Feature selection for intrusion detection system in Internet-of-Things (IoT)

被引:105
作者
Nimbalkar, Pushparaj [1 ]
Kshirsagar, Deepak [1 ]
机构
[1] Coll Engn Pune, Dept Comp Engn & IT, Pune, Maharashtra, India
关键词
Denial-of-service; Internet of Things; Feature selection; Intrusion detection system;
D O I
10.1016/j.icte.2021.04.012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is suffered from different types of attacks due to vulnerability present in devices. Due to many IoT network traffic features, the machine learning models take time to detect attacks. This paper proposes a feature selection for intrusion detection systems (IDSs) using Information Gain (IG) and Gain Ratio (GR) with the ranked top 50% features for the detection of DoS and DDoS attacks. The proposed system obtains feature subsets using insertion and union operations on subsets obtained by the ranked top 50% IG and GR features. The proposed method is evaluated and validated on IoT-BoT and KDD Cup 1999 datasets, respectively, with a JRipclassifier. The system provides higher performance than the original feature set and traditional IDSs on IoT-BoT and KDD Cup 1999 datasets using 16 and 19 features, respectively. (C) 2021 The Korean Institute of Communications and Information Sciences (KICS). Publishing services by Elsevier B.V.
引用
收藏
页码:177 / 181
页数:5
相关论文
共 18 条
[1]   A feature reduced intrusion detection system using ANN classifier [J].
Akashdeep ;
Manzoor, Ishfaq ;
Kumar, Neeraj .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 88 :249-257
[2]  
Alanazi S, 2015, 2015 17TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATION & SERVICES (HEALTHCOM), P205, DOI 10.1109/HealthCom.2015.7454499
[3]   Deep recurrent neural network for IoT intrusion detection system [J].
Almiani, Muder ;
AbuGhazleh, Alia ;
Al-Rahayfeh, Amer ;
Atiewi, Saleh ;
Razaque, Abdul .
SIMULATION MODELLING PRACTICE AND THEORY, 2020, 101
[4]  
[Anonymous], 2017, INT C MOBILE NETWORK
[5]   A Supervised Intrusion Detection System for Smart Home IoT Devices [J].
Anthi, Eirini ;
Williams, Lowri ;
Slowinska, Malgorzata ;
Theodorakopoulos, George ;
Burnap, Pete .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :9042-9053
[6]  
Balasaraswathi VR., 2017, J COMMUN INF NETW, V2, P107, DOI [10.1007/s41650-017-0033-7, DOI 10.1007/S41650-017-0033-7]
[7]  
Chen YW, 2020, EUR CONF NETW COMMUN, P122, DOI [10.1109/EuCNC48522.2020.9200909, 10.1109/eucnc48522.2020.9200909]
[8]   RETRACTED: Mobile network intrusion detection for IoT system based on transfer learning algorithm (Retracted Article) [J].
Deng, Lianbing ;
Li, Daming ;
Yao, Xiang ;
Cox, David ;
Wang, Haoxiang .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4) :S9889-S9904
[9]   Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications [J].
Diro, Abebe ;
Chilamkurti, Naveen .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (09) :124-130
[10]   Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset [J].
Koroniotis, Nickolaos ;
Moustafa, Nour ;
Sitnikova, Elena ;
Turnbull, Benjamin .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 :779-796