ABSTRACT
In recent years, there has been a rapid increase in the applications generating sensitive and personal information based on the Internet of Things (IoT). Due to the sensitive nature of the data there is a huge surge in intruders stealing the data from these applications. Hence a strong intrusion detection systems which can detect the intruders is the need of the hour to build a strong defence systems against the intruders. In this work, a Crow-Search based ensemble classifier is used to classify IoT- based UNSW-NB15 dataset. Firstly, the most significant features are selected from the dataset using Crow-Search algorithm, later these features are fed to the ensemble classifier based on Linear Regression, Random Forest and XGBoost algorithms for training. The performance of the proposed model is then evaluated against the state-of-the-art models to check for its effectiveness. The experimental results prove that the proposed model performs better than the other considered models.
- Hadeel Alazzam, Ahmad Sharieh, and Khair Eddin Sabri. 2020. A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer. Expert Systems with Applications 148 (2020), 113249.Google ScholarDigital Library
- Ahmad S Almogren. 2020. Intrusion detection in Edge-of-Things computing. J. Parallel and Distrib. Comput. 137 (2020), 259–265.Google ScholarCross Ref
- Alireza Askarzadeh. 2016. A novel metaheuristic method for solving constrained engineering optimization problems: crow search algorithm. Computers & Structures 169 (2016), 1–12. Google ScholarDigital Library
- Qian Chen, Gautam Srivastava, Reza M Parizi, Moayad Aloqaily, and Ismaeel Al Ridhawi. 2020. An incentive-aware blockchain-based solution for internet of fake media things. Information Processing & Management(2020), 102370.Google Scholar
- Mohamed Faisal Elrawy, Ali Ismail Awad, and Hesham FA Hamed. 2018. Intrusion detection systems for IoT-based smart environments: a survey. Journal of Cloud Computing 7, 1 (2018), 21. Google ScholarDigital Library
- Prosanta Gope, Ashok Kumar Das, Neeraj Kumar, and Yongqiang Cheng. 2019. Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE transactions on industrial informatics 15, 9 (2019), 4957–4968.Google ScholarCross Ref
- Mohammad Mehedi Hassan, Abdu Gumaei, Ahmed Alsanad, Majed Alrubaian, and Giancarlo Fortino. 2020. A hybrid deep learning model for efficient intrusion detection in big data environment. Information Sciences 513(2020), 386–396.Google ScholarDigital Library
- Kaiyuan Jiang, Wenya Wang, Aili Wang, and Haibin Wu. 2020. Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access 8(2020), 32464–32476.Google ScholarCross Ref
- Sydney Mambwe Kasongo and Yanxia Sun. 2020. A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Computers & Security 92(2020), 101752.Google ScholarCross Ref
- Farrukh Aslam Khan, Abdu Gumaei, Abdelouahid Derhab, and Amir Hussain. 2019. A novel two-stage deep learning model for efficient network intrusion detection. IEEE Access 7(2019), 30373–30385.Google ScholarCross Ref
- Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu, Rajesh Kaluri, Gautam Srivastava, Reza M Parizi, and Mohammad S Khan. 2020. Green communication in IoT networks using a hybrid optimization algorithm. Computer Communications 159 (2020), 97–107.Google ScholarCross Ref
- Alejandro Molina Zarca, Jorge Bernal Bernabe, Ivan Farris, Yacine Khettab, Tarik Taleb, and Antonio Skarmeta. 2018. Enhancing IoT security through network softwarization and virtual security appliances. International Journal of Network Management 28, 5 (2018), e2038.Google ScholarDigital Library
- Nour Moustafa and Jill Slay. 2016. The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Information Security Journal: A Global Perspective 25, 1-3(2016), 18–31. Google ScholarDigital Library
- Dimitrios Papamartzivanos, Félix Gómez Mármol, and Georgios Kambourakis. 2018. Dendron: Genetic trees driven rule induction for network intrusion detection systems. Future Generation Computer Systems 79 (2018), 558–574. Google ScholarDigital Library
- Jiadong Ren, Jiawei Guo, Wang Qian, Huang Yuan, Xiaobing Hao, and Hu Jingjing. 2019. Building an effective intrusion detection system by using hybrid data optimization based on machine learning algorithms. Security and Communication Networks 2019 (2019).Google Scholar
- Chandrasegar Thirumalai, Senthilkumar Mohan, and Gautam Srivastava. 2020. An efficient public key secure scheme for cloud and IoT security. Computer Communications 150 (2020), 634–643.Google ScholarDigital Library
- Abbas Yazdinejad, Reza M Parizi, Ali Dehghantanha, Gautam Srivastava, Senthilkumar Mohan, and Abedallah M Rababah. 2020. Cost optimization of secure routing with untrusted devices in software defined networking. J. Parallel and Distrib. Comput.(2020).Google Scholar
- Jianwu Zhang, Yu Ling, Xingbing Fu, Xiongkun Yang, Gang Xiong, and Rui Zhang. 2020. Model of the intrusion detection system based on the integration of spatial-temporal features. Computers & Security 89(2020), 101681.Google ScholarDigital Library
Index Terms
- An ensemble model for intrusion detection in the Internet of Softwarized Things
Recommendations
Cluster Based Ensemble Classification for Intrusion Detection System
ICMLC '17: Proceedings of the 9th International Conference on Machine Learning and ComputingNetwork security is a challenging task, as there is a tremendous growth of network -based services and sharing of sensitive information on the network. Intrusion throws a serious risk in the network. Even though many hardening systems are developed ...
Collaborative device-level botnet detection for internet of things
Highlights- A review of the state-of-the-art device-level intrusion detection approaches.
- A detailed analysis of existing botnet datasets and their features to support evaluation of IDS.
- A novel trustworthy botnet detection framework for ...
AbstractCyber attacks on the Internet of Things (IoT) have seen a significant increase in recent years. This is primarily due to the widespread adoption and prevalence of IoT within domestic and critical national infrastructures, as well as inherent ...
Distributed intrusion detection scheme using dual-axis dimensionality reduction for Internet of things (IoT)
AbstractThe immense growth in the cyber world has given birth to various types of cybercrimes in the Internet of things (IoT). Cybercrimes have breached the multiple levels of cybersecurity that is one of the major issues in the IoT networks. Due to the ...
Comments