Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 5/2022

28.06.2022

A new design of intrusion detection in IoT sector using optimal feature selection and high ranking-based ensemble learning model

verfasst von: B. Gopalakrishnan, P. Purusothaman

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 5/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of Things (IoT) is a significant area in the digital era for the purpose of data collection and transferring them on the network without the help of a human, which shows that the whole world is linked over a single system. It can also be seen as the powerful force that operates modern health systems, home automation, improved manufacturing, and smart cities. IoT increases the chances of cyber threats due to the extensive usage of IoT devices and services. Thus, there is a required to design a robust Intrusion Detection System (IDS) to obtain better network security. The conventional machine learning methods are not optimum for processing complex network data by various intrusion methods. Subsequently, the conventional deep learning approaches in intrusion detection show their efficiency in only one-dimensional feature data, and also they are insufficient for predicting the unknown intrusions. This paper focuses on proposing a novel High Ranking-based Optimized Ensemble Learning Model (HR-OELM) using three different classifiers for developing an intelligent IDS. The first phase is data collection, in which the benchmark datasets are gathered. As the features or attributes associated with the IoT devices from benchmark source datasets are more, it is required to extract the most relevant data that could be highly efficient for attaining the high detection rate. Thus, the accurate feature selection is developed to construct a powerful classification methgods and to decreases the data dimensionality. The major highlight of the optimal feature selection is to decreases the correlation between the features giving unique information. These features are subjected to the proposed HR-OELM, in which the Deep Neural Network (DNN), Random Forest, and Adaboost classifiers are used. The detection performance is finalized based on the high ranking of output from three classifiers. One of the main contributions of the proposed IDS is the development of Adaptive Frequency-based Electric Fish Optimization (AF-EFO) for the optimal feature selection and variable optimization of HR-OELM, thus ensuring superior performance. Finally, the suggested ensemble learning model holds a minimum false-positive range and a maximum detection range than the other conventional traditional methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Aloqaily M, Otoum S, Al Ridhawi I, Jararweh Y (2019) An intrusion detection system for connected vehicles in smart cities. Ad Hoc Netw Aloqaily M, Otoum S, Al Ridhawi I, Jararweh Y (2019) An intrusion detection system for connected vehicles in smart cities. Ad Hoc Netw
2.
Zurück zum Zitat Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of Things: A survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 2347–2376CrossRef Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of Things: A survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 2347–2376CrossRef
3.
Zurück zum Zitat Mosenia A, Jha NK (2017) A comprehensive study of security of internet-of-things. IEEE Trans Emerg Top Comput 5(4):586–602CrossRef Mosenia A, Jha NK (2017) A comprehensive study of security of internet-of-things. IEEE Trans Emerg Top Comput 5(4):586–602CrossRef
4.
Zurück zum Zitat Adat V, Gupta BB (2018) Security in Internet of Things: issues, challenges, taxonomy, and architecture. Telecommun Syst 423–441CrossRef Adat V, Gupta BB (2018) Security in Internet of Things: issues, challenges, taxonomy, and architecture. Telecommun Syst 423–441CrossRef
5.
Zurück zum Zitat Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Futur Gener Comput Syst 82:761–768CrossRef Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Futur Gener Comput Syst 82:761–768CrossRef
6.
Zurück zum Zitat HaddadPajouh H, Dehghantanha A, Khayami R, Choo K (2018) A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting. Future Gener Comput Syst 85:88–96CrossRef HaddadPajouh H, Dehghantanha A, Khayami R, Choo K (2018) A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting. Future Gener Comput Syst 85:88–96CrossRef
7.
