. .
TELECOMMUNICATION SYSTEMS, 2018, 67 (03) :423-441
[4]   An Intrusion Detection System for the Internet of Things Based on Machine Learning: Review and Challenges [J].
Adnan, Ahmed ;
Muhammed, Abdullah ;
Abd Ghani, Abdul Azim ;
Abdullah, Azizol ;
Hakim, Fahrul .
SYMMETRY-BASEL, 2021, 13 (06)
[5]   DATA MINING DATA MINING CONCEPTS AND TECHNIQUES [J].
Agarwal, Shivam .
2013 INTERNATIONAL CONFERENCE ON MACHINE INTELLIGENCE AND RESEARCH ADVANCEMENT (ICMIRA 2013), 2013, :203-207
[6]   Intrusion detection in internet of things using supervised machine learning based on application and transport layer features using UNSW-NB15 data-set [J].
Ahmad, Muhammad ;
Riaz, Qaiser ;
Zeeshan, Muhammad ;
Tahir, Hasan ;
Haider, Syed Ali ;
Khan, Muhammad Safeer .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
[7]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[8]  
Al-hadhrami T, 2020, ADV SMART SOFT COMPU
[9]   Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection [J].
Al-Qatf, Majjed ;
Yu Lasheng ;
Al-Habib, Mohammed ;
Al-Sabahi, Kamal .
IEEE ACCESS, 2018, 6 :52843-52856
[10]   A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer [J].
Alazzam, Hadeel ;
Sharieh, Ahmad ;
Sabri, Khair Eddin .
EXPERT SYSTEMS WITH APPLICATIONS, 2020, 148 (148)