IOT Security Against Network Anomalies through Ensemble of Classifiers Approach
Main Article Content
Abstract
The use of IoT networks to monitor critical environments of all types where the volume of data transferred has greatly expanded in recent years due to a large rise in all forms of data. Since so many devices are connected to the Internet of Things (IoT), network and device security is of paramount importance. Network dynamics and complexity are still the biggest challenges to detecting IOT attacks. The dynamic nature of the network makes it challenging to categorise them using a single classifier. To identify the abnormalities, we therefore suggested an ensemble classifier in this study. The proposed ensemble classifier combines the independent classifiers ELM, Nave Byes (NB), and the k-nearest neighbour (KNN) in bagging and boosting configurations. The proposed technique is evaluated and compared using the MQTTset, a dataset focused on the MQTT protocol, which is frequently utilised in IoT networks. The analysis demonstrates that the proposed classifier outperforms the baseline classifiers in terms of classification accuracy, precision, recall, and F-score.
Article Details
References
A. B. Pawar and S. Ghumbre, “A survey on IoT applications, security challenges and counter measures,” in 2016 International Conference on Computing, Analytics and Security Trends (CAST), Dec. 2016, pp. 294–299. doi: 10.1109/CAST.2016.7914983.
I. Vaccari, S. Narteni, M. Aiello, M. Mongelli, and E. Cambiaso, “Exploiting Internet of Things Protocols for Malicious Data Exfiltration Activities,” IEEE Access, vol. 9, pp. 104261–104280, 2021, doi: 10.1109/ACCESS.2021.3099642.
Mondal, D., & Patil, S. S. (2022). EEG Signal Classification with Machine Learning model using PCA feature selection with Modified Hilbert transformation for Brain-Computer Interface Application. Machine Learning Applications in Engineering Education and Management, 2(1), 11–19. Retrieved from http://yashikajournals.com/index.php/mlaeem/article/view/20
M. J. Kaur and P. Maheshwari, “Building smart cities applications using IoT and cloud-based architectures,” in 2016 International Conference on Industrial Informatics and Computer Systems (CIICS), Mar. 2016, pp. 1–5. doi: 10.1109/ICCSII.2016.7462433.
T. Mahler et al., “Know Your Enemy: Characteristics of Cyber-Attacks on Medical Imaging Devices,” arXiv:1801.05583 [cs],
Feb. 2018, Accessed: Apr. 24, 2022. [Online]. Available: http://arxiv.org/abs/1801.05583
J. Asharf, N. Moustafa, H. Khurshid, E. Debie, W. Haider, and A. Wahab, “A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions,” Electronics, vol. 9, no. 7, Art. no. 7, Jul. 2020, doi: 10.3390/electronics9071177.
Mr. Anish Dhabliya. (2013). Ultra Wide Band Pulse Generation Using Advanced Design System Software . International Journal of New Practices in Management and Engineering, 2(02), 01 - 07. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/14
V. Chandola, A. Banerjee, and V. Kumar, “Anomaly detection: A survey,” ACM Comput. Surv., vol. 41, no. 3, p. 15:1-15:58, Jul. 2009, doi: 10.1145/1541880.1541882.
H. Hajji, “Statistical analysis of network traffic for adaptive faults detection,” IEEE Transactions on Neural Networks, vol. 16, no. 5, pp. 1053–1063, Sep. 2005, doi: 10.1109/TNN.2005.853414.
M. Thottan, G. Liu, and C. Ji, “Anomaly Detection Approaches for Communication Networks,” in Algorithms for Next Generation Networks, G. Cormode and M. Thottan, Eds. London: Springer, 2010, pp. 239–261. doi: 10.1007/978-1-84882-765- 3_11.
Chaudhary, D. S. . (2021). ECG Signal Analysis for Myocardial Disease Prediction by Classification with Feature Extraction Machine Learning Architectures. Research Journal of Computer Systems and Engineering, 2(1), 06:10. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/12
P.-N. Tan, M. Steinbach, and V. Kumar, Introduction to data mining. Boston: Pearson Addison Wesley, 2005.
M. F. Augusteijn and B. A. Folkert, “Neural network classification and novelty detection,” International Journal of Remote Sensing, vol. 23, no. 14, pp. 2891–2902, Jan. 2002, doi: 10.1080/01431160110055804.
I. Diaz and J. Hollmen, “Residual generation and visualization for understanding novel process conditions,” in Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN’02 (Cat. No.02CH37290), May 2002, vol. 3, pp. 2070– 2075 vol.3. doi: 10.1109/IJCNN.2002.1007460.
O. Sharma, M. Girolami, and J. Sventek, “Detecting worm variants using machine learning,” in Proceedings of the 2007 ACM CoNEXT conference, New York, NY, USA, Dec. 2007, pp. 1–12. doi: 10.1145/1364654.1364657.
P. Soucy and G. W. Mineau, “A simple KNN algorithm for text categorization,” in Proceedings 2001 IEEE International Conference on Data Mining, Nov. 2001, pp. 647–648. doi: 10.1109/ICDM.2001.989592.
