Enhancing IoT Network Security Using Feature Selection for Intrusion Detection Systems
Abstract
:1. Introduction
- -
- A comprehensive feature selection framework involving various feature selection methods to detect consistent, non-redundant, and relevant variables that help identify vulnerabilities in IoT environments.
- -
- Optimized feature set generation investigates the different thresholds for feature importance, combining features that appear in multiple selection methods, and generates a reduced set of features to enhance model performance.
- -
- Improving IoT network security by demonstrating that the reduced feature set significantly enhances the accuracy and efficiency of the multi-layer perceptron (MLP) classifier compared to the full feature set.
2. Related Work
2.1. Feature Selection Techniques in Intrusion Detection Systems
2.2. Machine Learning Models for Anomaly Detection
2.3. Hybrid Approaches Combining Feature Selection and Machine Learning
2.4. Innovative Architectures for IoT Security
3. Materials and Methods
3.1. Description of the Datasets and Methods
- Finding feature importance: here, we harnessed the power of five distinct feature selection methods to ensure a robust and comprehensive feature elimination process. The selected methods were information gain, correlation-based feature subset selection (CFS), the gain ratio, symmetrical uncertainty, and Pearson’s analysis. These algorithms are among the most popular feature selection algorithms and are used in many areas [27,28]. For each method, an importance score was generated for each feature. Finally, a comparison between feature selection techniques in terms of execution time, search method, and attribute evaluator was performed.
- Investigating the effect of thresholds and the number of features: here, we used the feature importance scores from each method (obtained in the previous step) to set different threshold values (cutoffs), which included different sets of features that contributed to a certain percentage of the total feature importance. For each feature selection method, the multi-layer perceptron (MLP) classifier was employed, using different sets of features and threshold values. We then compared the model performance with different numbers of features to find the optimal cutoff. The MLP classifier is a neural network model that processes data through interconnected layers, utilizing non-linear transformations to solve complex tasks.
- Combining features generated from different feature selection methods: here, we used a frequency-based approach to retain the features that appeared in ≥ four feature selection methods. The most frequently occurring features were selected, and linear relationships were measured to determine the correlation coefficient. A reduced set of features is then generated in this step.
- Examining the effect of the reduced set of features in enhancing IoT network security: here, we employed an MLP classifier on both datasets (a full feature set and the reduced set generated in this study) to test whether the proposed feature selection methods can enhance the accuracy and efficiency of the classifier. Then, a quantitative analysis of the experiments in terms of accuracy, precision, recall, and F1 score was performed.
3.2. Feature Selection
4. Results
5. Discussion
5.1. Fwd Init Window Size and Its Role in Detecting SYN Flood and TCP-Based Attacks
5.2. Flow SYN Flag Count as an Indicator of Denial-of-Service (DoS) Attacks
5.3. The Destination Port as a Key Feature in Port Scanning and Reconnaissance Attacks
