A Novel Feature-Selection Algorithm in IoT Networks for Intrusion Detection

The Internet of Things (IoT) and network-enabled smart devices are crucial to the digitally interconnected society of the present day. However, the increased reliance on IoT devices increases their susceptibility to malicious activities within network traffic, posing significant challenges to cybersecurity. As a result, both system administrators and end users are negatively affected by these malevolent behaviours. Intrusion-detection systems (IDSs) are commonly deployed as a cyber attack defence mechanism to mitigate such risks. IDS plays a crucial role in identifying and preventing cyber hazards within IoT networks. However, the development of an efficient and rapid IDS system for the detection of cyber attacks remains a challenging area of research. Moreover, IDS datasets contain multiple features, so the implementation of feature selection (FS) is required to design an effective and timely IDS. The FS procedure seeks to eliminate irrelevant and redundant features from large IDS datasets, thereby improving the intrusion-detection system’s overall performance. In this paper, we propose a hybrid wrapper-based feature-selection algorithm that is based on the concepts of the Cellular Automata (CA) engine and Tabu Search (TS)-based aspiration criteria. We used a Random Forest (RF) ensemble learning classifier to evaluate the fitness of the selected features. The proposed algorithm, CAT-S, was tested on the TON_IoT dataset. The simulation results demonstrate that the proposed algorithm, CAT-S, enhances classification accuracy while simultaneously reducing the number of features and the false positive rate.

[1]  I. Linkov,et al.  An Explainable Deep Learning Framework for Resilient Intrusion Detection in IoT-Enabled Transportation Networks , 2023, IEEE Transactions on Intelligent Transportation Systems.

[2]  M. Portmann,et al.  Towards a Standard Feature Set for Network Intrusion Detection System Datasets , 2021, Mobile Networks and Applications.

[3]  Anjum Nazir,et al.  Network Intrusion Detection: Taxonomy and Machine Learning Applications , 2020, Studies in Computational Intelligence.

[4]  Prabhat Kumar,et al.  TP2SF: A Trustworthy Privacy-Preserving Secured Framework for sustainable smart cities by leveraging blockchain and machine learning , 2020, J. Syst. Archit..

[5]  In Lee Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management , 2020, Future Internet.

[6]  Nour Moustafa,et al.  A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions , 2020, Electronics.

[7]  Yanxia Sun,et al.  A deep learning method with wrapper based feature extraction for wireless intrusion detection system , 2020, Comput. Secur..

[8]  S. Manimurugan,et al.  Effective Attack Detection in Internet of Medical Things Smart Environment Using a Deep Belief Neural Network , 2020, IEEE Access.

[9]  Zaffar Haider Janjua,et al.  Passban IDS: An Intelligent Anomaly-Based Intrusion Detection System for IoT Edge Devices , 2020, IEEE Internet of Things Journal.

[10]  Sushmita Ruj,et al.  A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT , 2020, J. Netw. Comput. Appl..

[11]  Pete Burnap,et al.  A Supervised Intrusion Detection System for Smart Home IoT Devices , 2019, IEEE Internet of Things Journal.

[12]  Kim-Kwang Raymond Choo,et al.  An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things , 2019, IEEE Internet of Things Journal.

[13]  Lav Gupta,et al.  Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things , 2019, IEEE Internet of Things Journal.

[14]  Saïda Bouakaz,et al.  A novel database of Children's Spontaneous Facial Expressions (LIRIS-CSE) , 2018, Image Vis. Comput..

[15]  Jong Hyuk Park,et al.  Semi-supervised learning based distributed attack detection framework for IoT , 2018, Appl. Soft Comput..

[16]  Hubert Konik,et al.  Saliency-based framework for facial expression recognition , 2018, Frontiers of Computer Science.

[17]  Rahmi Khoirani Common Vulnerability and Exposures (CVE) , 2018 .

[18]  Md. Zakirul Alam Bhuiyan,et al.  Security and Attack Vector Analysis of IoT Devices , 2017, SpaCCS Workshops.

[19]  Naveen K. Chilamkurti,et al.  Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..

