skip to main content
research-article

A Novel Hybrid Feature Selection with Cascaded LSTM: : Enhancing Security in IoT Networks

Published: 13 March 2024 Publication History

Abstract

The rapid growth of the Internet of Things (IoT) has created a situation where a huge amount of sensitive data is constantly being created and sent through many devices, making data security a top priority. In the complex network of IoT, detecting intrusions becomes a key part of strengthening security. Since IoT environments can be easily affected by a wide range of cyber threats, intrusion detection systems (IDS) are crucial for quickly finding and dealing with potential intrusions as they happen. IDS datasets can have a wide range of features, from just a few to several hundreds or even thousands. Managing such large datasets is a big challenge, requiring a lot of computer power and leading to long processing times. To build an efficient IDS, this article introduces a combined feature selection strategy using recursive feature elimination and information gain. Then, a cascaded long–short-term memory is used to improve attack classifications. This method achieved an accuracy of 98.96% and 99.30% on the NSL-KDD and UNSW-NB15 datasets, respectively, for performing binary classification. This research provides a practical strategy for improving the effectiveness and accuracy of intrusion detection in IoT networks.

References

[1]
M. Ali, M.-U. Haque, M. H. Durad, A. Usman, S. M. Mohsin, H. Mujlid, and C. Maple, “Effective network intrusion detection using stacking-based ensemble approach,” International Journal of Information Security, vol. 22, pp. 1781–1798, 2023.
[2]
C. Zhang, Z. Lian, H. Huang, and C. Su, “PCIDS: permission and credibility-based intrusion detection system in IoT gateways,” IEEE Internet of Things Journal, vol. 11, no. 1, pp. 904–913, 2024.
[3]
N. Elmrabit, F. Zhou, F. Li, and H. Zhou, “Evaluation of machine learning algorithms for anomaly detection,” in 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), pp. 1–8, IEEE, Dublin, Ireland, June 2020.
[4]
G. De Carvalho Bertoli, L. A. Pereira Junior, O. Saotome, A. L. Dos Santos, F. A. N. Verri, C. A. C. Marcondes, S. Barbieri, M. S. Rodrigues, and J. M. Parente De Oliveira, “An end-to-end framework for machine learning-based network intrusion detection system,” IEEE Access, vol. 9, pp. 106790–106805, 2021.
[5]
Z. Ahmad, A. S. Khan, C. W. Shiang, J. Abdullah, and F. Ahmad, “Network intrusion detection system: a systematic study of machine learning and deep learning approaches,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 1, 2021.
[6]
M. Al Lail, A. Garcia, and S. Olivo, “Machine learning for network intrusion detection—a comparative study,” Future Internet, vol. 15, no. 7, 2023.
[7]
A. A. Hagar and B. W. Gawali, “Apache spark and deep learning models for high-performance network intrusion detection using CSE-CIC-IDS2018,” Computational Intelligence and Neuroscience, vol. 2022, 11 pages, 2022.
[8]
B. Karthiga, D. Durairaj, N. Nawaz, T. K. Venkatasamy, G. Ramasamy, and A. Hariharasudan, “Intelligent intrusion detection system for VANET using machine learning and deep learning approaches,” Wireless Communications and Mobile Computing, vol. 2022, 13 pages, 2022.
[9]
B. Kim, K. R. S. Preethaa, Z. Chen, Y. Natarajan, G. Wadhwa, and H. M. Lee, “Predicting the lateral displacement of tall buildings using an LSTM-based deep learning approach,” Wind and Structures, vol. 36, no. 6, pp. 379–392, 2023.
[10]
F. Zhai, T. Yang, H. Chen, B. He, and S. Li, “Intrusion detection method based on CNN–GRU–FL in a smart grid environment,” Electronics, vol. 12, no. 5, 2023.
[11]
S. H. Park, H. J. Park, and Y.-J. Choi, “RNN-based prediction for network intrusion detection,” in 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), pp. 572–574, IEEE, Fukuoka, Japan, February 2020.
[12]
S. Karthic and S. M. Kumar, “Hybrid optimized deep neural network with enhanced conditional random field based intrusion detection on wireless sensor network,” Neural Processing Letters, vol. 55, pp. 459–479, 2023.
[13]