5.4. The Fwd Packet Length Mean as an Indicator of Botnet Activity
5.5. Flow Duration and Its Correlation with DoS and DDoS Attacks
5.6. Fwd Header Length and Its Role in Detecting Reconnaissance Activities
5.7. Inbound Packet Count as a Marker of Distributed Denial-of-Service (DDoS) Attacks
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Justin, J.; Razali, N.F.; Badaruddin, M.N.A. Transforming Malaysia’s Economic Landscape: The Pivotal Role of the Internet of Things (IoT). In Proceedings of the 2023 IEEE 21st Student Conference on Research and Development (SCOReD), Kuala Lumpur, Malaysia, 13–14 December 2023; pp. 463–468. [Google Scholar]
- Abaimov, S. Understanding and Classifying Permanent Denial-of-Service Attacks. J. Cybersecur. Priv. 2024, 4, 324–339. [Google Scholar] [CrossRef]
- Roopak, M.; Parkinson, S.; Tian, G.Y.; Ran, Y.; Khan, S.; Chandrasekaran, B. An unsupervised approach for the detection of zero-day distributed denial of service attacks in Internet of Things networks. IET Netw. 2024, 13, 513–527. [Google Scholar] [CrossRef]
- Funchal, G.S.; Pedrosa, T.; Prieta, F.d.l.; Leitão, P. Edge Multi-agent Intrusion Detection System Architecture for IoT Devices with Cloud Continuum. In Proceedings of the 2024 IEEE 7th International Conference on Industrial Cyber-Physical Systems (ICPS), St. Louis, MO, USA, 12–15 May 2024; pp. 1–6. [Google Scholar]
- Akinsanya, M.O.; Ekechi, C.C.; Okeke, C.D. Security Paradigms for Iot in Telecom Networks: Conceptual Challenges and Solution Pathways. Eng. Sci. Technol. J. 2024, 5, 1431–1451. [Google Scholar] [CrossRef]
- Nguyen, V.-T.; Navas, R.E.; Doyen, G. Lightweight Security for IoT Systems leveraging Moving Target Defense and Intrusion Detection. In Proceedings of the NOMS 2024-2024 IEEE Network Operations and Management Symposium, Seoul, Republic of Korea, 6–10 May 2024; pp. 1–6. [Google Scholar]
- Piyush, P.; Gill, N.S.; Gulia, P.; Rao, D.D.; Mandiga, Y.; Pareek, P.K. Systematic Analysis of threats, Machine Learning solutions and Challenges for Securing IoT environment. J. Cybersecur. Inf. Manag. 2024, 14, 367–382. [Google Scholar] [CrossRef]
- Tanksale, V. Efficient Elliptic Curve Diffie–Hellman Key Exchange for Resource-Constrained IoT Devices. Electronics 2024, 13, 3631. [Google Scholar] [CrossRef]
- Bella, K.; Guezzaz, A.; Benkirane, S.; Azrour, M.; Fouad, Y.; Benyeogor, M.S.; Innab, N. An efficient intrusion detection system for IoT security using CNN decision forest. PeerJ Comput. Sci. 2024, 10, e2290. [Google Scholar] [CrossRef] [PubMed]
- Mazhar, T.; Talpur, D.B.; Shloul, T.A.; Ghadi, Y.Y.; Haq, I.; Ullah, I.; Ouahada, K.; Hamam, H. Analysis of IoT security challenges and its solutions using artificial intelligence. Brain Sci. 2023, 13, 683. [Google Scholar] [CrossRef] [PubMed]
- Sharmila, B.S.; Nagapadma, R. RT-IoT2022; UCI Machine Learning Repository: Irvine, CA, USA, 2024. [Google Scholar] [CrossRef]
- Barbosa, G.N.N.; Andreoni, M.; Mattos, D.M.F. Optimizing feature selection in intrusion detection systems: Pareto dominance set approaches with mutual information and linear correlation. Ad Hoc Netw. 2024, 159, 103485. [Google Scholar] [CrossRef]
- Awad, M.; Fraihat, S. Recursive feature elimination with cross-validation with decision tree: Feature selection method for machine learning-based intrusion detection systems. J. Sens. Actuator Netw. 2023, 12, 67. [Google Scholar] [CrossRef]
- Li, J.; Othman, M.S.; Chen, H.; Yusuf, L.M. Optimizing IoT intrusion detection system: Feature selection versus feature extraction in machine learning. J. Big Data 2024, 11, 36. [Google Scholar] [CrossRef]