[20]  Arwa Alrawais,et al.  Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.

[21]  William Stafford Noble,et al.  Machine learning applications in genetics and genomics , 2015, Nature Reviews Genetics.

[22]  Manel Guerrero Zapata,et al.  A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks , 2015, Neurocomputing.

[23]  Dimitrios I. Fotiadis,et al.  Machine learning applications in cancer prognosis and prediction , 2014, Computational and structural biotechnology journal.

[24]  Panos Louvieris,et al.  Effects-based feature identification for network intrusion detection , 2013, Neurocomputing.

[25]  H. Konik,et al.  Framework for reliable, real-time facial expression recognition for low resolution images , 2013, Pattern Recognit. Lett..

[26]  Wei Cong,et al.  Anomaly intrusion detection based on PLS feature extraction and core vector machine , 2013, Knowl. Based Syst..

[27]  H. Konik,et al.  Human vision inspired framework for facial expressions recognition , 2012, 2012 19th IEEE International Conference on Image Processing.

[28]  Steven Thomason,et al.  Improving Network Security: Next Generation Firewalls and Advanced Packet Inspection Devices , 2012 .

[29]  Jennifer G. Dy,et al.  From Transformation-Based Dimensionality Reduction to Feature Selection , 2010, ICML.

[30]  Hiroshi Motoda,et al.  Computational Methods of Feature Selection , 2022 .

[31]  Deng Cai,et al.  Laplacian Score for Feature Selection , 2005, NIPS.

[32]  Yann LeCun,et al.  Learning a similarity metric discriminatively, with application to face verification , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[33]  John W. Lockwood,et al.  Deep packet inspection using parallel Bloom filters , 2003, 11th Symposium on High Performance Interconnects, 2003. Proceedings..

[34]  Huan Liu,et al.  Feature selection for clustering - a filter solution , 2002, 2002 IEEE International Conference on Data Mining, 2002. Proceedings..

[35]  Daphne Koller,et al.  Support Vector Machine Active Learning with Applications to Text Classification , 2000, J. Mach. Learn. Res..

[36]  Gilbert Held,et al.  The TCP/IP Protocol Suite , 2001 .

[37]  R. Romero,et al.  Tabu search algorithm for network synthesis , 2000 .

[38]  Govind P. Gupta,et al.  Hybrid Meta-Heuristic based Feature Selection Mechanism for Cyber-Attack Detection in IoT-enabled Networks , 2023, Procedia Computer Science.

[39]  Anjum Nazir,et al.  A novel combinatorial optimization based feature selection method for network intrusion detection , 2021, Comput. Secur..

[40]  Ahmed A. Nashat,et al.  Intrusion Detection System Using Machine Learning for Vehicular Ad Hoc Networks Based on ToN-IoT Dataset , 2021, IEEE Access.

[41]  Theyazn H. H. Aldhyani,et al.  Intrusion Detection System to Advance Internet of Things Infrastructure-Based Deep Learning Algorithms , 2021, Complex..

[42]  Q. Mahmoud,et al.  Design and Development of a Deep Learning-Based Model for Anomaly Detection in IoT Networks , 2021, IEEE Access.

[43]  Anongnart Srivihok,et al.  Wrapper Feature Subset Selection for Dimension Reduction Based on Ensemble Learning Algorithm , 2015 .

[44]  C. Patley,et al.  Alloxan Induced Oxidative Stress and Impairment of Oxidative Defense System in rats , 2013 .

[45]  Carter Bays,et al.  Introduction to Cellular Automata and Conway's Game of Life , 2010, Game of Life Cellular Automata.

[46]  Lawrence O. Hall,et al.  A Comparison of Decision Tree Ensemble Creation Techniques , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[47]  Jason Weston,et al.  Embedded Methods , 2006, Feature Extraction.

[48]  John W. Lockwood,et al.  Deep packet inspection using parallel bloom filters , 2004, IEEE Micro.

[49]  Yoshua Bengio,et al.  Pattern Recognition and Neural Networks , 1995 .