Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
41 tokens/sec
GPT-4o
59 tokens/sec
Gemini 2.5 Pro Pro
41 tokens/sec
o3 Pro
7 tokens/sec
GPT-4.1 Pro
50 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Enhancing IoT Security: A Novel Feature Engineering Approach for ML-Based Intrusion Detection Systems (2404.19114v1)

Published 29 Apr 2024 in cs.CR, cs.LG, and cs.NE

Abstract: The integration of Internet of Things (IoT) applications in our daily lives has led to a surge in data traffic, posing significant security challenges. IoT applications using cloud and edge computing are at higher risk of cyberattacks because of the expanded attack surface from distributed edge and cloud services, the vulnerability of IoT devices, and challenges in managing security across interconnected systems leading to oversights. This led to the rise of ML-based solutions for intrusion detection systems (IDSs), which have proven effective in enhancing network security and defending against diverse threats. However, ML-based IDS in IoT systems encounters challenges, particularly from noisy, redundant, and irrelevant features in varied IoT datasets, potentially impacting its performance. Therefore, reducing such features becomes crucial to enhance system performance and minimize computational costs. This paper focuses on improving the effectiveness of ML-based IDS at the edge level by introducing a novel method to find a balanced trade-off between cost and accuracy through the creation of informative features in a two-tier edge-user IoT environment. A hybrid Binary Quantum-inspired Artificial Bee Colony and Genetic Programming algorithm is utilized for this purpose. Three IoT intrusion detection datasets, namely NSL-KDD, UNSW-NB15, and BoT-IoT, are used for the evaluation of the proposed approach.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (21)
  1. K. Albulayhi, Q. Abu Al-Haija, S. A. Alsuhibany, A. A. Jillepalli, M. Ashrafuzzaman, and F. T. Sheldon, “Iot intrusion detection using machine learning with a novel high performing feature selection method,” Applied Sciences, vol. 12, no. 10, p. 5015, 2022.
  2. A. Mahanipour and H. Khamfroush, “Wrapper-based federated feature selection for iot environments,” in 2023 International Conference on Computing, Networking and Communications (ICNC).   IEEE, 2023, pp. 214–219.
  3. A. K. Mishra and S. Paliwal, “Mitigating cyber threats through integration of feature selection and stacking ensemble learning: the lgbm and random forest intrusion detection perspective,” Cluster Computing, vol. 26, no. 4, pp. 2339–2350, 2023.
  4. W. L. Al-Yaseen, A. K. Idrees, and F. H. Almasoudy, “Wrapper feature selection method based differential evolution and extreme learning machine for intrusion detection system,” Pattern Recognition, vol. 132, p. 108912, 2022.
  5. S. S. Kareem, R. R. Mostafa, F. A. Hashim, and H. M. El-Bakry, “An effective feature selection model using hybrid metaheuristic algorithms for iot intrusion detection,” Sensors, vol. 22, no. 4, p. 1396, 2022.
  6. F. Barani and H. Nezamabadi-pour, “Bqiabc: a new quantum-inspired artificial bee colony algorithm for binary optimization problems,” Journal of AI and Data Mining, vol. 6, no. 1, pp. 133–143, 2018.
  7. J. R. Koza, “Genetic programming as a means for programming computers by natural selection,” Statistics and computing, vol. 4, pp. 87–112, 1994.
  8. A. Mahanipour and H. Nezamabadi-Pour, “A multiple feature construction method based on gravitational search algorithm,” Expert Systems with Applications, vol. 127, pp. 199–209, 2019.
  9. A. Thakkar and R. Lohiya, “Fusion of statistical importance for feature selection in deep neural network-based intrusion detection system,” Information Fusion, vol. 90, pp. 353–363, 2023.
  10. V. Kumar, D. Sinha, A. K. Das, S. C. Pandey, and R. T. Goswami, “An integrated rule based intrusion detection system: analysis on unsw-nb15 data set and the real time online dataset,” Cluster Computing, vol. 23, pp. 1397–1418, 2020.
  11. Z. Liu and Y. Shi, “A hybrid ids using ga-based feature selection method and random forest,” Int. J. Mach. Learn. Comput, vol. 12, no. 02, pp. 43–50, 2022.
  12. A. Nazir and R. A. Khan, “A novel combinatorial optimization based feature selection method for network intrusion detection,” Computers & Security, vol. 102, p. 102164, 2021.
  13. M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the kdd cup 99 data set,” in 2009 IEEE symposium on computational intelligence for security and defense applications.   Ieee, 2009, pp. 1–6.
  14. N. Moustafa and J. Slay, “Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set),” in 2015 military communications and information systems conference (MilCIS).   IEEE, 2015, pp. 1–6.
  15. N. Koroniotis, N. Moustafa, E. Sitnikova, and B. Turnbull, “Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset,” Future Generation Computer Systems, vol. 100, pp. 779–796, 2019.
  16. P. Ghosh, A. Karmakar, J. Sharma, and S. Phadikar, “Cs-pso based intrusion detection system in cloud environment,” in Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2018, Volume 1.   Springer, 2019, pp. 261–269.
  17. A. A. Heidari, S. Mirjalili, H. Faris, I. Aljarah, M. Mafarja, and H. Chen, “Harris hawks optimization: Algorithm and applications,” Future generation computer systems, vol. 97, pp. 849–872, 2019.
  18. S. Mirjalili, S. M. Mirjalili, and A. Hatamlou, “Multi-verse optimizer: a nature-inspired algorithm for global optimization,” Neural Computing and Applications, vol. 27, pp. 495–513, 2016.
  19. Y. Yang, H. Chen, A. A. Heidari, and A. H. Gandomi, “Hunger games search: Visions, conception, implementation, deep analysis, perspectives, and towards performance shifts,” Expert Systems with Applications, vol. 177, p. 114864, 2021.
  20. X.-B. Meng, X. Z. Gao, L. Lu, Y. Liu, and H. Zhang, “A new bio-inspired optimisation algorithm: Bird swarm algorithm,” Journal of Experimental & Theoretical Artificial Intelligence, vol. 28, no. 4, pp. 673–687, 2016.
  21. B. Abdollahzadeh, F. Soleimanian Gharehchopogh, and S. Mirjalili, “Artificial gorilla troops optimizer: a new nature-inspired metaheuristic algorithm for global optimization problems,” International Journal of Intelligent Systems, vol. 36, no. 10, pp. 5887–5958, 2021.
User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (2)
  1. Afsaneh Mahanipour (4 papers)
  2. Hana Khamfroush (12 papers)
X Twitter Logo Streamline Icon: https://streamlinehq.com