Zurück zum Zitat RandhirKumar PK, Tripathi R, Gupta GP, Garg S, Hassan MM (2022) A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network. J Parallel Distrib Comput 164:55–68CrossRef RandhirKumar PK, Tripathi R, Gupta GP, Garg S, Hassan MM (2022) A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network. J Parallel Distrib Comput 164:55–68CrossRef
8.
Zurück zum Zitat Raghuvanshi A et al (2022) Intrusion detection using machine learning for risk mitigation in IoT-enabled smart irrigation in smart farming. J Food Qual Raghuvanshi A et al (2022) Intrusion detection using machine learning for risk mitigation in IoT-enabled smart irrigation in smart farming. J Food Qual
9.
Zurück zum Zitat Geetha K, Brahmananda SH (2022) Network traffic analysis through deep learning for detection of an army of bots in health IoT network. Int J Pervasive Comput Commun Geetha K, Brahmananda SH (2022) Network traffic analysis through deep learning for detection of an army of bots in health IoT network. Int J Pervasive Comput Commun
10.
Zurück zum Zitat Balamurugan E, Mehbodniya A, Kariri E, Yadav K, Kumar A, AnulHaq M (2022) Network optimization using defender system in cloud computing security based intrusion detection system withgame theory deep neural network (IDSGT-DNN). Pattern Recognit Lett Balamurugan E, Mehbodniya A, Kariri E, Yadav K, Kumar A, AnulHaq M (2022) Network optimization using defender system in cloud computing security based intrusion detection system withgame theory deep neural network (IDSGT-DNN). Pattern Recognit Lett
11.
Zurück zum Zitat Ziegeldorf JH, Morchon OG, Wehrle K (2014) Privacy in the Internet of Things: Threats and challenges. Secur Commun Netw 7(12):2728–2742CrossRef Ziegeldorf JH, Morchon OG, Wehrle K (2014) Privacy in the Internet of Things: Threats and challenges. Secur Commun Netw 7(12):2728–2742CrossRef
12.
Zurück zum Zitat Eskandari M, Janjua ZH, Vecchio M, Antonelli F (2020) Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet Things J 7(8):6882–6897CrossRef Eskandari M, Janjua ZH, Vecchio M, Antonelli F (2020) Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet Things J 7(8):6882–6897CrossRef
13.
Zurück zum Zitat Atzori L, Iera A, Morabito G (2010) The Internet of Things: A survey. Comput Netw 54(1):27872805MATH Atzori L, Iera A, Morabito G (2010) The Internet of Things: A survey. Comput Netw 54(1):27872805MATH
14.
Zurück zum Zitat Rahman MA, Asyhari AT, Wen OW et al (2021) Effective combining of feature selection techniques for machine learning-enabled IoT intrusion detection. Multimed Tools Appl Rahman MA, Asyhari AT, Wen OW et al (2021) Effective combining of feature selection techniques for machine learning-enabled IoT intrusion detection. Multimed Tools Appl
15.
Zurück zum Zitat Mavromatis A, Colman-Meixner C, Silva AP, Vasilakos X, Nejabati R, Simeonidou D (2020) A software-defined IoT device management framework for edge and cloud computing. IEEE Internet Things J 7(3):1718–1735CrossRef Mavromatis A, Colman-Meixner C, Silva AP, Vasilakos X, Nejabati R, Simeonidou D (2020) A software-defined IoT device management framework for edge and cloud computing. IEEE Internet Things J 7(3):1718–1735CrossRef
16.
Zurück zum Zitat Elrawy M, Awad A, Hamed H (2018) Intrusion detection systems for IoT-based smart environments: a survey. J Cloud Comput. 7(21) Elrawy M, Awad A, Hamed H (2018) Intrusion detection systems for IoT-based smart environments: a survey. J Cloud Comput. 7(21)
17.
Zurück zum Zitat Zarpelao BB, Miani RS, Kawakani CT, Alvarenga SCD (2017) A survey of intrusion detection in internet of things. J Netw Comput Appl 84:25–37CrossRef Zarpelao BB, Miani RS, Kawakani CT, Alvarenga SCD (2017) A survey of intrusion detection in internet of things. J Netw Comput Appl 84:25–37CrossRef
18.
Zurück zum Zitat Davahli A, Shamsi M, Abaei G (2020) Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for IoT wireless networks. J Ambient Intell Humaniz Comput 11:5581–5609CrossRef Davahli A, Shamsi M, Abaei G (2020) Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for IoT wireless networks. J Ambient Intell Humaniz Comput 11:5581–5609CrossRef
19.
Zurück zum Zitat Hosseinpour F, Amoli PV, Plosila J, Hamalainen T (2016) An intrusion detection system for fog computing and IoT based logistic systems using a smart data approach. Int J Digit Content Technol Appl 10(5):34–46 Hosseinpour F, Amoli PV, Plosila J, Hamalainen T (2016) An intrusion detection system for fog computing and IoT based logistic systems using a smart data approach. Int J Digit Content Technol Appl 10(5):34–46
20.