I. S. Thaseen, J. S. Banu, K. Lavanya, M. R. Ghalib, and K. Abhishek, “An integrated intrusion detection system using correlation-based feature selection and artificial neural network,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 2, 2021.
[14]
H. Jiang, Z. He, G. Ye, and H. Zhang, “Network intrusion detection based on PSO-Xgboost model,” IEEE Access, vol. 8, pp. 58392–58401, 2020.
[15]
M. Safaldin, M. Otair, and L. Abualigah, “Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, pp. 1559–1576, 2021.
[16]
A. Nazir and R. A. Khan, “A novel combinatorial optimization based feature selection method for network intrusion detection,” Computers & Security, vol. 102, 2021.
[17]
P. J. Prakash and B. Lalitha, “Optimized ensemble classifier based network intrusion detection system for RPL based internet of things,” Wireless Personal Communications, vol. 125, pp. 3603–3626, 2022.
[18]
S. M. Kasongo, “A deep learning technique for intrusion detection system using a recurrent neural networks based framework,” Computer Communications, vol. 199, pp. 113–125, 2023.
[19]
S. M. Kasongo and Y. Sun, “A deep learning method with wrapper based feature extraction for wireless intrusion detection system,” Computers & Security, vol. 92, 2020.
[20]
W. Elmasry, A. Akbulut, and A. H. Zaim, “Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic,” Computer Networks, vol. 168, 2020.
[21]
Y. Yin, J. Jang-Jaccard, W. Xu, A. Singh, J. Zhu, F. Sabrina, and J. Kwak, “IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset,” Journal of Big Data, vol. 10, 2023.
[22]
S. Mishra, “An optimized gradient boost decision tree using enhanced african buffalo optimization method for cyber security intrusion detection,” Applied Sciences, vol. 12, no. 24, 2022.
[23]
S. K. Gautam, A. Henry, M. Zuhair, M. Rashid, A. R. Javed, and P. K. R. Maddikunta, “A composite approach of intrusion detection systems: hybrid RNN and correlation-based feature optimization,” Electronics, vol. 11, no. 21, 2022.
[24]
M. A. Duhayyim, J. S. Alzahrani, H. A. Mengash, M. M. Alnfiai, R. Marzouk, G. P. Mohammed, M. Rizwanullah, and A. A. Abdelmageed, “Modified garden balsan optimization based machine learning for intrusion detection,” Computer Systems Science and Engineering, vol. 46, no. 2, pp. 1471–1485, 2023.
[25]
S. S. Kareem, R. R. Mostafa, F. A. Hashim, and H. M. El-Bakry, “An effective feature selection model using hybrid metaheuristic algorithms for IoT intrusion detection,” Sensors, vol. 22, no. 4, 2022.
[26]
J. Maldonado, M. C. Riff, and B. Neveu, “A review of recent approaches on wrapper feature selection for intrusion detection,” Expert Systems with Applications, vol. 198, 2022.
[27]
B. A. Alabsi, M. Anbar, and S. D. A. Rihan, “CNN-CNN: dual convolutional neural network approach for feature selection and attack detection on internet of things networks,” Sensors, vol. 23, no. 14, 2023.
[28]
S. P. R. M., P. K. R. Maddikunta, P. M., S. Koppu, T. R. Gadekallu, C. L. Chowdhary, and M. Alazab, “An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture,” Computer Communications, vol. 160, pp. 139–149, 2020.
[29]
B. Susilo and R. F. Sari, “Intrusion detection in IoT networks using deep learning algorithm,” Information, vol. 11, no. 5, 2020.
[30]
A. A. E.-B. Donkol, A. G. Hafez, A. I. Hussein, and M. M. Mabrook, “Optimization of intrusion detection using likely point PSO and enhanced LSTM-RNN hybrid technique in communication networks,” IEEE Access, vol. 11, pp. 9469–9482, 2023.
[31]
F. Salo, A. B. Nassif, and A. Essex, “Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection,” Computer Networks, vol. 148, pp. 164–175, 2019.
[32]
S. Preethaa, Y. Natarajan, A. P. Rathinakumar, D.-E. Lee, Y. Choi, Y.-J. Park, and C.-Y. Yi, “A stacked generalization model to enhance prediction of earthquake-induced soil liquefaction,” Sensors, vol. 22, no. 19, 2022.
[33]
P. Aggarwal and S. K. Sharma, “Analysis of KDD dataset attributes—class wise for intrusion detection,” Procedia Computer Science, vol. 57, pp. 842–851, 2015.
[34]
N. V. Sharma and N. S. Yadav, “An optimal intrusion detection system using recursive feature elimination and ensemble of classifiers,” Microprocessors and Microsystems, vol. 85, 2021.
[35]
