skip to main content
research-article

An Efficient Cyber Assault Detection System using Feature Optimization for IoT-based Cyberspace

Published: 24 July 2024 Publication History

Abstract

With the exponential growth in connected smart devices that interchange sensitive, crucial, and personal data over the Internet of Things (IoT)-based cyberspace, IoT becomes undefended to cyber assaults. Intrusion Detection System (IDS) is a vital segment of security tool to detect cyber assaults. However, IDS produce high False Positive Rate (FPR) because IDS improves accuracy at the same time as it increases FPR. Therefore, a more effective cyber assaults detection system is needed. Based on the aforementioned issues, this paper proposes an approach to recognizing cyber assaults in the IoT environment. This approach first performs various data pre-processing steps. Next, important features are optimized using modified Binary Pigeon Inspired Optimizer. After that, optimized feature subset is fed separately to the monolithic classifiers such as k-Nearest Neighbours (kNN), Support Vector Machine (SVM), Decision Tree (DT) and bagging-based ensemble model such as Random Forest (RF) for detection of cyber assaults. In this study, UNSW-NB15 is used to test the success of the system, and related existing methods are compared with these results. Based on the results of the experiment, the proposed system with RF is the most effective in terms of accuracy (99.41%), F1-score (99.33%), detection rate (99.09%), and precision (99.92%) with a minimum FPR (0.03%) for a subset of optimized features (4 independent features out of 42).

References

[1]
O. Abu Alghanam, W. Almobaideen, M. Saadeh, O. Adwan, An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning, Expert Syst. Appl. 213 (PA) (2023),.
[2]
W. Almobaideen, M. Altarawneh, Fog computing: survey on decoy information technology, Int. J. Secur. Networks 15 (2) (2020) 111,.
[3]
S.S. Gopalan, A. Raza, W. Almobaideen, IoT Security in Healthcare using AI: A Survey, in: 2020 International Conference on Communications, Signal Processing, and their Applications (ICCSPA), 2021, pp. 1–6,. Mar.
[4]
M.S. Abu, S.R. Selamat, A. Ariffin, R. Yusof, Cyber threat intelligence – Issue and challenges, Indones. J. Electr. Eng. Comput. Sci. 10 (1) (2018) 371–379,.
[5]
Google, How Google Cloud blocked largest Layer 7 DDoS attack yet, 46 million rps | Google Cloud Blog, Google Cloud Blog (2022) https://cloud.google.com/blog/products/identity-security/how-google-cloud-blocked-largest-layer-7-ddos-attack-at-46-million-rps.
[6]
Alicia Hope, “Fourth-largest-generic-drugs-manufacturer-sun-pharmaceuticals-hit-by-ransomware-attack,” 2023. https://www.cpomagazine.com/cyber-security/fourth-largest-generic-drugs-manufacturer-sun-pharmaceuticals-hit-by-ransomware-attack/.
[7]
P. Kumar, G.P. Gupta, R. Tripathi, Toward Design of an Intelligent Cyber Attack Detection System using Hybrid Feature Reduced Approach for IoT Networks, Arab. J. Sci. Eng. 46 (4) (2021) 3749–3778,. Apr.
[8]
H. Alazzam, A. Sharieh, K.E. Sabri, A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer, Expert Syst. Appl. 148 (2020),.
[9]
Y. Zhou, G. Cheng, S. Jiang, M. Dai, Building an efficient intrusion detection system based on feature selection and ensemble classifier, Comput. Networks 174 (2019) 2020,. October.
[10]
V. Hajisalem, S. Babaie, A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection, Comput. Networks 136 (2018) 37–50,.
[11]
M.R. Gauthama Raman, et al., An efficient intrusion detection technique based on support vector machine and improved binary gravitational search algorithm, 53, Springer Netherlands, 2020.
[12]
A. Nazir, R.A. Khan, A novel combinatorial optimization based feature selection method for network intrusion detection, Comput. Secur. 102 (2021),.
[13]
P. Kumar, R. Kumar, G.P. Gupta, R. Tripathi, G. Srivastava, P2TIF: A Blockchain and Deep Learning Framework for Privacy-Preserved Threat Intelligence in Industrial IoT, IEEE Trans. Ind. Informatics 18 (9) (2022) 6358–6367,. Sep.
[14]
S.K. Smmarwar, G.P. Gupta, S. Kumar, Deep malware detection framework for IoT-based smart agriculture, Comput. Electr. Eng. 104 (PA) (2022),.
[15]
R. SaiSindhuTheja, G.K. Shyam, An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment, Appl. Soft Comput. 100 (2021),.
[16]
A. Oseni, et al., An Explainable Deep Learning Framework for Resilient Intrusion Detection in IoT-Enabled Transportation Networks, IEEE Trans. Intell. Transp. Syst. 24 (1) (2023) 1000–1014,. Jan.
[17]
C. Xu, J. Shen, X. Du, F. Zhang, An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units, IEEE Access 6 (2018) 48697–48707,.
[18]
A.K. Dey, G.P. Gupta, S.P. Sahu, A metaheuristic-based ensemble feature selection framework for cyber threat detection in IoT-enabled networks, Decis. Anal. J. 7 (March) (2023),.
[19]
H. Duan, P. Qiao, Pigeon-inspired optimization: a new swarm intelligence optimizer for air robot path planning, Int. J. Intell. Comput. Cybern. 7 (1) (2014) 24–37,. Mar.
[20]
D. Gupta, P.S. Joshi, A.K. Bhattacharjee, R.S. Mundada, IDS alerts classification using knowledge-based evaluation, in: 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012), 2012, pp. 1–8,. Jan.
[21]
D.L. Tong, R. Mintram, Genetic Algorithm-Neural Network (GANN): A study of neural network activation functions and depth of genetic algorithm search applied to feature selection, Int. J. Mach. Learn. Cybern. 1 (1–4) (2010) 75–87,.
[22]
A.K. Dey, G.P. Gupta, S.P. Sahu, Hybrid Meta-Heuristic based Feature Selection Mechanism for Cyber-Attack Detection in IoT-enabled Networks, Procedia Comput. Sci. 218 (2023) 318–327,.
[23]
N. Moustafa, J. Slay, UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set, in: 2015 Military Communications and Information Systems Conference (MilCIS), 2015, pp. 1–6,. Nov.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Procedia Computer Science
Procedia Computer Science  Volume 235, Issue C
2024
3497 pages
ISSN:1877-0509
EISSN:1877-0509
Issue’s Table of Contents

Publisher

Elsevier Science Publishers B. V.

Netherlands

Publication History

Published: 24 July 2024

Author Tags

  1. Ensemble learning
  2. Internet of things
  3. Cyber Assaults
  4. Random Forest
  5. Feature Selection

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media