Skip to main content
Top
Published in: Telecommunication Systems 1/2022

27-06-2022

Implementing attack detection system using filter-based feature selection methods for fog-enabled IoT networks

Authors: Pooja Chaudhary, Brij Gupta, A. K. Singh

Published in: Telecommunication Systems | Issue 1/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Internet-of-Things (IoT) has become an enthralling attacking surface for attackers to explode multitude of cyber-attacks. Distributed Denial of Service (DDoS) attack has transpired as the most menacing attack in the IoT networks. In this article, we propose an attack detection system to identify anomalous activities in the fog-enabled IoT network. Initially, authors have investigated exhaustively on the performance of filter-based feature selection algorithms comprising ReliefF, Correlation Feature Selection (CFS), Information Gain (IG), and Minimum-Redundancy-Maximum-Relevancy (mRMR) and distinct categories classification algorithms upon the prepared dataset consisting of IoT network specific features. Performance of the tested classification algorithm is assessed using prominent evaluation measures. Moreover, response time of classifiers is calculated for centralized and fog-enabled IoT network infrastructure. The experimental outcomes unveil that, in terms of both accuracy and latency, J48 classifier outperforms all other tested classifier with mRMR feature selection algorithm.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787–2805.CrossRef Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787–2805.CrossRef
2.
go back to reference Mirsadeghi, F., Rafsanjani, M. K., et al. (2021). A trust infrastructure-based authentication method for clustered vehicular ad hoc networks. Peer-to-Peer Networking and Applications, 14(4), 2537–2553.CrossRef Mirsadeghi, F., Rafsanjani, M. K., et al. (2021). A trust infrastructure-based authentication method for clustered vehicular ad hoc networks. Peer-to-Peer Networking and Applications, 14(4), 2537–2553.CrossRef
3.
go back to reference Shah, S. H., & Yaqoob, I. (2016, August). A survey: Internet of Things (IOT) technologies, applications and challenges. In 2016 IEEE smart energy grid engineering (SEGE) (pp. 381–385). IEEE. Shah, S. H., & Yaqoob, I. (2016, August). A survey: Internet of Things (IOT) technologies, applications and challenges. In 2016 IEEE smart energy grid engineering (SEGE) (pp. 381–385). IEEE.
4.
go back to reference Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347–2376.CrossRef Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347–2376.CrossRef
5.
go back to reference Asghari, P., Rahmani, A. M., & Javadi, H. H. S. (2019). Internet of Things applications: A systematic review. Computer Networks, 148, 241–261.CrossRef Asghari, P., Rahmani, A. M., & Javadi, H. H. S. (2019). Internet of Things applications: A systematic review. Computer Networks, 148, 241–261.CrossRef
7.
go back to reference Meneghello, F., Calore, M., Zucchetto, D., Polese, M., & Zanella, A. (2019). IoT: Internet of Threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet of Things Journal, 6(5), 8182–8201.CrossRef Meneghello, F., Calore, M., Zucchetto, D., Polese, M., & Zanella, A. (2019). IoT: Internet of Threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet of Things Journal, 6(5), 8182–8201.CrossRef
8.
go back to reference Singh, A., et al. (2022). Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1–43.CrossRef Singh, A., et al. (2022). Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1–43.CrossRef
9.
go back to reference Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80–84.CrossRef Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80–84.CrossRef
11.
go back to reference Haider, W., Creech, G., Xie, Y., & Hu, J. (2016). Windows based data sets for evaluation of robustness of host based intrusion detection systems (IDS) to zero-day and stealth attacks. Future Internet, 8(3), 29.CrossRef Haider, W., Creech, G., Xie, Y., & Hu, J. (2016). Windows based data sets for evaluation of robustness of host based intrusion detection systems (IDS) to zero-day and stealth attacks. Future Internet, 8(3), 29.CrossRef
13.
go back to reference Alrawais, A., Alhothaily, A., Hu, C., & Cheng, X. (2017). Fog computing for the internet of things: Security and privacy issues. IEEE Internet Computing, 21(2), 34–42.CrossRef Alrawais, A., Alhothaily, A., Hu, C., & Cheng, X. (2017). Fog computing for the internet of things: Security and privacy issues. IEEE Internet Computing, 21(2), 34–42.CrossRef
14.
go back to reference Zarpelão, B. B., Miani, R. S., Kawakani, C. T., & de Alvarenga, S. C. (2017). A survey of intrusion detection in Internet of Things. Journal of Network and Computer Applications, 84, 25–37.CrossRef Zarpelão, B. B., Miani, R. S., Kawakani, C. T., & de Alvarenga, S. C. (2017). A survey of intrusion detection in Internet of Things. Journal of Network and Computer Applications, 84, 25–37.CrossRef
15.
go back to reference Li, S., Qin, D., Wu, X., Li, J., Li, B., & Han, W. (2022). False alert detection based on deep learning and machine learning. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1–21. Li, S., Qin, D., Wu, X., Li, J., Li, B., & Han, W. (2022). False alert detection based on deep learning and machine learning. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1–21.
