Implementing attack detection system using filter-based feature selection methods for fog-enabled IoT networks

被引:10
作者
Chaudhary, Pooja [1 ]
Gupta, Brij [2 ,3 ,4 ,5 ]
Singh, A. K. [1 ]
机构
[1] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
[2] Asia Univ, Int Ctr AI & Cyber Secur Res & Innovat, Taichung 413, Taiwan
[3] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 413, Taiwan
[4] Skyline Univ Coll, Res & Innovat Dept, POB 1797, Sharjah, U Arab Emirates
[5] King Abdulaziz Univ, Dept Comp Sci, Jeddah 21589, Saudi Arabia
关键词
Internet of things (IoT) security; Feature selection algorithms; DDoS attack; Machine learning classifiers; Intrusion detection system (IDS); INTRUSION DETECTION; INTERNET; THINGS; SECURITY; DDOS;
D O I
10.1007/s11235-022-00927-w
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Internet-of-Things (IoT) has become an enthralling attacking surface for attackers to explode multitude of cyber-attacks. Distributed Denial of Service (DDoS) attack has transpired as the most menacing attack in the IoT networks. In this article, we propose an attack detection system to identify anomalous activities in the fog-enabled IoT network. Initially, authors have investigated exhaustively on the performance of filter-based feature selection algorithms comprising ReliefF, Correlation Feature Selection (CFS), Information Gain (IG), and Minimum-Redundancy-Maximum-Relevancy (mRMR) and distinct categories classification algorithms upon the prepared dataset consisting of IoT network specific features. Performance of the tested classification algorithm is assessed using prominent evaluation measures. Moreover, response time of classifiers is calculated for centralized and fog-enabled IoT network infrastructure. The experimental outcomes unveil that, in terms of both accuracy and latency, J48 classifier outperforms all other tested classifier with mRMR feature selection algorithm.
引用
收藏
页码:23 / 39
页数:17
相关论文
共 53 条
[1]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[2]   Fog Computing for the Internet of Things: Security and Privacy Issues [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Cheng, Xiuzhen .
IEEE INTERNET COMPUTING, 2017, 21 (02) :34-42
[3]  
[Anonymous], 2014, Data Classif. Algorithms Appl., DOI DOI 10.1201/B17320
[4]  
[Anonymous], MIRAI DDOS ATTACK
[5]  
[Anonymous], TCPDUMP
[6]  
[Anonymous], 2017, RASPBERRY PI 3
[7]  
[Anonymous], 2019, Cyber Attack Trends Analysis: Key Insights to Gear Up for in 2019
[8]  
[Anonymous], 2016, Internet of Things-number of connected devices worldwide 2015-2025
[9]   A Supervised Intrusion Detection System for Smart Home IoT Devices [J].
Anthi, Eirini ;
Williams, Lowri ;
Slowinska, Malgorzata ;
Theodorakopoulos, George ;
Burnap, Pete .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :9042-9053
[10]   Internet of Things applications: A systematic review [J].
Asghari, Parvaneh ;
Rahmani, Amir Masoud ;
Javadi, Hamid Haj Seyyed .
COMPUTER NETWORKS, 2019, 148 :241-261