banner

IoT intrusion detection system using ensemble classifier and hyperparameter optimization using tuna search algorithm

P. M. Vijayan, S. Sundar

Abstract


The Internet of Things (IoT) is a dynamic and delightful research field in this emerging technology. It can be globally connected with many IoT devices and exchange a large amount of data. However, the threats also developed and misguided the entire network’s behaviour. This article proposes an Intrusion Detection System (IDS) using the proposed ensemble classifier along with the Tuna Swarm Optimization (TSO) to fine-tune the hyperparameters and help to enhance the detection accuracy of attacks that take place in IoT environment. Here, the publicly available message queue telemetry transport (MQTT) network dataset is used to classify the given data into the following categories: SlowlTe, malformed, brute force, flood, DoS, and legitimate. Initially, the dataset is pre-processed to remove possible outliers, then data balancing is performed using the Synthetic Minority Oversampling Technique (SMOTE) technique and features are extracted with the help of Recursive Feature Elimination (RFE). Finally, ensemble classifier along with the optimized parameters using TSO helps in detecting the attacks in IoT attacks. The proposed TSO-ensemble classifier achieved a classification accuracy of 99.12%. In contrast, the classification accuracy of the existing Improved Vulture Starvation-based African Vultures Optimization (IVS-AVOA) and Convolutional Neural Network Long Short-Term Memory (CNN-LSTM) have achieved a classification accuracy of 96.61% and 98.94% respectively.


Keywords


MQTT; IoT security; Internet of things; intrusion detection system; SMOTE; machine learning classifiers; TSO

Full Text:

PDF

References


1. Li R, Li Q, Zhou J, Jiang Y. ADRIoT: An edge-assisted anomaly detection framework against IoT-based network attacks. IEEE Internet of Things Journal 2022; 9(13): 10576–10587. doi: 10.1109/jiot.2021.3122148

2. Aminizadeh S, Heidari A, Toumaj S, et al. The applications of machine learning techniques in medical data processing based on distributed computing and the internet of things. Computer Methods and Programs in Biomedicine 2023; 241: 107745. doi: 10.1016/j.cmpb.2023.107745

3. Khan AR, Kashif M, Jhaveri RH, et al. Deep learning for intrusion detection and security of internet of things (IoT): Current analysis, challenges, and possible solutions. Security and Communication Networks 2022; 2022: 1–13. doi: 10.1155/2022/4016073

4. Abbas A, Khan MA, Latif S, et al. A new ensemble-based intrusion detection system for internet of things. Arabian Journal for Science and Engineering 2021; 47(2): 1805–1819. doi: 10.1007/s13369-021-06086-5

5. Krishna ESP, Thangavelu A. Attack detection in IoT devices using hybrid metaheuristic lion optimization algorithm and firefly optimization algorithm. International Journal of System Assurance Engineering and Management 2021. doi: 10.1007/s13198-021-01150-7

6. Babu MR, Veena KN. Implementing optimized classifier for distributed attack detection and BAIT-based attack correction in IoT. International Journal of System Assurance Engineering and Management 2021. doi: 10.1007/s13198-021-01115-w

7. Bedi P, Mewada S, Vatti RA, et al. RETRACTED: Detection of attacks in IoT sensors networks using machine learning algorithm. Microprocessors and Microsystems 2021; 82: 103814. doi: 10.1016/j.micpro.2020.103814

8. Bhosale SA, Sonavane SS. Wormhole attack detection system for IoT network: A hybrid approach. Wireless Personal Communications 2021; 124(2): 1081–1108. doi: 10.1007/s11277-021-09395-y

9. Mishra B, Kertesz A. The use of MQTT in M2M and IoT systems: A survey. IEEE Access 2020; 8: 201071–201086. doi: 10.1109/access.2020.3035849

10. Selvi M, Gayathri A, Santhosh Kumar SVN, Kannan A. Energy efficient and secured MQTT protocol using IoT. International Journal of Innovative Technology and Exploring Engineering (IJITEE) 2020; 9(4): 11–14. doi: 10.35940/ijitee.b6264.029420

11. Casteur G, Aubaret A, Blondeau B, et al. Fuzzing attacks for vulnerability discovery within MQTT protocol. In: Proceedings of the 2020 International Wireless Communications and Mobile Computing (IWCMC); 15–19 June 2020; Limassol, Cyprus. pp. 420–425.

12. Makhija J, Shetty AA, Bangera A. Classification of attacks on MQTT-based IoT system using machine learning techniques. In: Khanna A, Gupta D, Bhattacharyya S, et al. (editors). International Conference on Innovative Computing and Communications, Advances in Intelligent Systems and Computing. Springer; 2021. pp. 217–224.