16.
go back to reference John, N., & Sam, S. (2021). Provably secure data sharing approach for personal health records in cloud storage using session password, data access key, and circular interpolation. International Journal on Semantic Web and Information Systems (IJSWIS), 17(4), 76–98.CrossRef John, N., & Sam, S. (2021). Provably secure data sharing approach for personal health records in cloud storage using session password, data access key, and circular interpolation. International Journal on Semantic Web and Information Systems (IJSWIS), 17(4), 76–98.CrossRef
17.
go back to reference Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum, G., & Ghani, N. (2019). Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations. IEEE Communications Surveys & Tutorials, 21(3), 2702–2733.CrossRef Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum, G., & Ghani, N. (2019). Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations. IEEE Communications Surveys & Tutorials, 21(3), 2702–2733.CrossRef
18.
go back to reference Prabavathy, S., Sundarakantham, K., & Shalinie, S. M. (2018). Design of cognitive fog computing for intrusion detection in Internet of Things. Journal of Communications and Networks, 20(3), 291–298.CrossRef Prabavathy, S., Sundarakantham, K., & Shalinie, S. M. (2018). Design of cognitive fog computing for intrusion detection in Internet of Things. Journal of Communications and Networks, 20(3), 291–298.CrossRef
19.
go back to reference Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82, 761–768.CrossRef Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82, 761–768.CrossRef
20.
go back to reference Thamilarasu, G., & Chawla, S. (2019). Towards deep-learning-driven intrusion detection for the internet of things. Sensors, 19(9), 1977.CrossRef Thamilarasu, G., & Chawla, S. (2019). Towards deep-learning-driven intrusion detection for the internet of things. Sensors, 19(9), 1977.CrossRef
21.
go back to reference Mehmood, A., Mukherjee, M., Ahmed, S. H., Song, H., & Malik, K. M. (2018). NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks. The Journal of Supercomputing, 74(10), 5156–5170.CrossRef Mehmood, A., Mukherjee, M., Ahmed, S. H., Song, H., & Malik, K. M. (2018). NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks. The Journal of Supercomputing, 74(10), 5156–5170.CrossRef
22.
go back to reference Roopak, M., Tian, G. Y., & Chambers, J. (2019, January). Deep learning models for cyber security in IoT networks. In 2019 IEEE 9th annual computing and communication workshop and conference (CCWC) (pp. 0452–0457). IEEE. Roopak, M., Tian, G. Y., & Chambers, J. (2019, January). Deep learning models for cyber security in IoT networks. In 2019 IEEE 9th annual computing and communication workshop and conference (CCWC) (pp. 0452–0457). IEEE.
23.
go back to reference Dao, N. N., Phan, T. V., Sa’ad, U., Kim, J., Bauschert, T., Do, D. T., & Cho, S. (2021). Securing heterogeneous iot with intelligent ddos attack behavior learning. IEEE Systems Journal. Dao, N. N., Phan, T. V., Sa’ad, U., Kim, J., Bauschert, T., Do, D. T., & Cho, S. (2021). Securing heterogeneous iot with intelligent ddos attack behavior learning. IEEE Systems Journal.
24.
go back to reference Anthi, E., Williams, L., Słowińska, M., Theodorakopoulos, G., & Burnap, P. (2019). A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things Journal, 6(5), 9042–9053.CrossRef Anthi, E., Williams, L., Słowińska, M., Theodorakopoulos, G., & Burnap, P. (2019). A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things Journal, 6(5), 9042–9053.CrossRef
25.
go back to reference Nguyen, G. N., Le Viet, N. H., Elhoseny, M., Shankar, K., et al. (2021). Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model. Journal of Parallel and Distributed Computing, 153, 150–160.CrossRef Nguyen, G. N., Le Viet, N. H., Elhoseny, M., Shankar, K., et al. (2021). Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model. Journal of Parallel and Distributed Computing, 153, 150–160.CrossRef
26.
go back to reference Cvitić, I., Peraković, D., Periša, M., et al. (2021). Ensemble machine learning approach for classification of IoT devices in smart home. International Journal of Machine Learning and Cybernetics, 12(11), 3179–3202.CrossRef Cvitić, I., Peraković, D., Periša, M., et al. (2021). Ensemble machine learning approach for classification of IoT devices in smart home. International Journal of Machine Learning and Cybernetics, 12(11), 3179–3202.CrossRef
27.
