A Novel Intrusion Detection Approach Using Machine Learning Ensemble for IoT Environments

The Internet of Things (IoT) has gained significant importance due to its applicability in diverse environments. Another reason for the influence of the IoT is its use of a flexible and scalable framework. The extensive and diversified use of the IoT in the past few years has attracted cyber-criminals. They exploit the vulnerabilities of the open-source IoT framework due to the absentia of robust and standard security protocols, hence discouraging existing and potential stakeholders. The authors propose a binary classifier approach developed from a machine learning ensemble method to filter and dump malicious traffic to prevent malicious actors from accessing the IoT network and its peripherals. The gradient boosting machine (GBM) ensemble approach is used to train the binary classifier using pre-processed recorded data packets to detect the anomaly and prevent the IoT networks from zero-day attacks. The positive class performance metrics of the model resulted in an accuracy of 98.27%, a precision of 96.40%, and a recall of 95.70%. The simulation results prove the effectiveness of the proposed model against cyber threats, thus making it suitable for critical applications for the IoT.

[1]  Bayu Adhi Tama,et al.  An in-depth experimental study of anomaly detection using gradient boosted machine , 2019, Neural Computing and Applications.

[2]  Ehsan Namjoo,et al.  LR-HIDS: logistic regression host-based intrusion detection system for cloud environments , 2018, Journal of Ambient Intelligence and Humanized Computing.

[3]  Lior Rokach,et al.  Ensemble learning: A survey , 2018, WIREs Data Mining Knowl. Discov..

[4]  João Gama,et al.  Ensemble learning for data stream analysis: A survey , 2017, Inf. Fusion.

[5]  Chih-Fong Tsai,et al.  CANN: An intrusion detection system based on combining cluster centers and nearest neighbors , 2015, Knowl. Based Syst..

[6]  Gilles Louppe,et al.  Understanding variable importances in forests of randomized trees , 2013, NIPS.

[7]  A. Staiano,et al.  Machine learning and soft computing for ICT security: an overview of current trends , 2013, J. Ambient Intell. Humaniz. Comput..

[8]  Kim-Kwang Raymond Choo The cyber threat landscape: Challenges and future research directions , 2011, Comput. Secur..

[9]  Alan L. Yuille,et al.  Performance comparison of machine learning algorithms and number of independent components used in fMRI decoding of belief vs. disbelief , 2011, NeuroImage.

[10]  Gaël Varoquaux,et al.  Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..

[11]  J. Friedman Greedy function approximation: A gradient boosting machine. , 2001 .

[12]  Mohanad Sarhan,et al.  Towards a Standard Feature Set of NIDS Datasets , 2021, ArXiv.

[13]  Gurjot Singh Gaba,et al.  Secure Device-to-Device communications for 5G enabled Internet of Things applications , 2021, Comput. Commun..

[14]  Ravindra C. Thool,et al.  Intrusion Detection System Using Bagging with Partial Decision TreeBase Classifier , 2015 .

[15]  Tsung-Han Lee,et al.  A Lightweight Intrusion Detection Scheme Based on Energy Consumption Analysis in 6LowPAN , 2013, EMC/HumanCom.

[16]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[17]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..