Ensemble Learning Approach for Classification of Network Intrusion Detection in IoT Environment

Full Text (PDF, 1083KB), PP.30-46

Views: 0 Downloads: 0

Author(s)

Priya R. Maidamwar 1,* Prasad P. Lokulwar 2 Kailash Kumar 3

1. Department of Computer Science & Engineering, G H Raisoni University, Amravati, India

2. Department of Computer Science & Engineering, G H Raisoni College of Engineering, Nagpur, India

3. College of Computing and Informatics, Saudi Electronic University, Riyadh, Kingdom of Saudi Arabia

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2023.03.03

Received: 16 May 2022 / Revised: 4 Jul. 2022 / Accepted: 13 Oct. 2022 / Published: 8 Jun. 2023

Index Terms

Feature Selection, Intrusion Detection System, IDS, N_BaIoT Dataset, Random Forest (RF), Multilayer Perceptron Neural Network(MLP NN), UNSW NB15 Dataset

Abstract

Over the last two years,the number of cyberattacks has grown significantly, paralleling the emergence of new attack types as intruder’s skill sets have improved. It is possible to attack other devices on a botnet and launch a man-in-the-middle attack with an IOT device that is present in the home network. As time passes, an ever-increasing number of devices are added to a network. Such devices will be destroyed completely if one or both of them are disconnected from a network. Detection of intrusions in a network becomes more difficult because of this. In most cases, manual detection and intervention is ineffective or impossible. Consequently, it's vital that numerous types of network threats can be better identified with less computational complexity and time spent on processing. Numerous studies have already taken place, and specific attacks are being examined. In order to quickly detect an attack, an IDS uses a well-trained classification model. In this study, multi-layer perceptron classifier along with random forest is used to examine the accuracy, precision, recall and f-score of IDS. IoT environment-based intrusion related benchmark datasets UNSWNB-15 and N_BaIoT are utilized in the experiment. Both of these datasets are relatively newer than other datasets, which represents the latest attack. Additionally, ensembles of different tree sizes and grid search algorithms are employed to determine the best classifier learning parameters. The research experiment's outcomes demonstrate the effectiveness of the IDS model using random forest over the multi-layer perceptron neural network model since it outperforms comparable ensembles analyzed in the literature in terms of K-fold cross validation techniques.

Cite This Paper

Priya R. Maidamwar, Prasad P. Lokulwar, Kailash Kumar, "Ensemble Learning Approach for Classification of Network Intrusion Detection in IoT Environment", International Journal of Computer Network and Information Security(IJCNIS), Vol.15, No.3, pp.30-46, 2023. DOI:10.5815/ijcnis.2023.03.03