13. da Costa KAP, Papa JP, Lisboa CO, et al. Internet of things: A survey on machine learning-based intrusion detection approaches. Computer Networks 2019; 151: 147–157. doi: 10.1016/j.comnet.2019.01.023

14. Buccafurri F, De Angelis V, Nardone R. Securing MQTT by blockchain-based OTP authentication. Sensors 2020; 20(7): 2002. doi: 10.3390/s20072002

15. Vijayan P M, Sundar S. An Efficient CatBoost Classifier Approach to Detect Intrusions in MQTT Protocol for Internet of Things. In: Chaki N, Devarakonda N, Cortesi A (editors). Lecture Notes on Data Engineering and Communications Technologies, Proceedings of International Conference on Computational Intelligence and Data Engineering; Singapore. Springer; 2023. Volume V163, pp. 255–267.

16. Verma A, Ranga V. Machine learning based intrusion detection systems for IoT applications. Wireless Personal Communications 2019; 111(4) :2287–2310. doi: 10.1007/s11277-019-06986-8

17. Kumar V, Das AK, Sinha D. UIDS: A unified intrusion detection system for IoT environment. Evolutionary Intelligence 2019; 14(1): 47–59. doi: 10.1007/s12065-019-00291-w

18. Amiri Z, Heidari A, Navimipour NJ, et al. Adventures in data analysis: A systematic review of deep learning techniques for pattern recognition in cyber-physical-social systems. Multimedia Tools and Applications 2023. doi: 10.1007/s11042-023-16382-x

19. Jeyaselvi M, Dhanaraj RK, Sathya M, et al. A highly secured intrusion detection system for IoT using EXPSO-STFA feature selection for LAANN to detect attacks. Cluster Computing 2022; 26(1): 559–574. doi: 10.1007/s10586-022-03607-1

20. Awajan A. A novel deep learning-based intrusion detection system for IOT networks. Computers 2023; 12(2): 34. doi: 10.3390/computers12020034

21. Zhong M, Zhou Y, Chen G. Sequential model-based intrusion detection system for IoT servers using deep learning methods. Sensors 2021; 21(4): 1113. doi: 10.3390/s21041113

22. Fatani A, Dahou A, Al-qaness MAA, et al. Advanced feature extraction and selection approach using deep learning and aquila optimizer for IoT intrusion detection system. Sensors 2021; 22(1): 140. doi: 10.3390/s22010140

23. Le KH, Nguyen MH, Tran TD, Tran ND. IMIDS: An intelligent intrusion detection system against cyber threats in IoT. Electronics 2022; 11(4): 524. doi: 10.3390/electronics11040524

24. Fatani A, Abd Elaziz M, Dahou A, et al. IoT intrusion detection system using deep learning and enhanced transient search optimization. IEEE Access 2021; 9: 123448–123464. doi: 10.1109/access.2021.3109081

25. Vaccari I, Chiola G, Aiello M, et al. MQTTset, a new dataset for machine learning techniques on MQTT. Sensors 2020; 20(22): 6578. doi: 10.3390/s20226578

26. Siddharthan H, Deepa T, Chandhar P. SENMQTT-SET: An intelligent intrusion detection in IoT-MQTT networks using ensemble multi cascade features. IEEE Access 2022; 10: 33095–33110. doi: 10.1109/access.2022.3161566

27. Vijayan PM, Sundar S. Hybrid MQTTNet: An intrusion detection system using heuristic-based optimal feature integration and hybrid fuzzy with 1DCNN. Cybernetics and Systems 2022; 2022: 1–34. doi: 10.1080/01969722.2022.2145649

28. Alzahrani A, Aldhyani THH. Artificial intelligence algorithms for detecting and classifying MQTT protocol internet of things attacks. Electronics 2022; 11(22): 3837. doi: 10.3390/electronics11223837

29. Liu J, Yang D, Lian M, Li M. Research on intrusion detection based on particle swarm optimization in IoT. IEEE Access 2021; 9: 38254–38268. doi: 10.1109/access.2021.3063671

30. Alqahtani AS. FSO-LSTM IDS: Hybrid optimized and ensembled deep-learning network-based intrusion detection system for smart networks. The Journal of Supercomputing 2022; 78(7): 9438–9455. doi: 10.1007/s11227-021-04285-3

31. Han H, Kim H, Kim Y. An efficient hyperparameter control method for a network intrusion detection system based on proximal policy optimization. Symmetry 2022; 14(1): 161. doi: 10.3390/sym14010161

32. Heidari A, Jafari Navimipour N, Unal M. A secure intrusion detection platform using blockchain and radial basis function neural networks for Internet of drones. IEEE Internet Things Journal. 2023; 10(10): 8445–8454. doi: 10.1109/jiot.2023.3237661

33. Heidari A, Jabraeil Jamali MA. Internet of things intrusion detection systems: A comprehensive review and future directions. Cluster Computing 2022; 26(6): 3753–3780. doi: 10.1007/s10586-022-03776-z




DOI: https://doi.org/10.32629/jai.v7i2.962

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 P. M. Vijayan, S. Sundar

License URL: https://creativecommons.org/licenses/by-nc/4.0/