Zurück zum Zitat Keserwani PK, Govil MC, Pilli ES et al (2021) A smart anomaly-based intrusion detection system for the Internet of Things (IoT) network using GWO–PSO–RF model. J Reliab Intell Environ 7:3–21CrossRef Keserwani PK, Govil MC, Pilli ES et al (2021) A smart anomaly-based intrusion detection system for the Internet of Things (IoT) network using GWO–PSO–RF model. J Reliab Intell Environ 7:3–21CrossRef
21.
Zurück zum Zitat Gothawal DB, Nagaraj SV (2020) Anomaly-based intrusion detection system in RPL by applying stochastic and evolutionary game models over IoT environment. Wirel Pers Commun 110:1323–1344CrossRef Gothawal DB, Nagaraj SV (2020) Anomaly-based intrusion detection system in RPL by applying stochastic and evolutionary game models over IoT environment. Wirel Pers Commun 110:1323–1344CrossRef
22.
Zurück zum Zitat Li D, Cai Z, Deng L et al (2019) Information security model of block chain based on intrusion sensing in the IoT environment. Clust Comput 22:451–468CrossRef Li D, Cai Z, Deng L et al (2019) Information security model of block chain based on intrusion sensing in the IoT environment. Clust Comput 22:451–468CrossRef
23.
Zurück zum Zitat Verma A, Ranga V (2019) Machine learning based intrusion detection systems for IoT applications. Wirel Pers Commun Verma A, Ranga V (2019) Machine learning based intrusion detection systems for IoT applications. Wirel Pers Commun
24.
Zurück zum Zitat Mandal K, Rajkumar M, Ezhumalai P, Jayakumar D, Yuvarani R (2020) Improved security using machine learning for IoT intrusion detection system. Mater Today Proc Mandal K, Rajkumar M, Ezhumalai P, Jayakumar D, Yuvarani R (2020) Improved security using machine learning for IoT intrusion detection system. Mater Today Proc
25.
Zurück zum Zitat Otoum Y, Liu D, Nayak A (2019) DL-IDS: a deep learning–based intrusion detection framework for securing IoT. Trans Emerg Telecommun Technol Otoum Y, Liu D, Nayak A (2019) DL-IDS: a deep learning–based intrusion detection framework for securing IoT. Trans Emerg Telecommun Technol
26.
Zurück zum Zitat Li W, Meng W, Au MH (2020) Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments. J Netw Comput Appl 161 Li W, Meng W, Au MH (2020) Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments. J Netw Comput Appl 161
27.
Zurück zum Zitat Almiani M, AbuGhazleh A, Al-Rahayfeh A, Atiewi A, Razaque A (2020) Deep recurrent neural network for IoT intrusion detection system. Simul Model Pract Theor 101 Almiani M, AbuGhazleh A, Al-Rahayfeh A, Atiewi A, Razaque A (2020) Deep recurrent neural network for IoT intrusion detection system. Simul Model Pract Theor 101
28.
Zurück zum Zitat Li Y, Xu Y, Liu Z, Hou H, Zheng Y, Xin Y, Zhao Y, Cui L (2020) Robust detection for network intrusion of industrial IoT based on multi-CNN fusion. Measurement 154 Li Y, Xu Y, Liu Z, Hou H, Zheng Y, Xin Y, Zhao Y, Cui L (2020) Robust detection for network intrusion of industrial IoT based on multi-CNN fusion. Measurement 154
29.
Zurück zum Zitat Yahyaoui A, Abdellatif T, Yangui S, Attia R (2021) READ-IoT: Reliable event and anomaly detection framework for the Internet of Things. IEEE Access 9:24168–24186CrossRef Yahyaoui A, Abdellatif T, Yangui S, Attia R (2021) READ-IoT: Reliable event and anomaly detection framework for the Internet of Things. IEEE Access 9:24168–24186CrossRef
30.
Zurück zum Zitat Mishra N, Pandya S (2021) Internet of Things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review. IEEE Access 9:59353–59377CrossRef Mishra N, Pandya S (2021) Internet of Things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review. IEEE Access 9:59353–59377CrossRef
31.
Zurück zum Zitat Moustafa N, Turnbull B, Choo KR (2019) An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of Things. IEEE Internet Things J 6(3):4815–4830CrossRef Moustafa N, Turnbull B, Choo KR (2019) An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of Things. IEEE Internet Things J 6(3):4815–4830CrossRef
32.
Zurück zum Zitat Attota DC, Mothukuri V, Parizi RM, Pouriyeh S (2021) An ensemble multi-view federated learning intrusion detection for IoT. IEEE Access 9:117734–117745CrossRef Attota DC, Mothukuri V, Parizi RM, Pouriyeh S (2021) An ensemble multi-view federated learning intrusion detection for IoT. IEEE Access 9:117734–117745CrossRef
33.
Zurück zum Zitat Siddiqui AJ, Boukerche A (2021) TempoCode-IoT: temporal codebook-based encoding of flow features for intrusion detection in Internet of Things. Cluster Comput 24:17–35CrossRef Siddiqui AJ, Boukerche A (2021) TempoCode-IoT: temporal codebook-based encoding of flow features for intrusion detection in Internet of Things. Cluster Comput 24:17–35CrossRef