- Jayasankar, T.; Kiruba Buri, R.; Maheswaravenkatesh, P. Intrusion detection system using metaheuristic fireworks optimization based feature selection with deep learning on Internet of Things environment. J. Forecast. 2024, 43, 415–428. [Google Scholar] [CrossRef]
- Musthafa, M.B.; Huda, S.; Kodera, Y.; Ali, M.A.; Araki, S.; Mwaura, J.; Nogami, Y. Optimizing IoT Intrusion Detection Using Balanced Class Distribution, Feature Selection, and Ensemble Machine Learning Techniques. Sensors 2024, 24, 4293. [Google Scholar] [CrossRef]
- Alrefaei, A.; Ilyas, M. Using Machine Learning Multiclass Classification Technique to Detect IoT Attacks in Real Time. Sensors 2024, 24, 4516. [Google Scholar] [CrossRef] [PubMed]
- Lai, T.; Farid, F.; Bello, A.; Sabrina, F. Ensemble learning based anomaly detection for IoT cybersecurity via Bayesian hyperparameters sensitivity analysis. Cybersecurity 2024, 7, 44. [Google Scholar] [CrossRef]
- Otokwala, U.; Petrovski, A.; Kalutarage, H. Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things. Int. J. Inf. Secur. 2024, 23, 2559–2581. [Google Scholar] [CrossRef]
- Maseno, E.M.; Wang, Z. Hybrid wrapper feature selection method based on genetic algorithm and extreme learning machine for intrusion detection. J. Big Data 2024, 11, 24. [Google Scholar] [CrossRef]
- Azimjonov, J.; Kim, T. Stochastic gradient descent classifier-based lightweight intrusion detection systems using the efficient feature subsets of datasets. Expert Syst. Appl. 2024, 237, 121493. [Google Scholar] [CrossRef]
- Yang, K.; Wang, J.; Li, M. An improved intrusion detection method for IIoT using attention mechanisms, BiGRU, and Inception-CNN. Sci. Rep. 2024, 14, 19339. [Google Scholar] [CrossRef] [PubMed]
- Aljehane, N.O.; Mengash, H.A.; Hassine, S.B.; Alotaibi, F.A.; Salama, A.S.; Abdelbagi, S. Optimizing intrusion detection using intelligent feature selection with machine learning model. Alex. Eng. J. 2024, 91, 39–49. [Google Scholar] [CrossRef]
- Bakır, H.; Ceviz, Ö. Empirical enhancement of intrusion detection systems: A comprehensive approach with genetic algorithm-based hyperparameter tuning and hybrid feature selection. Arab. J. Sci. Eng. 2024, 49, 13025–13043. [Google Scholar] [CrossRef]
- Zhu, J.; Liu, X. An integrated intrusion detection framework based on subspace clustering and ensemble learning. Comput. Electr. Eng. 2024, 115, 109113. [Google Scholar] [CrossRef]
- Sharmila, B.; Nagapadma, R. Quantized autoencoder (QAE) intrusion detection system for anomaly detection in resource-constrained IoT devices using RT-IoT2022 dataset. Cybersecurity 2023, 6, 41. [Google Scholar] [CrossRef]
- Kumar, V.; Minz, S. Feature selection. SmartCR 2014, 4, 211–229. [Google Scholar] [CrossRef]
- Venkatesh, B.; Anuradha, J. A review of feature selection and its methods. Cybern. Inf. Technol. 2019, 19, 3–26. [Google Scholar] [CrossRef]
- Bharadiya, J.P. The role of machine learning in transforming business intelligence. Int. J. Comput. Artif. Intell. 2023, 4, 16–24. [Google Scholar] [CrossRef]
- Pande, S.; Khamparia, A.; Gupta, D. Feature selection and comparison of classification algorithms for wireless sensor networks. J. Ambient Intell. Humaniz. Comput. 2023, 14, 1977–1989. [Google Scholar] [CrossRef]
- Moslemi, A. A tutorial-based survey on feature selection: Recent advancements on feature selection. Eng. Appl. Artif. Intell. 2023, 126, 107136. [Google Scholar] [CrossRef]
