Skip to main content

2024 | OriginalPaper | Buchkapitel

Intrusion Detection in IoT Devices Using ML and DL Models with Fisher Score Feature Selection

verfasst von : Deeksha Rajput, Deepak Kumar Sharma, Megha Gupta

Erschienen in: Cryptology and Network Security with Machine Learning

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

IoT devices are physical things that have sensors, network connectivity, and software built into them. This allows them to gather data and share it with other systems and devices. The rising usage of Internet of Things (IoT) systems in critical infrastructure and industrial settings has raised concerns about their vulnerability to cyber-attacks. Therefore, the IIoT desperately needs techniques for enhancing strategic actions. In this work, we propose an Intrusion Detection System (IDS) for IoT devices by using deep learning (DL) and machine learning (ML) algorithms, incorporating Fisher score feature selection on the Edge-IIoT dataset. To develop effective IDS models, we have first applied the Fisher score feature selection method for the identification of the most discriminative features from the Edge-IIoT dataset. For the ML-based IDS, we employ decision tree and random forest models, optimizing their hyperparameters using a systematic hyperparameter tuning approach getting 93.7% (Decision Tree), 94.36% (Random Forest), and 94.5% (Random Forest with hyperparameter tuning) accuracy. For the DL-based IDS, we propose a single-layered feed forward neural network (FFNN) and a multi-layered feed forward neural network (MLFNN) getting 96.1% and 96.5% accuracy, respectively. These models are trained on the selected features from the dataset and evaluated using various performance indicators, including recall, F1-score, accuracy, and precision. Overall, this research work contributes to the field of intrusion detection in IoT devices by combining Fisher score feature selection with both ML and DL algorithms. The findings highlight the prospective of hybrid approaches in increasing the security and resilience of IoT systems, ultimately enabling more robust and efficient intrusion detection mechanisms for IoT deployments in critical domains.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Faruqui N, Yousuf MA, Whaiduzzaman M, Azad AK, Barros A, Moni MA (2021) LungNet: a hybrid deep-CNN model for lung cancer diagnosis using CT and wearable sensor-based medical IoT data. Comput Biol Med 139:104961 (NL) Faruqui N, Yousuf MA, Whaiduzzaman M, Azad AK, Barros A, Moni MA (2021) LungNet: a hybrid deep-CNN model for lung cancer diagnosis using CT and wearable sensor-based medical IoT data. Comput Biol Med 139:104961 (NL)
2.
Zurück zum Zitat Abu Waraga O, Bettayeb M, Nasir Q, Talib MA (2020) Design and implementation of automated IoT security testbed. Comput Secur 88 Abu Waraga O, Bettayeb M, Nasir Q, Talib MA (2020) Design and implementation of automated IoT security testbed. Comput Secur 88
3.
Zurück zum Zitat Soldatos J, Gusmeroli S, Malo P, Di Orio G (2022) Internet of things applications in future manufacturing. In: Digitising the industry Internet of Things connecting the physical, digital and virtual worlds. River Publishers, The Netherlands, pp 153–183 Soldatos J, Gusmeroli S, Malo P, Di Orio G (2022) Internet of things applications in future manufacturing. In: Digitising the industry Internet of Things connecting the physical, digital and virtual worlds. River Publishers, The Netherlands, pp 153–183
5.