M. Beckmann, N. F. F. Ebecken, and B. S. L. P. de Lima, “A KNN Undersampling Approach for Data Balancing,” Journal of Intelligent Learning Systems and Applications, vol. 07, no. 04, Art. no. 04, 2015, doi: 10.4236/jilsa.2015.74010.
S. Raschka, “Naive Bayes and Text Classification I - Introduction and Theory,” arXiv:1410.5329 [cs], Feb. 2017, Accessed:
Dec. 13, 2021. [Online]. Available: http://arxiv.org/abs/1410.5329
A. A. Sebyala, T. Olukemi, L. Sacks, and D. L. Sacks, “Active Platform Security through Intrusion Detection Using Naive Bayesian Network For Anomaly Detection,” 2002.
Amjad Rehman Khan, Muhammad Kashif, Rutvij H. Jhaveri , Roshani Raut ,Tanzila Saba, and Saeed Ali Bahaj,"Deep Learning for Intrusion Detection and Security of Internet of Things (IoT): Current Analysis, Challenges, and Possible Solutions",Hindawi Security and Communication Networks Volume 2022, Article ID 4016073, 13 pages. Available: https://doi.org/10.1155/2022/4016073
T. Saba, A. Rehman, T. Sadad, H. Kolivand, and S. A. Bahaj,“Anomaly-based intrusion detection system for IoT networksthrough deep learning model,” Computers & Electrical Engineering, vol. 99, Article ID 107810, 2022.
Y. Ali and H. Ullah Khan, “GTM approach towards engineering a features-oriented evaluation framework for secure authentication in IIoT environment,” Computers & Industrial Engineering, vol. 168, Article ID 108119, 2022.
A. Toprak, “Extreme Learning Machine (ELM)-Based Classification of Benign and Malignant Cells in Breast Cancer,” Med Sci Monit, vol. 24, pp. 6537–6543, Sep. 2018, doi: 10.12659/MSM.910520.
Anna, G., Jansen, M., Anna, J., Wagner, A., & Fischer, A. Machine Learning Applications for Quality Assurance in Engineering Education. Kuwait Journal of Machine Learning, 1(1). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/109
“Papers with Code - MQTT-IoT-IDS2020 Dataset.” https://paperswithcode.com/dataset/mqtt-iot-ids2020 (accessed Apr. 25, 2022).
H. Hindy, E. Bayne, M. Bures, R. Atkinson, C. Tachtatzis, and X. Bellekens, “Machine Learning Based IoT Intrusion Detection System: An MQTT Case Study (MQTT-IoT-IDS2020 Dataset),” arXiv:2006.15340 [cs], Nov. 2020, Accessed: Apr. 25, 2022. [Online]. Available: http://arxiv.org/abs/2006.15340
Y. Al-Hamar, H. Kolivand, M. Tajdini, T. Saba, and V. Ramachandran, “Enterprise credential spear-phishing attack detection,” Computers & Electrical Engineering, vol. 94, Article ID 107363, 2021.
B. Liao, Y. Ali, S. Nazir, L. He, and H. U. Khan, “Security analysis of IoT devices by using mobile computing: a systematic literature review,” IEEE Access, vol. 8, pp. 120331–120350, 2020.
A. R. Khan, “Facial emotion recognition using conventional machine learning and deep learning methods: current achievements, analysis and remaining challenges,” Information, vol. 13, no. 6, p. 268, 2022.
Natalia Volkova, Machine Learning Approaches for Stock Market Prediction , Machine Learning Applications Conference Proceedings, Vol 2 2022.
Verma, R. ., & Sharma, N. . (2023). Impact of Inclusion of Information and Communication Technologies in School Facilities and Effective Learning of Students in Green School. International Journal of Intelligent Systems and Applications in Engineering, 11(2s), 27–34. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2503
A. Andalib and V. T. Vakili, “An autonomous intrusion detection system using an ensemble of advanced learners,” in Proceedings of the 2020 28th Iranian Conference on Electrical Engineering (ICEE), pp. 1–5, IEEE, Tabriz, Iran, August 2020.
H. Hindy, R. Atkinson, C. Tachtatzis, J. N. Colin, E. Bayne, and X. Bellekens, “Utilising deep learning techniques for effective zero-day attack detection,” Electronics, vol. 9, no. 10, p. 1684, 2020.
Vishwakarma M., Kesswani N.,"A two-stage intrusion detection system (TIDS) for Internet of Things", Advances in Deep Learning, Artificial Intelligence and Robotics, Springer (2022), pp. 89-97
Anthi E., Williams L., S?owi?ska M., Theodorakopoulos G., Burnap P.,"A supervised intrusion detection system for smart home IoT devices", IEEE Internet Things J., 6 (5) (2019), pp. 9042-9053
Seth S., Chahal K.K., Singh G.,"A novel ensemble framework for an intelligent intrusion detection system", IEEE Access, 9 (2021), pp. 138451-138467