- Masoudi-Sobhanzadeh, Y.; Motieghader, H.; Masoudi-Nejad, A. FeatureSelect: A software for feature selection based on machine learning approaches. BMC Bioinform. 2019, 20, 170. [Google Scholar] [CrossRef]
- Win, T.Z.; Kham, N.S.M. Information Gain Measured Feature Selection to Reduce High Dimensional Data. Ph.D. Thesis, MERAL Portal, Naypyidaw, Myanmar, 2019. [Google Scholar]
- Tamilmani, A.; Sughasiny, M. Gain Ratio With Optimization Based Feature Selection Method. Webology (ISSN: 1735-188X) 2021, 18, 6545–6557. [Google Scholar]
- Doshi, M. Correlation based feature selection (CFS) technique to predict student Perfromance. Int. J. Comput. Netw. Commun. 2014, 6, 197. [Google Scholar] [CrossRef]
- Mei, K.; Tan, M.; Yang, Z.; Shi, S. Modeling of feature selection based on random forest algorithm and Pearson correlation coefficient. In Journal of Physics: Conference Series; IOP Publishing: Bristol, UK, 2022; p. 012046. [Google Scholar]
- Mustafa, B.; Cudi, O.M. A Comprehensive Review of Feature Selection and Feature Selection Stability in Machine Learning; Gazi University: Ankara, Turkey, 2023. [Google Scholar]
- Kamalov, F.; Moussa, S.; Zgheib, R.; Mashaal, O. Feature selection for intrusion detection systems. In Proceedings of the 2020 13th International Symposium on Computational Intelligence and Design (ISCID), Hangzhou, China, 12–13 December 2020; IEEE: Piscataway, NJ, USA, 2020. [Google Scholar]
- Syafiuddin, N.H.; Mandala, S.; Cahyani, N.D.W. Detection syn flood and UDP lag attacks based on machine learning using AdaBoost. In Proceedings of the 2023 International Conference on Data Science and Its Applications (ICoDSA), Bandung, Indonesia, 9–10 August 2023; IEEE: Piscataway, NJ, USA, 2023. [Google Scholar]
- Wibowo, N.A.; Ariami, D.; Lim, C. Analysis of SYN flood attack detection on web-based services using round trip time (RTT) calculation. In Proceedings of the 2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs), Bogor, Indonesia, 22–24 August 2023; IEEE: Piscataway, NJ, USA, 2023. [Google Scholar]
- Ishaq, M.; Khan, I.; Ullah, S.I.; Ullah, T. TCP flood attack detection on internet of things devices using CNN-GRU deep learning model. In Proceedings of the 2023 3rd International Conference on Digital Futures and Transformative Technologies (ICoDT2), Islamabad, Pakistan, 3–4 October 2023; IEEE: Piscataway, NJ, USA, 2023. [Google Scholar]
- Sinha, M. SynFloWatch: A Detection System against TCP-SYN based DDoS Attacks using Entropy in Hybrid SDN. In Proceedings of the 25th International Conference on Distributed Computing and Networking, Chennai, India, 4–7 January 2024; ACM: New York, NY, USA, 2024. [Google Scholar]
- Wang, Z.; Feng, X.; Li, Q.; Sun, K.; Yang, Y.; Li, M.; Du, G.; Xu, K.; Wu, J. Off-path TCP hijacking in WI-Fi networks: A packet-size side channel attack. arXiv 2024, arXiv:2402.12716. [Google Scholar] [CrossRef]
- Das, T.; Hamdan, O.A.; Sengupta, S.; Arslan, E. Flood control: TCP-SYN flood detection for software-defined networks using OpenFlow port statistics. In Proceedings of the 2022 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, 27–29 July 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 1–8. [Google Scholar]
- Shirsath, V.A.; Chandane, M.M.; Lal, C.; Conti, M. SYNTROPY: TCP SYN DDoS attack detection for software defined network based on Rényi entropy. Comput. Netw. 2024, 244, 110327. [Google Scholar] [CrossRef]
- Kim, S.; Jung, C.; Jang, R.; Mohaisen, D.; Nyang, D. A robust counting sketch for data plane intrusion detection. In Proceedings of the 2023 Network and Distributed System Security Symposium, San Diego, CA, USA, 27 February 2023–3 March 2023; Internet Society: Reston, VI, USA, 2023. [Google Scholar]