Reference

[1]R. Primartha and B. A. Tama, “Anomaly detection using random forest: A performance revisited,” Proc. 2017 Int. Conf. Data Softw. Eng. ICoDSE 2017, vol. 2018-Janua, pp. 1–6, 2018, doi: 10.1109/ICODSE.2017.8285847.
[2]M. Al-Zewairi, S. Almajali, and A. Awajan, “Experimental evaluation of a multi-layer feed forward artificial neural network classifier for network intrusion detection system,” Proc. - 2017 Int. Conf. New Trends Comput. Sci. ICTCS 2017, vol. 2018-Janua, no. October, pp. 167–172, 2017, doi: 10.1109/ICTCS.2017.29.
[3]H. M. Anwer, M. Farouk, and A. Abdel-Hamid, “A framework for efficient network anomaly intrusion detection with features selection,” 2018 9th Int. Conf. Inf. Commun. Syst. ICICS 2018, vol. 2018-Janua, pp. 157–162, 2018, doi: 10.1109/IACS.2018.8355459.
[4]S. Meftah, T. Rachidi, and N. Assem, “Network based intrusion detection using the UNSW-NB15 dataset,” Int. J. Comput. Digit. Syst., vol. 8, no. 5, pp. 477–487, 2019, doi: 10.12785/ijcds/080505.
[5]M. Idhammad, K. Afdel, and M. Belouch, “DoS Detection Method based on Artificial Neural Networks,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 4, 2017, doi: 10.14569/ijacsa.2017.080461.
[6]Hajisalem and S. Babaie, “A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection,” Comput. Networks, vol. 136, pp. 37–50, 2018, doi: 10.1016/j.comnet.2018.02.028.
[7]Y. Meidan et al., “N-BaIoT-Network-based detection of IoT botnet attacks using deep autoencoders,” IEEE Pervasive Comput., vol. 17, no. 3, pp. 12–22, 2018, doi: 10.1109/MPRV.2018.03367731.
[8]J. O. Mebawondu, O. D. Alowolodu, J. O. Mebawondu, and A. O. Adetunmbi, “Network intrusion detection system using supervised learning paradigm,” Sci. African, vol. 9, p. e00497, 2020, doi: 10.1016/j.sciaf.2020.e00497.
[9]V. Timčenko and S. Gajin, “Ensemble classifiers for supervised anomaly based network intrusion detection,” Proc. - 2017 IEEE 13th Int. Conf. Intell. Comput. Commun. Process. ICCP 2017, pp. 13–19, 2017, doi: 10.1109/ICCP.2017.8116977.
[10]M. H. Kamarudin, C. Maple, T. Watson, and N. S. Safa, “A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks,” IEEE Access, vol. 5, pp. 26190–26200, 2017, doi: 10.1109/ACCESS.2017.2766844.
[11]M. A. M. Aravind and V. K. G. Kalaiselvi, “Design of an intrusion detection system based on distance feature using ensemble classifier,” 2017 4th Int. Conf. Signal Process. Commun. Networking, ICSCN 2017, pp. 16–21, 2017, doi: 10.1109/ICSCN.2017.8085661.
[12]N. Moustafa, B. Turnbull, and K. K. R. Choo, “An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things,” IEEE Internet Things J., vol. 6, no. 3, pp. 4815–4830, 2019, doi: 10.1109/JIOT.2018.2871719.
[13]J. Alsamiri and K. Alsubhi, “Internet of things cyber attacks detection using machine learning,” Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 12, pp. 627–634, 2019, doi: 10.14569/ijacsa.2019.0101280.
[14]Pandey, S. Thaseen, C. Aswani Kumar, and G. Li, “Identification of botnet attacks using hybrid machine learning models,” Adv. Intell. Syst. Comput., vol. 1179 AISC, pp. 249–257, 2021, doi: 10.1007/978-3-030-49336-3_25.
[15]M. Alqahtani, H. Mathkour, and M. M. Ben Ismail, “IoT botnet attack detection based on optimized extreme gradient boosting and feature selection,” Sensors (Switzerland), vol. 20, no. 21, pp. 1–21, 2020, doi: 10.3390/s20216336.
[16]Kanimozhi and T. P. Jacob, “Artificial Intelligence outflanks all other machine learning classifiers in Network Intrusion Detection System on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing,” ICT Express, no. xxxx, 2020, doi: 10.1016/j.icte.2020.12.004.
[17]E. Özer, M. İskefiyeli, and J. Azimjonov, “Toward lightweight intrusion detection systems using the optimal and efficient feature pairs of the Bot-IoT 2018 dataset,” Int. J. Distrib. Sens. Networks, vol. 17, no. 10, p. 155014772110522, 2021, doi: 10.1177/15501477211052202.
[18]Rathod, Nishit et al. “Model Comparison and Multiclass Implementation Analysis on the UNSW NB15 Dataset.” 2021 International Conference on Computational Performance Evaluation (ComPE), 2021, doi:10.1109/ComPE53109.2021.9751832
[19]https://research.unsw.edu.au/projects/unsw-nb15-dataset
[20]Akash, Nazmus Sakib et al. “Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis.” Journal of Information and Communication Technology, 2022, doi: 10.32890/jict2022.21.2.3
[21]https://archive.ics.uci.edu/ml/datasets/detection_of_IoT_botnet_attacks_N_BaIoT
[22]S. Joshi and E. Abdelfattah, “Efficiency of Different Machine Learning Algorithms on the Multivariate Classification of IoT Botnet Attacks,” 2020 11th IEEE Annu. Ubiquitous Comput. Electron. Mob. Commun. Conf. UEMCON 2020, pp. 0517–0521, 2020, doi: 10.1109/UEMCON51285.2020.9298095.
[23]Y. Yin et al., “IGRF-RFE: A Hybrid Feature Selection Method for MLP-based Network Intrusion Detection on UNSW-NB15 Dataset,” 2022.
[24]Q. Zhou, R. Li, X. Lei, H. Zhu, and W. Liu, “An Assessment of Intrusion Detection using Machine Learning on Traffic Statistical Data,” vol. 14, no. 8, pp. 1–10, 2018.
[25]M. G. Desai, Y. Shi, and K. Suo, “IoT Bonet and Network Intrusion Detection using Dimensionality Reduction and Supervised Machine Learning,” 2020 11th IEEE Annu. Ubiquitous Comput. Electron. Mob. Commun. Conf. UEMCON 2020, pp. 0316–0322, 2020, doi: 10.1109/UEMCON51285.2020.9298146.
[26]Bagui, Sikha et al. “Machine Learning Based Intrusion Detection for IoT Botnet.” International Journal of Machine Learning and Computing, 2021, doi: 10.18178/ijmlc.2021.11.6.1068