go back to reference Soe, Y. N., Feng, Y., Santosa, P. I., Hartanto, R., & Sakurai, K. (2020). Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features. Electronics, 9(1), 144.CrossRef Soe, Y. N., Feng, Y., Santosa, P. I., Hartanto, R., & Sakurai, K. (2020). Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features. Electronics, 9(1), 144.CrossRef
28.
go back to reference Roopak, M., Tian, G. Y., & Chambers, J. (2020). Multi-objective-based feature selection for DDoS attack detection in IoT networks. IET Networks, 9(3), 120–127.CrossRef Roopak, M., Tian, G. Y., & Chambers, J. (2020). Multi-objective-based feature selection for DDoS attack detection in IoT networks. IET Networks, 9(3), 120–127.CrossRef
29.
go back to reference Guerra-Manzanares, A., Bahsi, H., & Nomm, S. (2019, October). Hybrid feature selection models for machine learning based botnet detection in IoT networks. In 2019 International Conference on Cyberworlds (CW) (pp. 324–327). IEEE. Guerra-Manzanares, A., Bahsi, H., & Nomm, S. (2019, October). Hybrid feature selection models for machine learning based botnet detection in IoT networks. In 2019 International Conference on Cyberworlds (CW) (pp. 324–327). IEEE.
30.
go back to reference Mohammadi, S., Mirvaziri, H., Ghazizadeh-Ahsaee, M., & Karimipour, H. (2019). Cyber intrusion detection by combined feature selection algorithm. Journal of Information Security and Applications, 44, 80–88.CrossRef Mohammadi, S., Mirvaziri, H., Ghazizadeh-Ahsaee, M., & Karimipour, H. (2019). Cyber intrusion detection by combined feature selection algorithm. Journal of Information Security and Applications, 44, 80–88.CrossRef
31.
go back to reference Rathore, S., & Park, J. H. (2018). Semi-supervised learning based distributed attack detection framework for IoT. Applied Soft Computing, 72, 79–89.CrossRef Rathore, S., & Park, J. H. (2018). Semi-supervised learning based distributed attack detection framework for IoT. Applied Soft Computing, 72, 79–89.CrossRef
32.
go back to reference Chandrashekar, G., & Sahin, F. (2014). A survey on feature selection methods. Computers & Electrical Engineering, 40(1), 16–28.CrossRef Chandrashekar, G., & Sahin, F. (2014). A survey on feature selection methods. Computers & Electrical Engineering, 40(1), 16–28.CrossRef
33.
go back to reference Kira, K., & Rendell, L. A. (1992). A practical approach to feature selection. In Machine learning proceedings 1992 (pp. 249–256). Morgan Kaufmann. Kira, K., & Rendell, L. A. (1992). A practical approach to feature selection. In Machine learning proceedings 1992 (pp. 249–256). Morgan Kaufmann.
34.
go back to reference Robnik-Šikonja, M., & Kononenko, I. (2003). Theoretical and empirical analysis of ReliefF and RReliefF. Machine learning, 53(1), 23–69.CrossRef Robnik-Šikonja, M., & Kononenko, I. (2003). Theoretical and empirical analysis of ReliefF and RReliefF. Machine learning, 53(1), 23–69.CrossRef
35.
go back to reference Hall, M. A. (1999). Correlation-based feature selection for machine learning. Hall, M. A. (1999). Correlation-based feature selection for machine learning.
36.
go back to reference Tang, J., Alelyani, S., & Liu, H. (2014). Feature selection for classification: A review. Data classification: Algorithms and applications (pp. 1–37). Tang, J., Alelyani, S., & Liu, H. (2014). Feature selection for classification: A review. Data classification: Algorithms and applications (pp. 1–37).
37.
go back to reference Koller, D., & Sahami, M. (1996). Toward optimal feature selection. Stanford InfoLab. Koller, D., & Sahami, M. (1996). Toward optimal feature selection. Stanford InfoLab.
38.
go back to reference Peng, H., Long, F., & Ding, C. (2005). Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy. IEEE Transactions on pattern analysis and machine intelligence, 27(8), 1226–1238.CrossRef Peng, H., Long, F., & Ding, C. (2005). Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy. IEEE Transactions on pattern analysis and machine intelligence, 27(8), 1226–1238.CrossRef
39.
go back to reference Bakhtiar, F. A., Pramukantoro, E. S., & Nihri, H. (2019, March). A lightweight IDS based on J48 algorithm for detecting DoS attacks on IoT middleware. In 2019 IEEE 1st global conference on life sciences and technologies (LifeTech) (pp. 41–42). IEEE. Bakhtiar, F. A., Pramukantoro, E. S., & Nihri, H. (2019, March). A lightweight IDS based on J48 algorithm for detecting DoS attacks on IoT middleware. In 2019 IEEE 1st global conference on life sciences and technologies (LifeTech) (pp. 41–42). IEEE.