- Cohen, R.; Kadosh, M.; Lo, A.; Sayah, Q. On the Protection of a High Performance Load Balancer Against SYN Attacks* This is an extended journal version of [2]. IEEE Trans. Cloud Comput. 2023, 11, 2897–2909. [Google Scholar] [CrossRef]
- Qian, Z.; Gao, G.; Du, Y. Per-flow size measurement by combining sketch and flow table in software-defined networks. In Proceedings of the 2022 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), Melbourne, Australia, 17–19 December 2022; IEEE: Piscataway, NJ, USA, 2022. [Google Scholar]
- Pittman, J.M. A comparative analysis of port scanning tool efficacy. arXiv 2023, arXiv:2303.11282. [Google Scholar] [CrossRef]
- Kundu, C.; Dubey, A.; Tonello, A.M.; Nallanathan, A.; Flanagan, M.F. Destination scheduling for secure pinhole-based power-line communication. IEEE Open J. Commun. Soc. 2023, 4, 2245–2260. [Google Scholar] [CrossRef]
- Ebady Manaa, M.; Hussain, S.M.; Alasadi, S.A.; Al-Khamees, H.A.A. DDoS attacks detection based on machine learning algorithms in IoT environments. Intel. Artif. 2024, 27, 152–165. [Google Scholar] [CrossRef]
- Jalo, H.; Heydarian, M. A hybrid technique based on RF-PCA and ANN for detecting DDoS attacks IoT. InfoTech Spectr. Iraqi J. Data Sci. 2024, 1, 27–41. [Google Scholar] [CrossRef]
- Monda, D.D.; Bovenzi, G.; Montieri, A.; Persico, V.; Pescapè, A. IoT botnet-traffic classification using few-shot learning. In Proceedings of the 2023 IEEE International Conference on Big Data (BigData), Sorrento, Italy, 15–18 December 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 3284–3293. [Google Scholar]
- Saif, S.; Widyawan, W.; Ferdiana, R. IoT-DH dataset for classification, identification, and detection DDoS attack in IoT. Data Brief 2024, 54, 110496. [Google Scholar] [CrossRef]
- Famera, A.G.; Shukla, R.M.; Bhunia, S. Cross device federated intrusion detector for early stage botnet propagation in IoT. In Proceedings of the 2024 IEEE International Systems Conference (SysCon), Montreal, QC, Canada, 15–18 April 2024. [Google Scholar]
- Zeng, Y.; Zhang, J.; Zhong, Y.; Deng, L.; Wang, M. STNet: A time-frequency analysis-based intrusion detection network for distributed optical fiber acoustic sensing systems. Sensors 2024, 24, 1570. [Google Scholar] [CrossRef] [PubMed]
- Mata-Hernandez, R.; Cardenas-Juarez, M.; Simón, J.; Stevens-Navarro, E.; Rizzardi, A. Exploring the path loss of a hacking tool for security matters in the internet of things. In Proceedings of the 2023 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC), Ixtapa, Mexico, 18–20 October 2023; IEEE: Piscataway, NJ, USA, 2023. [Google Scholar]
- Pakmehr, A.; Aßmuth, A.; Taheri, N.; Ghaffari, A. DDoS attack detection techniques in IoT networks: A survey. Clust. Comput. 2024, 27, 14637–14668. [Google Scholar] [CrossRef]
- Saiyed, M.F.; Al-Anbagi, I. Flow and unified information-based DDoS attack detection system for multi-topology IoT networks. Internet Things 2023, 24, 100976. [Google Scholar] [CrossRef]
- Pandey, N.; Mishra, P.K. Performance analysis of entropy variation-based detection of DDoS attacks in IoT. Internet Things 2023, 23, 100812. [Google Scholar] [CrossRef]
- Pravylo, V.; Averkiiev, Y. Analysing malicious software supporting DDoS attacks on IoT networks. Inf. Telecommun. Sci. 2024, 1, 50–54. [Google Scholar] [CrossRef]
