A hybrid approach for efficient feature selection in anomaly intrusion detection for IoT networks
The Journal of Supercomputing,
Journal Year:
2024,
Volume and Issue:
80(19), P. 26942 - 26984
Published: Aug. 29, 2024
Abstract
The
exponential
growth
of
Internet
Things
(IoT)
devices
underscores
the
need
for
robust
security
measures
against
cyber-attacks.
Extensive
research
in
IoT
community
has
centered
on
effective
traffic
detection
models,
with
a
particular
focus
anomaly
intrusion
systems
(AIDS).
This
paper
specifically
addresses
preprocessing
stage
datasets
and
feature
selection
approaches
to
reduce
complexity
data.
goal
is
develop
an
efficient
AIDS
that
strikes
balance
between
high
accuracy
low
time.
To
achieve
this
goal,
we
propose
hybrid
approach
combines
filter
wrapper
methods.
integrated
into
two-level
system.
At
level
1,
our
classifies
network
packets
normal
or
attack,
2
further
classifying
attack
determine
its
specific
category.
One
critical
aspect
consider
imbalance
these
datasets,
which
addressed
using
Synthetic
Minority
Over-sampling
Technique
(SMOTE).
evaluate
how
selected
features
affect
performance
machine
learning
model
across
different
algorithms,
namely
Decision
Tree,
Random
Forest,
Gaussian
Naive
Bayes,
k-Nearest
Neighbor,
employ
benchmark
datasets:
BoT-IoT,
TON-IoT,
CIC-DDoS2019.
Evaluation
metrics
encompass
accuracy,
precision,
recall,
F1-score.
Results
indicate
decision
tree
achieves
ranging
99.82
100%,
short
times
0.02
0.15
s,
outperforming
existing
architectures
networks
establishing
superiority
achieving
both
times.
Language: Английский
A Multiscale Principal Component Analysis Approach to Physical Layer Secret Key Generation in Indoor Environments
Megha S. Kumar,
No information about this author
R. Ramanathan
No information about this author
Transactions on Emerging Telecommunications Technologies,
Journal Year:
2025,
Volume and Issue:
36(3)
Published: March 1, 2025
ABSTRACT
With
the
rise
of
Industry
5.0,
smart
cities,
and
ever‐expanding
use
general
wireless
networks,
ensuring
seamless
communication
robust
data
security
has
become
a
critical
challenge.
Generating
secure
secret
keys
(SKG)
through
channels
is
particularly
complex
in
environments
where
noise
wideband
conditions
introduce
discrepancies
autocorrelation
channel
measurements.
These
issues
compromise
cross‐correlation
randomness,
leading
to
substantial
bit
disagreements,
distinct
at
transceivers,
unsuccessful
SKG.
This
research
begins
by
outlining
mathematical
model
signal
preprocessing
technique
called
multiscale
principal
component
analysis
(MSPCA).
Subsequently,
it
explores
performance
key
generation
when
employing
proposed
scheme.
A
holistic
system‐level
framework
for
creating
initial
shared
presented,
encompassing
quantization
methods
such
as
uniform
multilevel
(UMQ)
encoding
3‐bit
Gray
encoding.
Monte
Carlo‐based
simulations
an
indoor
scenario
evaluate
system
efficacy
using
metrics
like
Pearson
correlation
coefficient,
disagreement
rate
(BDR),
complexity.
The
scheme
achieves
BDR
lower
than
0.01,
coefficient
greater
0.95,
passes
all
National
Institute
Standards
Technology
(NIST)
randomness
tests,
establishing
viable
solution
securing
systems.
In
context
5.0
city
infrastructures,
are
paramount,
SKG
offers
significant
potential.
its
ability
ensure
reliable
communication,
this
can
underpin
development
advanced
systems
that
cater
high
demands
interconnected
ecosystems,
enhancing
resilience
trust
applications.
Language: Английский
A feature selection-driven machine learning framework for anomaly-based intrusion detection systems
Emre Emirmahmutoğlu,
No information about this author
Yılmaz Atay
No information about this author
Peer-to-Peer Networking and Applications,
Journal Year:
2025,
Volume and Issue:
18(3)
Published: April 28, 2025
Language: Английский
A Hybrid Feature Selection Model for Anomaly-Based Intrusion Detection in IoT Networks
2022 International Telecommunications Conference (ITC-Egypt),
Journal Year:
2024,
Volume and Issue:
unknown, P. 1 - 7
Published: July 22, 2024
Language: Английский
A hybrid intrusion detection approach based on message queuing telemetry transport (MQTT) protocol in industrial internet of things
Georg Thamer Francis,
No information about this author
Alireza Souri,
No information about this author
Nihat İnanç
No information about this author
et al.