40.
go back to reference Rish, I. (2001, August). An empirical study of the naive Bayes classifier. In IJCAI 2001 workshop on empirical methods in artificial intelligence (Vol. 3, No. 22, pp. 41–46). Rish, I. (2001, August). An empirical study of the naive Bayes classifier. In IJCAI 2001 workshop on empirical methods in artificial intelligence (Vol. 3, No. 22, pp. 41–46).
41.
go back to reference Van Gestel, T., Suykens, J. A., Baesens, B., Viaene, S., Vanthienen, J., Dedene, G., ... & Vandewalle, J. (2004). Benchmarking least squares support vector machine classifiers. Machine learning, 54(1), 5-32. Van Gestel, T., Suykens, J. A., Baesens, B., Viaene, S., Vanthienen, J., Dedene, G., ... & Vandewalle, J. (2004). Benchmarking least squares support vector machine classifiers. Machine learning, 54(1), 5-32.
42.
go back to reference Cutler, A., Cutler, D. R., & Stevens, J. R. (2012). Random forests. In Ensemble machine learning (pp. 157–175). Springer, Boston, MA. Cutler, A., Cutler, D. R., & Stevens, J. R. (2012). Random forests. In Ensemble machine learning (pp. 157–175). Springer, Boston, MA.
43.
go back to reference Chen, T., & Guestrin, C. (2016, August). Xgboost: A scalable tree boosting system. In Proceedings of the 22nd acm sigkdd international conference on knowledge discovery and data mining (pp. 785–794). Chen, T., & Guestrin, C. (2016, August). Xgboost: A scalable tree boosting system. In Proceedings of the 22nd acm sigkdd international conference on knowledge discovery and data mining (pp. 785–794).
44.
go back to reference Cheng, B., & Titterington, D. M. (1994). Neural networks: A review from a statistical perspective. Statistical Science, 2–30. Cheng, B., & Titterington, D. M. (1994). Neural networks: A review from a statistical perspective. Statistical Science, 2–30.
45.
go back to reference Hwang, Y. S., & Bang, S. Y. (1997). An efficient method to construct a radial basis function neural network classifier. Neural networks, 10(8), 1495–1503.CrossRef Hwang, Y. S., & Bang, S. Y. (1997). An efficient method to construct a radial basis function neural network classifier. Neural networks, 10(8), 1495–1503.CrossRef
47.
go back to reference Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., ... & Duchesnay, E. (2011). Scikit-learn: Machine learning in Python. The Journal of Machine Learning Research 12, 2825–2830. Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., ... & Duchesnay, E. (2011). Scikit-learn: Machine learning in Python. The Journal of Machine Learning Research 12, 2825–2830.
50.
go back to reference Yang, Y., Webb, G. I., & Wu, X. (2009). Discretization methods. In Data mining and knowledge discovery handbook (pp. 101–116). Springer, Boston, MA. Yang, Y., Webb, G. I., & Wu, X. (2009). Discretization methods. In Data mining and knowledge discovery handbook (pp. 101–116). Springer, Boston, MA.
51.
go back to reference Bergstra, J., & Bengio, Y. (2012). Random search for hyper-parameter optimization. Journal of Machine Learning Research, 13(2), 281–305. Bergstra, J., & Bengio, Y. (2012). Random search for hyper-parameter optimization. Journal of Machine Learning Research, 13(2), 281–305.
52.
go back to reference Rodriguez, J. D., Perez, A., & Lozano, J. A. (2009). Sensitivity analysis of k-fold cross validation in prediction error estimation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 32(3), 569–575.CrossRef Rodriguez, J. D., Perez, A., & Lozano, J. A. (2009). Sensitivity analysis of k-fold cross validation in prediction error estimation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 32(3), 569–575.CrossRef
53.
go back to reference Chui, K. T., Gupta, B. B., & Vasant, P. (2021). A genetic algorithm optimized rnn-lstm model for remaining useful life prediction of turbofan engine. Electronics, 10(3), 285.CrossRef Chui, K. T., Gupta, B. B., & Vasant, P. (2021). A genetic algorithm optimized rnn-lstm model for remaining useful life prediction of turbofan engine. Electronics, 10(3), 285.CrossRef
Metadata
Title
Implementing attack detection system using filter-based feature selection methods for fog-enabled IoT networks
Authors
Pooja Chaudhary
Brij Gupta
A. K. Singh
Publication date
27-06-2022
Publisher
Springer US
Published in
Telecommunication Systems / Issue 1/2022
Print ISSN: 1018-4864
Electronic ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-022-00927-w

Other articles of this Issue 1/2022

Telecommunication Systems 1/2022 Go to the issue