Zurück zum Zitat Williams R, McMahon E, Samtani S, Patton M, Chen H (2017) Identifying vulnerabilities of consumer Internet of Things (IoT) devices: a scalable approach. In: Proceedings of the 2017 IEEE international conference on intelligence and security informatics (ISI), Beijing, China, 22–24 July 2017, IEEE, New York (2017), pp 179–181 (NL) Williams R, McMahon E, Samtani S, Patton M, Chen H (2017) Identifying vulnerabilities of consumer Internet of Things (IoT) devices: a scalable approach. In: Proceedings of the 2017 IEEE international conference on intelligence and security informatics (ISI), Beijing, China, 22–24 July 2017, IEEE, New York (2017), pp 179–181 (NL)
11.
Zurück zum Zitat Zheng Y, Li Z, Xu X, Zhao Q (2022) Dynamic defenses in cyber security: techniques, methods and challenges. Digit Commun Netw 8:422–435CrossRef Zheng Y, Li Z, Xu X, Zhao Q (2022) Dynamic defenses in cyber security: techniques, methods and challenges. Digit Commun Netw 8:422–435CrossRef
13.
Zurück zum Zitat Saxena U, Sodhi JS, Singh Y (2020) A comprehensive approach for DDoS attack detection in smart home network using shortest path algorithm. In: Proceedings of 8th international conference on reliability, infocom technologies and optimization, trends future directions (ICRITO), pp 392–395 Saxena U, Sodhi JS, Singh Y (2020) A comprehensive approach for DDoS attack detection in smart home network using shortest path algorithm. In: Proceedings of 8th international conference on reliability, infocom technologies and optimization, trends future directions (ICRITO), pp 392–395
14.
Zurück zum Zitat Sharma S, Singh Y, Anand P (2023) Time series-based IDS for detecting botnet attacks in IoT and embedded devices. In Singh Y, Verma C, Zoltán I, Chhabra JK, Singh PK (eds) Proceedings of international conference on recent innovations in computing. ICRIC 2022. Lecture notes in electrical engineering, vol 1011. Springer, Singapore. https://doi.org/10.1007/978-981-99-0601-7_27 Sharma S, Singh Y, Anand P (2023) Time series-based IDS for detecting botnet attacks in IoT and embedded devices. In Singh Y, Verma C, Zoltán I, Chhabra JK, Singh PK (eds) Proceedings of international conference on recent innovations in computing. ICRIC 2022. Lecture notes in electrical engineering, vol 1011. Springer, Singapore. https://​doi.​org/​10.​1007/​978-981-99-0601-7_​27
20.
Zurück zum Zitat Shukla V, Mishra A, Agarwal S (2020) A new one time password generation method for financial transactions with randomness analysis. In: Innovations in electrical and electronic engineering (part of the lecture notes in electrical engineering book series (LNEE, vol 661), pp 713–720. https://doi.org/10.1007/978-981-15-4692-1_54 Shukla V, Mishra A, Agarwal S (2020) A new one time password generation method for financial transactions with randomness analysis. In: Innovations in electrical and electronic engineering (part of the lecture notes in electrical engineering book series (LNEE, vol 661), pp 713–720. https://​doi.​org/​10.​1007/​978-981-15-4692-1_​54
21.
Zurück zum Zitat Narwal B, Mohapatra AK (2021) A survey on security and authentication in wireless body area networks. J Syst Architect 113:101883CrossRef Narwal B, Mohapatra AK (2021) A survey on security and authentication in wireless body area networks. J Syst Architect 113:101883CrossRef
23.
Zurück zum Zitat Narwal B, Mohapatra AK (2020) SEEMAKA: secured energy-efficient mutual authentication and key agreement scheme for wireless body area networks. Wirel Pers Commun 113(4):1985–2008CrossRef Narwal B, Mohapatra AK (2020) SEEMAKA: secured energy-efficient mutual authentication and key agreement scheme for wireless body area networks. Wirel Pers Commun 113(4):1985–2008CrossRef
24.
Zurück zum Zitat Narwal B, Mohapatra AK (2021) SAMAKA: secure and anonymous mutual authentication and key agreement scheme for wireless body area networks. Arab J Sci Eng 46(9):9197–9219CrossRef Narwal B, Mohapatra AK (2021) SAMAKA: secure and anonymous mutual authentication and key agreement scheme for wireless body area networks. Arab J Sci Eng 46(9):9197–9219CrossRef