34.
Zurück zum Zitat Lee JD, Cha HS, Rathore S, Park JH (2021) M-IDM: A multi-classication based intrusion detection model in healthcare IoT. Comput Mater Continua 67(2) Lee JD, Cha HS, Rathore S, Park JH (2021) M-IDM: A multi-classication based intrusion detection model in healthcare IoT. Comput Mater Continua 67(2)
35.
Zurück zum Zitat Yilmaz S, Sen S (2020) Electric fish optimization: a new heuristic algorithm inspired by electrolocation. Neural Comput Appl 32:11543–11578CrossRef Yilmaz S, Sen S (2020) Electric fish optimization: a new heuristic algorithm inspired by electrolocation. Neural Comput Appl 32:11543–11578CrossRef
36.
Zurück zum Zitat Ali MH et al (2022) Threat analysis and Distributed Denial of Service (DDoS) attack recognition in the Internet of Things (IoT). Electroinics 11(3):494 Ali MH et al (2022) Threat analysis and Distributed Denial of Service (DDoS) attack recognition in the Internet of Things (IoT). Electroinics 11(3):494
37.
Zurück zum Zitat Naseer S et al (2018) Enhanced network anomaly detection based on deep neural networks. IEEE Access 6:48231–48246CrossRef Naseer S et al (2018) Enhanced network anomaly detection based on deep neural networks. IEEE Access 6:48231–48246CrossRef
38.
Zurück zum Zitat Lee S, Chen T, Yu L, Lai C (2018) Image classification based on the boost convolutional neural network. IEEE Access 6:12755–12768CrossRef Lee S, Chen T, Yu L, Lai C (2018) Image classification based on the boost convolutional neural network. IEEE Access 6:12755–12768CrossRef
39.
Zurück zum Zitat Tesfahun A, Bhaskari DL (2013) Intrusion detection using random forests classifier with SMOTE and feature reduction. Int Conf Cloud Ubiquitous Comput Emerg Technol Tesfahun A, Bhaskari DL (2013) Intrusion detection using random forests classifier with SMOTE and feature reduction. Int Conf Cloud Ubiquitous Comput Emerg Technol
40.
Zurück zum Zitat Liu J, Yang D, Lian M, Li M (2021) Research on intrusion detection based on particle swarm optimization in IoT. IEEE Access 9:38254–38268CrossRef Liu J, Yang D, Lian M, Li M (2021) Research on intrusion detection based on particle swarm optimization in IoT. IEEE Access 9:38254–38268CrossRef
41.
Zurück zum Zitat Guo MW, Wang JS, Zhu LF, Guo SS, Xie W (2020) An improved grey wolf optimizer based on tracking and seeking modes to solve function optimization problems. IEEE Access 8:69861–69893CrossRef Guo MW, Wang JS, Zhu LF, Guo SS, Xie W (2020) An improved grey wolf optimizer based on tracking and seeking modes to solve function optimization problems. IEEE Access 8:69861–69893CrossRef
42.
Zurück zum Zitat Vijayanand R, Devaraj D (2020) A novel feature selection method using whale optimization algorithm and genetic operators for intrusion detection system in wireless mesh network. IEEE Access 8:56847–56854CrossRef Vijayanand R, Devaraj D (2020) A novel feature selection method using whale optimization algorithm and genetic operators for intrusion detection system in wireless mesh network. IEEE Access 8:56847–56854CrossRef
43.
Zurück zum Zitat Gao X, Shan C, Hu C, Niu Z, Liu Z (2019) An adaptive ensemble machine learning model for intrusion detection. IEEE Access 7:82512–82521CrossRef Gao X, Shan C, Hu C, Niu Z, Liu Z (2019) An adaptive ensemble machine learning model for intrusion detection. IEEE Access 7:82512–82521CrossRef
44.
Zurück zum Zitat Tao P, Sun Z, Sun Z (2018) An improved intrusion detection algorithm based on GA and SVM. IEEE Access 6:13624–13631CrossRef Tao P, Sun Z, Sun Z (2018) An improved intrusion detection algorithm based on GA and SVM. IEEE Access 6:13624–13631CrossRef
45.
Zurück zum Zitat Haghighat MH, Li J (2021) Intrusion detection system using voting-based neural network. Tsinghua Sci Technol 26(4):484–495CrossRef Haghighat MH, Li J (2021) Intrusion detection system using voting-based neural network. Tsinghua Sci Technol 26(4):484–495CrossRef
Metadaten
Titel
A new design of intrusion detection in IoT sector using optimal feature selection and high ranking-based ensemble learning model
verfasst von
B. Gopalakrishnan
P. Purusothaman
Publikationsdatum
28.06.2022
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 5/2022
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-022-01336-1

Weitere Artikel der Ausgabe 5/2022

Peer-to-Peer Networking and Applications 5/2022 Zur Ausgabe

Premium Partner