skip to main content
10.1145/3427477.3429987acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicdcnConference Proceedingsconference-collections
research-article

An ensemble model for intrusion detection in the Internet of Softwarized Things

Published:05 January 2021Publication History

ABSTRACT

In recent years, there has been a rapid increase in the applications generating sensitive and personal information based on the Internet of Things (IoT). Due to the sensitive nature of the data there is a huge surge in intruders stealing the data from these applications. Hence a strong intrusion detection systems which can detect the intruders is the need of the hour to build a strong defence systems against the intruders. In this work, a Crow-Search based ensemble classifier is used to classify IoT- based UNSW-NB15 dataset. Firstly, the most significant features are selected from the dataset using Crow-Search algorithm, later these features are fed to the ensemble classifier based on Linear Regression, Random Forest and XGBoost algorithms for training. The performance of the proposed model is then evaluated against the state-of-the-art models to check for its effectiveness. The experimental results prove that the proposed model performs better than the other considered models.

References

  1. Hadeel Alazzam, Ahmad Sharieh, and Khair Eddin Sabri. 2020. A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer. Expert Systems with Applications 148 (2020), 113249.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Ahmad S Almogren. 2020. Intrusion detection in Edge-of-Things computing. J. Parallel and Distrib. Comput. 137 (2020), 259–265.Google ScholarGoogle ScholarCross RefCross Ref
  3. Alireza Askarzadeh. 2016. A novel metaheuristic method for solving constrained engineering optimization problems: crow search algorithm. Computers & Structures 169 (2016), 1–12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Qian Chen, Gautam Srivastava, Reza M Parizi, Moayad Aloqaily, and Ismaeel Al Ridhawi. 2020. An incentive-aware blockchain-based solution for internet of fake media things. Information Processing & Management(2020), 102370.Google ScholarGoogle Scholar
  5. Mohamed Faisal Elrawy, Ali Ismail Awad, and Hesham FA Hamed. 2018. Intrusion detection systems for IoT-based smart environments: a survey. Journal of Cloud Computing 7, 1 (2018), 21. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Prosanta Gope, Ashok Kumar Das, Neeraj Kumar, and Yongqiang Cheng. 2019. Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE transactions on industrial informatics 15, 9 (2019), 4957–4968.Google ScholarGoogle ScholarCross RefCross Ref
  7. Mohammad Mehedi Hassan, Abdu Gumaei, Ahmed Alsanad, Majed Alrubaian, and Giancarlo Fortino. 2020. A hybrid deep learning model for efficient intrusion detection in big data environment. Information Sciences 513(2020), 386–396.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Kaiyuan Jiang, Wenya Wang, Aili Wang, and Haibin Wu. 2020. Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access 8(2020), 32464–32476.Google ScholarGoogle ScholarCross RefCross Ref
  9. Sydney Mambwe Kasongo and Yanxia Sun. 2020. A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Computers & Security 92(2020), 101752.Google ScholarGoogle ScholarCross RefCross Ref
  10. Farrukh Aslam Khan, Abdu Gumaei, Abdelouahid Derhab, and Amir Hussain. 2019. A novel two-stage deep learning model for efficient network intrusion detection. IEEE Access 7(2019), 30373–30385.Google ScholarGoogle ScholarCross RefCross Ref
  11. Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu, Rajesh Kaluri, Gautam Srivastava, Reza M Parizi, and Mohammad S Khan. 2020. Green communication in IoT networks using a hybrid optimization algorithm. Computer Communications 159 (2020), 97–107.Google ScholarGoogle ScholarCross RefCross Ref
  12. Alejandro Molina Zarca, Jorge Bernal Bernabe, Ivan Farris, Yacine Khettab, Tarik Taleb, and Antonio Skarmeta. 2018. Enhancing IoT security through network softwarization and virtual security appliances. International Journal of Network Management 28, 5 (2018), e2038.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Nour Moustafa and Jill Slay. 2016. The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Information Security Journal: A Global Perspective 25, 1-3(2016), 18–31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Dimitrios Papamartzivanos, Félix Gómez Mármol, and Georgios Kambourakis. 2018. Dendron: Genetic trees driven rule induction for network intrusion detection systems. Future Generation Computer Systems 79 (2018), 558–574. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Jiadong Ren, Jiawei Guo, Wang Qian, Huang Yuan, Xiaobing Hao, and Hu Jingjing. 2019. Building an effective intrusion detection system by using hybrid data optimization based on machine learning algorithms. Security and Communication Networks 2019 (2019).Google ScholarGoogle Scholar
  16. Chandrasegar Thirumalai, Senthilkumar Mohan, and Gautam Srivastava. 2020. An efficient public key secure scheme for cloud and IoT security. Computer Communications 150 (2020), 634–643.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Abbas Yazdinejad, Reza M Parizi, Ali Dehghantanha, Gautam Srivastava, Senthilkumar Mohan, and Abedallah M Rababah. 2020. Cost optimization of secure routing with untrusted devices in software defined networking. J. Parallel and Distrib. Comput.(2020).Google ScholarGoogle Scholar
  18. Jianwu Zhang, Yu Ling, Xingbing Fu, Xiongkun Yang, Gang Xiong, and Rui Zhang. 2020. Model of the intrusion detection system based on the integration of spatial-temporal features. Computers & Security 89(2020), 101681.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An ensemble model for intrusion detection in the Internet of Softwarized Things
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ICDCN '21: Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking
          January 2021
          174 pages
          ISBN:9781450381840
          DOI:10.1145/3427477

          Copyright © 2021 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 5 January 2021

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format