25.
Zurück zum Zitat Sharma M, Narwal B, Anand R, Mohapatra AK, Yadav R (2023) PSECAS: a physical unclonable function based secure authentication scheme for Internet of Drones. Comput Electr Eng 108:108662CrossRef Sharma M, Narwal B, Anand R, Mohapatra AK, Yadav R (2023) PSECAS: a physical unclonable function based secure authentication scheme for Internet of Drones. Comput Electr Eng 108:108662CrossRef
29.
Zurück zum Zitat Zarpelão BB, Rodrigo SM, Cláudio TK, Sean CA (2017) A survey of intrusion detection in Internet of Things. J Netw Comput Appl 84:25–37CrossRef Zarpelão BB, Rodrigo SM, Cláudio TK, Sean CA (2017) A survey of intrusion detection in Internet of Things. J Netw Comput Appl 84:25–37CrossRef
30.
Zurück zum Zitat Arshad J, Azad MA, Abdeltaif MM, Salah K (2020) An intrusion detection framework for energy-constrained IoT devices. Mech Syst Signal Process 136:106436CrossRef Arshad J, Azad MA, Abdeltaif MM, Salah K (2020) An intrusion detection framework for energy-constrained IoT devices. Mech Syst Signal Process 136:106436CrossRef
32.
Zurück zum Zitat Albulayhi K, Abu Al-Haija Q, Alsuhibany SA, Jillepalli AA, Ashrafuzzaman M, Sheldon FT (2022) IoT intrusion detection using machine learning with a novel high performing feature selection method. Appl Sci 12:5015. https://doi.org/10.3390/app12105015 Albulayhi K, Abu Al-Haija Q, Alsuhibany SA, Jillepalli AA, Ashrafuzzaman M, Sheldon FT (2022) IoT intrusion detection using machine learning with a novel high performing feature selection method. Appl Sci 12:5015. https://​doi.​org/​10.​3390/​app12105015
33.
Zurück zum Zitat Manimurugan S, Almutairi S, Aborokbah MM, Chilamkurti N, Ganesan S, Patan R (2020) Effective attack detection in the internet of medical things smart environment using a deep belief neural network. IEEE Access 8(1–1):77404 Manimurugan S, Almutairi S, Aborokbah MM, Chilamkurti N, Ganesan S, Patan R (2020) Effective attack detection in the internet of medical things smart environment using a deep belief neural network. IEEE Access 8(1–1):77404
36.
Zurück zum Zitat Saheed YK, Abiodun AI, Misra S, Holone MK, Colomo-Palacios R (2022) A machine learning-based intrusion detection for detecting internet of things network attacks. Alex Eng J 61(12):9395–9409CrossRef Saheed YK, Abiodun AI, Misra S, Holone MK, Colomo-Palacios R (2022) A machine learning-based intrusion detection for detecting internet of things network attacks. Alex Eng J 61(12):9395–9409CrossRef
37.
Zurück zum Zitat Guezzaz A, Azrour M, Benkirane S, Mohy-Eddine M, Attou H, Douiba M (2022) A lightweight hybrid intrusion detection framework using machine learning for edge-based IIoT security. Int Arab J Inf Technol 19(5) Guezzaz A, Azrour M, Benkirane S, Mohy-Eddine M, Attou H, Douiba M (2022) A lightweight hybrid intrusion detection framework using machine learning for edge-based IIoT security. Int Arab J Inf Technol 19(5)
38.
Zurück zum Zitat Gaber T, El-Ghamry A, Hassanien AE (2022) Injection attack detection using machine learning for smart IoT applications. Physical Communication 52:101685CrossRef Gaber T, El-Ghamry A, Hassanien AE (2022) Injection attack detection using machine learning for smart IoT applications. Physical Communication 52:101685CrossRef
39.
Zurück zum Zitat Liu J, Kantarci B, Adams C (2020) Machine learning-driven intrusion detection for Contiki-NG-based IoT networks exposed to NSL-KDD dataset. In: Proceedings of the 2nd ACM workshop on wireless security and machine learning (WiseML ‘20). Association for Computing Machinery, New York, pp 25–30. https://doi.org/10.1145/3395352.3402621 Liu J, Kantarci B, Adams C (2020) Machine learning-driven intrusion detection for Contiki-NG-based IoT networks exposed to NSL-KDD dataset. In: Proceedings of the 2nd ACM workshop on wireless security and machine learning (WiseML ‘20). Association for Computing Machinery, New York, pp 25–30. https://​doi.​org/​10.​1145/​3395352.​3402621