- Al-Khafajiy, M.; Al-Tameemi, G.; Baker, T. DDoS-FOCUS: A distributed DoS attacks mitigation using deep learning approach for a secure IoT network. In Proceedings of the 2023 IEEE International Conference on Edge Computing and Communications (EDGE), Chicago, IL, USA, 2–8 July 2023; IEEE: Piscataway, NJ, USA, 2023. [Google Scholar]
- Alatram, A.; Sikos, L.F.; Johnstone, M.; Szewczyk, P.; Kang, J.J. DoS/DDoS-MQTT-IoT: A dataset for evaluating intrusions in IoT networks using the MQTT protocol. Comput. Netw. 2023, 231, 109809. [Google Scholar] [CrossRef]
- Mekala, S.H.; Baig, Z.; Anwar, A.; Syed, N. DoS attacks, human factors, and evidence extraction for the industrial internet of things (IIoT) paradigm. In Proceedings of the 2023 38th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW), Luxembourg, 11–15 September 2023; IEEE: Piscataway, NJ, USA, 2023. [Google Scholar]
- Kamal, T.; Helmy, E.; Fahmy, S.; Abd El-Azeem, M.H. Detecting and preventing for performance assessment of IoT devices under dodag information solicitation (dis) attacks. In Proceedings of the 2023 40th National Radio Science Conference (NRSC), Giza, Egypt, 30 May–1 June 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 110–120. [Google Scholar]
- Bouazzati, M.E.; Tessier, R.; Tanguy, P.; Gogniat, G. A lightweight intrusion detection system against IoT memory corruption attacks. In Proceedings of the 2023 26th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), Tallinn, Estonia, 3–5 May 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 118–123. [Google Scholar]
- Brezolin, U.; Vergütz, A.; Nogueira, M. A method for vulnerability detection by IoT network traffic analytics. Ad Hoc Netw. 2023, 149, 103247. [Google Scholar] [CrossRef]
- Alanazi, H.; Bi, S.; Wang, T.; Hou, T. Adaptive feature engineering via attention-based LSTM towards high performance reconnaissance attack detection. In Proceedings of the MILCOM 2023-2023 IEEE Military Communications Conference (MILCOM), Boston, MA, USA, 30 October–3 November 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 542–547. [Google Scholar]
- Keshavamurthy, P.; Kulkarni, S. Early detection of reconnaissance attacks on IoT devices by analyzing performance and traffic characteristics. In Proceedings of the 2023 IEEE International Conference on Cyber Security and Resilience (CSR), Venice, Italy, 31 July–2 August 2023; IEEE: Piscataway, NJ, USA, 2023. [Google Scholar]
- Ma, X.; Yan, C.; Wang, Y.; Wei, Q.; Wang, Y. A vulnerability scanning method for web services in embedded firmware. Appl. Sci. 2024, 14, 2373. [Google Scholar] [CrossRef]
- Bassiony, I.; Hussein, S.; Salama, G. Position falsification detection approach using travel distance-based feature. Transp. Telecommun. J. 2024, 25, 278–288. [Google Scholar] [CrossRef]
- Li, S.; Zhu, Z.; Zhu, Y.; Zhu, Q.; Zhang, J.; Sun, W.; Dai, G.; Qiao, F.; Yang, H.; Wang, Y. Memory-efficient and real-time SPAD-based dToF depth sensor with spatial and statistical correlation. In Proceedings of the 2023 60th ACM/IEEE Design Automation Conference (DAC), San Francisco, CA, USA, 9–13 July 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 1–6. [Google Scholar]
- Niang, P. Analysis of Data Sets for the Study of Computer Network Vulnerabilities. In Intelligent Transport Systems; Russian University of Transport: Moscow, Russia, 2024; pp. 699–709. [Google Scholar]
- Kaur, K.; Ayoade, J. Analysis of DDoS attacks on IoT architecture. In Proceedings of the 2023 10th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), Palembang, Indonesia, 20–21 September 2023; IEEE: Piscataway, NJ, USA, 2023. [Google Scholar]