Transactions on Emerging Telecommunications Technologies,
Journal Year:
2024,
Volume and Issue:
35(9)
Published: Aug. 20, 2024
Abstract
The
number
of
attacks
against
Industrial
Internet
Things
(IIoT)
devices
has
increased
over
the
past
years,
particularly
on
widely
used
communication
protocols
like
Message
Queuing
Telemetry
Transfer
(MQTT).
fast
increase
in
IIoT
applications
brings
both
critical
challenges
and
technical
gaps
cybersecurity.
On
other
hand,
traditional
cyber‐attack
detection
approaches
scrap
to
address
support
run‐time
responsibilities
environments.
This
study
presents
a
hybrid
Genetic
Algorithm
Random
Forest
(GA_RF)
method
for
detecting
cyber‐attacks
Control
Machines
(ICS)
that
use
MQTT
protocol
environment.
architecture
integrates
ICS
with
edge
cloud
servers,
using
GA_RF
algorithm
detect
anomalies
data
collected
by
sensors.
Normal
is
processed
locally
then
sent
storage
return,
ensuring
continuous
monitoring
security.
Also,
MQTT‐IOT‐IDS2020
dataset
as
real
test
case
was
applied
prediction
proposed
compare
some
powerful
machine
deep
learning
models.
experimental
results
show
an
optimum
accuracy
99.87%–100%
cyber‐attacks.
also
achieved
0–0.0015
Mean
Absolute
Error
(MAE)
100%
Precision,
Recall,
F‐score
factors.
result
led
architecture,
which
connects
server
while
running
In
conclusion,
this
indicates
effectiveness
aims
improve
security
IIoT.
Language: Английский
MS-CFFS: Multistage Coarse and Fine Feature Selecton for Advanced Anomaly Detection in IoT Security Networks
International Journal of Electrical and Electronics Research,
Journal Year:
2024,
Volume and Issue:
12(3), P. 780 - 790
Published: July 25, 2024
In
recent
years,
the
concept
of
Internet-of-Things
(IoT)
has
increased
in
popularity,
leading
to
a
massive
increase
both
number
connected
devices
and
volume
data
they
handle.
With
IoT
constantly
collecting
sharing
large
quantities
sensitive
data,
securing
this
is
major
concern,
especially
with
network
anomalies.
A
network-based
anomaly
detection
system
serves
as
crucial
safeguard
for
networks,
aiming
identify
irregularities
entry
point
by
continuously
monitoring
traffic.
However,
research
community
contributed
more
field,
security
still
faces
several
challenges
detecting
these
anomalies,
often
resulting
high
rate
false
alarms
missed
detections
when
it
comes
classifying
traffic
computational
complexity.
Seeing
this,
we
propose
novel
method
capabilities
Anomaly
Detection
IoT.
This
study
introduces
deep
learning
(DL)
based
Multistage
Coarse
Fine
Feature
Selection
(MS-CFFS),
improve
techniques
devised
frameworks.
The
proposed
feature
section
done
two
stages.
MS-CFFS,
utilizing
learning-based
dual-stage
selection,
substantially
improves
NIDS
efficacy.
results
confirm
MS-CFFS's
outstanding
classification
accuracy
at
99.93%,
remarkably
low
FAR
0.05%
FNR
0.11%.
These
achievements
stem
from
refining
set
28
pivotal
features,
thus
notably
cutting
complexity
without
sacrificing
precision.
Furthermore,
comparative
analysis
leading-edge
approaches
validates
preeminence
our
MS-CFFS
domain
security.
Language: Английский
A comprehensive analysis of machine learning-based intrusion detection systems: evaluating datasets and algorithms for internet of things
Journal of Cyber Security Technology,
Journal Year:
2024,
Volume and Issue:
unknown, P. 1 - 27
Published: Dec. 27, 2024
With
the
recent
advancement
of
Internet
Things
(IoT)
in
various
sectors,
security
has
become
an
essential
requirement.
Any
IoT
application
or
device
may
be
compromised
by
intruders
to
disrupt
entire
network.
These
kinds
insider
attacks
are
difficult
prevent.
Here,
Intrusion
Detection
System
(IDS)
can
play
important
role
identifying
unknown
attacks.
IDS
uses
network
traffic
logs
detect
and
respond
suspicious
activities
anomalies
before
attackers
exploit
system
weaknesses.
Machine
learning
models
among
most
efficient
effective
methods
identify
anomalous
behaviors.
Hence,
this
paper,
we
have
conducted
a
comprehensive
analysis
utilizing
several
supervised
semi-supervised
machine
algorithms
assess
their
performance.
We
utilized
15
benchmark
datasets
containing
samples
related
employed
holdout
k-fold
cross-validation
for
performance
comparison.
also
discussed
identified
possible
reasons
respective
outcomes.
Experimental
results
indicate
that
two
algorithms,
kNN
ANN,
exhibit
highest
terms
accuracy,
precision,
recall,
etc.
This
with
evaluation
metrics
provides
researchers
valuable
insights.
Language: Английский