40.
Zurück zum Zitat Rashid MM, Khan SU, Eusufzai F, Redwan MA, Sabuj SR, Elsharief M (2023) A federated learning-based approach for improving intrusion detection in industrial Internet of Things networks. Network 3(1):158–179CrossRef Rashid MM, Khan SU, Eusufzai F, Redwan MA, Sabuj SR, Elsharief M (2023) A federated learning-based approach for improving intrusion detection in industrial Internet of Things networks. Network 3(1):158–179CrossRef
41.
Zurück zum Zitat Mendonça RV, Silva JC, Rosa RL, Saadi M, Rodriguez DZ, Farouk A (2022) A lightweight intelligent intrusion detection system for industrial internet of things using deep learning algorithms. Expert Syst 39(5):e12917CrossRef Mendonça RV, Silva JC, Rosa RL, Saadi M, Rodriguez DZ, Farouk A (2022) A lightweight intelligent intrusion detection system for industrial internet of things using deep learning algorithms. Expert Syst 39(5):e12917CrossRef
42.
Zurück zum Zitat Saba T, Rehman A, Sadad T, Kolivand H, Bahaj SA (2022) Anomaly-based intrusion detection system for IoT networks through deep learning model. Comput Electr Eng 99:107810CrossRef Saba T, Rehman A, Sadad T, Kolivand H, Bahaj SA (2022) Anomaly-based intrusion detection system for IoT networks through deep learning model. Comput Electr Eng 99:107810CrossRef
45.
Zurück zum Zitat Davis JJ, Clark AJ (2011) Data preprocessing for anomaly based network intrusion detection: a review. Comput Secur 30(6–7):353–375 Davis JJ, Clark AJ (2011) Data preprocessing for anomaly based network intrusion detection: a review. Comput Secur 30(6–7):353–375
47.
Zurück zum Zitat Dunne K, Cunningham P, Azuaje F (2002) Solutions to instability problems with sequential wrapper-based approaches to feature selection. Trinity College Dublin, Department of Computer Science Dunne K, Cunningham P, Azuaje F (2002) Solutions to instability problems with sequential wrapper-based approaches to feature selection. Trinity College Dublin, Department of Computer Science
48.
Zurück zum Zitat Gu Q, Li Z, Han J (2012) Generalized fisher score for feature selection. In: Proceedings of the 27th conference on uncertainty in artificial intelligence, UAI 2011 Gu Q, Li Z, Han J (2012) Generalized fisher score for feature selection. In: Proceedings of the 27th conference on uncertainty in artificial intelligence, UAI 2011
49.
Zurück zum Zitat Myles AJ, Feudale RN, Liu Y, Woody NA, Brown SD (2004) An introduction to decision tree modeling. J Chemometr A J Chemometr Soc 18(6):275–285y Myles AJ, Feudale RN, Liu Y, Woody NA, Brown SD (2004) An introduction to decision tree modeling. J Chemometr A J Chemometr Soc 18(6):275–285y
50.
Zurück zum Zitat Biau G (2012) Analysis of a random forests model. J Mach Learn Res 13(1):1063–1095MathSciNet Biau G (2012) Analysis of a random forests model. J Mach Learn Res 13(1):1063–1095MathSciNet
52.
Zurück zum Zitat Sazli MH (2006) A brief review of feed-forward neural networks. Commun Fac Sci Univ Ankara Ser A2–A3 Phys Sci Eng 50(01) Sazli MH (2006) A brief review of feed-forward neural networks. Commun Fac Sci Univ Ankara Ser A2–A3 Phys Sci Eng 50(01)
53.
Zurück zum Zitat Svozil D, Kvasnicka V, Pospichal J (1997) Introduction to multi-layer feed-forward neural networks. Chemom Intell Lab Syst 39(1):43–62CrossRef Svozil D, Kvasnicka V, Pospichal J (1997) Introduction to multi-layer feed-forward neural networks. Chemom Intell Lab Syst 39(1):43–62CrossRef
Metadaten
Titel
Intrusion Detection in IoT Devices Using ML and DL Models with Fisher Score Feature Selection
verfasst von
Deeksha Rajput
Deepak Kumar Sharma
Megha Gupta
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0641-9_8

Neuer Inhalt