- Ullah, S.; Mahmood, Z.; Ali, N.; Ahmad, T.; Buriro, A. Machine learning-based dynamic attribute selection technique for DDoS attack classification in IoT networks. Computers 2023, 12, 115. [Google Scholar] [CrossRef]
- Kumar, K.R.; Nakkeeran, R. A comprehensive study on denial of service (DoS) based on feature selection of a given set datasets in internet of things (IoT). In Proceedings of the 2023 International Conference on Signal Processing, Computation, Electronics, Power and Telecommunication (IConSCEPT), Karaikal, India, 25–26 May 2023; IEEE: Piscataway, NJ, USA, 2023. [Google Scholar]
Hardware/Software | Specification/Version |
---|---|
OS | Big Sur version 11.7.10 |
CPU | 2.3 GHz 8-Core Intel Core i9 |
Hard disk space | 1 TB |
RAM | 16 GB |
GPU | AMD Radeon Pro 4 GB Intel UHD Graphics 630 1536 MB |
Weka | 3.8.6 |
Python | 3.9 |
NumPy | 1.26.4 |
Pandas | 2.2.2 |
Matplotlib | 3.8.4 |
Scikit-learn | 1.4.2 |
Feature Selection | Search Method | Attribute Evaluator | Time (s) | Number of Features |
---|---|---|---|---|
CFS | Best first | CFS subset evaluator | 13.3 | 5 |
Pearson’s analysis | Attribute ranking | Correlation ranking filter | 1.2 | 32 |
Gain ratio | Attribute ranking | Gain ratio feature evaluator | 9.75 | 51 |
Information gain | Attribute ranking | Information gain ranking filter | 9.24 | 45 |
Symmetrical uncertainty | Attribute ranking | Symmetrical uncertainty ranking filter | 10.02 | 60 |
Feature | CFS | Pearson’s Analysis | Gain Ratio | Information Gain | Symmetric Uncertainty | Number of Occurrences |
---|---|---|---|---|---|---|
fwd_init_window_size | 1 | 1 | 1 | 1 | 1 | 5 |
bwd_pkts_payload.avg | 0 | 1 | 1 | 1 | 1 | 4 |
bwd_pkts_payload.max | 0 | 1 | 1 | 1 | 1 | 4 |
bwd_pkts_payload.std | 0 | 1 | 1 | 1 | 1 | 4 |
flow_SYN_flag_count | 0 | 1 | 1 | 1 | 1 | 4 |
flow_iat.std | 0 | 1 | 1 | 1 | 1 | 4 |
flow_pkts_payload.max | 0 | 1 | 1 | 1 | 1 | 4 |
fwd_iat.avg | 0 | 1 | 1 | 1 | 1 | 4 |
fwd_iat.max | 0 | 1 | 1 | 1 | 1 | 4 |
fwd_last_window_size | 1 | 0 | 1 | 1 | 1 | 4 |
fwd_pkts_payload.avg | 0 | 1 | 1 | 1 | 1 | 4 |
fwd_pkts_payload.max | 1 | 0 | 1 | 1 | 1 | 4 |
fwd_subflow_pkts | 0 | 1 | 1 | 1 | 1 | 4 |
id.resp_p | 0 | 1 | 1 | 1 | 1 | 4 |
payload_bytes_per_second | 0 | 1 | 1 | 1 | 1 | 4 |
service | 0 | 1 | 1 | 1 | 1 | 4 |
Methods | Number of Features | Accuracy | Precision | Recall | F1-Score |
---|---|---|---|---|---|
Original data | 83 | 93.5% | 61.7% | 99.7% | 76.2% |
All FS methods | 16 | 96.4% | 97.4% | 87.1% | 91.9% |
CFS | 5 | 93.1% | 80.9% | 63.0% | 70.8% |
Pearson’s analysis | 32 | 94.8% | 76.8% | 99.1% | 86.5% |
Gain ratio | 51 | 96.0% | 84.0% | 90.3% | 87.0% |
Information gain | 45 | 95.1% | 92.9% | 89.9% | 91.4% |
Symmetrical uncertainty | 60 | 95.6% | 93.9% | 93.9% | 93.9% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Almohaimeed, M.; Albalwy, F. Enhancing IoT Network Security Using Feature Selection for Intrusion Detection Systems. Appl. Sci. 2024, 14, 11966. https://doi.org/10.3390/app142411966
Almohaimeed M, Albalwy F. Enhancing IoT Network Security Using Feature Selection for Intrusion Detection Systems. Applied Sciences. 2024; 14(24):11966. https://doi.org/10.3390/app142411966
Chicago/Turabian StyleAlmohaimeed, Muhannad, and Faisal Albalwy. 2024. "Enhancing IoT Network Security Using Feature Selection for Intrusion Detection Systems" Applied Sciences 14, no. 24: 11966. https://doi.org/10.3390/app142411966
APA StyleAlmohaimeed, M., & Albalwy, F. (2024). Enhancing IoT Network Security Using Feature Selection for Intrusion Detection Systems. Applied Sciences, 14(24), 11966. https://doi.org/10.3390/app142411966