L. Demarchi, A. Kania, W. Ciężkowski, H. Piórkowski, Z. Oświecimska-Piasko, and Jław Chormański, “Recursive feature elimination and random forest classification of natura 2000 grasslands in lowland river valleys of Poland based on airborne hyperspectral and LiDAR data fusion,” Remote Sensing, vol. 12, no. 11, 2020.
[36]
A. Srivastava, D. Sinha, and V. Kumar, “WCGAN-GP based synthetic attack data generation with GA based feature selection for IDS,” Computers & Security, vol. 134, 2023.
[37]
M. Mulyanto, J.-S. Leu, M. Faisal, and W. Yunanto, “Weight embedding autoencoder as feature representation learning in an intrusion detection systems,” Computers and Electrical Engineering, vol. 111, Part A, 2023.
[38]
A. Bibi, G. A. Sampedro, A. Almadhor, A. R. Javed, and T.-H. Kim, “Hypertuned lightweight and scalable LSTM model for hybrid network intrusion detection,” Technologies, vol. 11, no. 5, 2023.
[39]
Y. Xiao, C. Kang, H. Yu, T. Fan, and H. Zhang, “Network traffic detection method based on an elevated Harris Hawks optimization method and gated recurrent unit classifier,” Sensors, vol. 22, no. 19, 2022.
[40]
P. R. Kanna and P. Santhi, “Hybrid intrusion detection using MapReduce based black widow optimized convolutional long short-term memory neural networks,” Expert Systems with Applications, vol. 194, 2022.
[41]
I. H. Hassan, M. Abdullahi, M. M. Aliyu, S. A. Yusuf, and A. Abdulrahim, “An improved binary manta ray foraging optimization algorithm based feature selection and random forest classifier for network intrusion detection,” Intelligent Systems with Applications, vol. 16, 2022.
[42]
H. S. Sharma, A. Sarkar, and M. M. Singh, “An efficient deep learning-based solution for network intrusion detection in wireless sensor network,” International Journal of System Assurance Engineering and Management, vol. 14, pp. 2423–2446, 2023.
[43]
E. H. Salman, M. A. Taher, Y. I. Hammadi, O. A. Mahmood, A. Muthanna, and A. Koucheryavy, “An anomaly intrusion detection for high-density internet of things wireless communication network based deep learning algorithms,” Sensors, vol. 23, no. 1, 2023.
[44]
A. Thakkar and R. Lohiya, “Fusion of statistical importance for feature selection in deep neural network-based intrusion detection system,” Information Fusion, vol. 90, pp. 353–363, 2023.
[45]
M. Bakro, R. R. Kumar, A. Alabrah, Z. Ashraf, M. N. Ahmed, M. Shameem, and A. Abdelsalam, “An improved design for a cloud intrusion detection system using hybrid features selection approach with ML classifier,” IEEE Access, vol. 11, pp. 64228–64247, 2023.
[46]
Y. Yang, Y. Gu, and Y. Yan, “Machine learning-based intrusion detection for rare-class network attacks,” Electronics, vol. 12, no. 18, 2023.
[47]
E. Mushtaq, A. Zameer, and R. Nasir, “Knacks of a hybrid anomaly detection model using deep auto-encoder driven gated recurrent unit,” Computer Networks, vol. 226, 2023.
[48]
E. A. Shams, A. Rizaner, and A. H. Ulusoy, “A novel context-aware feature extraction method for convolutional neural network-based intrusion detection systems,” Neural Computing and Applications, vol. 33, pp. 13647–13665, 2021.
[49]
X. Xu, J. Li, Y. Yang, and F. Shen, “Toward effective intrusion detection using log-cosh conditional variational autoencoder,” IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6187–6196, 2021.
[50]
W. Wei, Y. Chen, Q. Lin, J. Ji, K.-C. Wong, and J. Li, “Multi-objective evolving long–short term memory networks with attention for network intrusion detection,” Applied Soft Computing, vol. 139, 2023.
[51]
M. H. L. Louk and B. A. Tama, “Dual-IDS: a bagging-based gradient boosting decision tree model for network anomaly intrusion detection system,” Expert Systems with Applications, vol. 213, Part B, 2023.

Cited By

View all

Index Terms

  1. A Novel Hybrid Feature Selection with Cascaded LSTM: Enhancing Security in IoT Networks
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Wireless Communications & Mobile Computing
      Wireless Communications & Mobile Computing  Volume 2024, Issue
      2024
      228 pages
      This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

      Publisher

      John Wiley and Sons Ltd.

      United Kingdom

      Publication History

      Published: 13 March 2024

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 06 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media