A hybrid approach for efficient feature selection in anomaly intrusion detection for IoT networks
The Journal of Supercomputing,
Год журнала:
2024,
Номер
80(19), С. 26942 - 26984
Опубликована: Авг. 29, 2024
Abstract
The
exponential
growth
of
Internet
Things
(IoT)
devices
underscores
the
need
for
robust
security
measures
against
cyber-attacks.
Extensive
research
in
IoT
community
has
centered
on
effective
traffic
detection
models,
with
a
particular
focus
anomaly
intrusion
systems
(AIDS).
This
paper
specifically
addresses
preprocessing
stage
datasets
and
feature
selection
approaches
to
reduce
complexity
data.
goal
is
develop
an
efficient
AIDS
that
strikes
balance
between
high
accuracy
low
time.
To
achieve
this
goal,
we
propose
hybrid
approach
combines
filter
wrapper
methods.
integrated
into
two-level
system.
At
level
1,
our
classifies
network
packets
normal
or
attack,
2
further
classifying
attack
determine
its
specific
category.
One
critical
aspect
consider
imbalance
these
datasets,
which
addressed
using
Synthetic
Minority
Over-sampling
Technique
(SMOTE).
evaluate
how
selected
features
affect
performance
machine
learning
model
across
different
algorithms,
namely
Decision
Tree,
Random
Forest,
Gaussian
Naive
Bayes,
k-Nearest
Neighbor,
employ
benchmark
datasets:
BoT-IoT,
TON-IoT,
CIC-DDoS2019.
Evaluation
metrics
encompass
accuracy,
precision,
recall,
F1-score.
Results
indicate
decision
tree
achieves
ranging
99.82
100%,
short
times
0.02
0.15
s,
outperforming
existing
architectures
networks
establishing
superiority
achieving
both
times.
Язык: Английский
Identificación de ataques de denegación de servicio distribuido (DDoS) mediante la integración de algoritmos de aprendizaje automático y arquitecturas de redes neuronales artificiales.
Revista de Ingeniería Matemáticas y Ciencias de la Información,
Год журнала:
2025,
Номер
12(23)
Опубликована: Янв. 31, 2025
Objective:
To
identify
distributed
denial
of
service
(DDoS)
attacks
by
integrating
machine
learning
algorithms
and
artificial
neural
network
architectures.
Methodology:
structure
the
data
analysis,
Knowledge
Discovery
Data
(KDD)
technique
is
used.
This
approach
allows
examining
large
volumes
information
various
types,
with
objective
identifying
patterns,
correlations
producing
valuable
information.
As
for
set,
CIC-DDoS2019
dataset
developed
Canadian
Cybersecurity
Institute
Results:
When
training
evaluating
different
algorithms,
it
was
observed
that
models
based
on
decision
trees,
such
as
Random
Forest
XGBoost,
stood
out
achieving
best
results
in
terms
accuracy
efficiency.
On
other
hand,
analysis
performance
networks,
Closed
Stream
Units
(GRU)
obtaining
precision.
suggests
GRUs
achieve
an
optimal
balance
between
predictive
ability
minimization
false
positives
negatives.
Discussion:
In
comparison
traditional
networks
DDoS
attack
detection,
XGBoost
offer
similar
or
superior
also
exhibit
significantly
shorter
execution
times.
GRU
RNN
high
accuracy,
but
a
computational
cost.
Conclusions:
demonstrated
(F1-score:
0.9992)
speed
(11.47s),
positioning
itself
most
viable
alternative
real-time
implementations.
field
Gated
(GCU)
obtained
(accuracy:
0.9992;
F1-score:
0.9992),
given
to
process
temporal
dependencies
reduce
positives.
Язык: Английский
Heuristically enhanced multi-head attention based recurrent neural network for denial of wallet attacks detection on serverless computing environment
Scientific Reports,
Год журнала:
2025,
Номер
15(1)
Опубликована: Апрель 19, 2025
Denial
of
Wallet
(DoW)
attacks
are
a
cyber
threat
designed
to
utilize
and
deplete
an
organization's
financial
resources
by
generating
excessive
prices
or
charges
in
their
cloud
computing
(CC)
serverless
platforms.
These
threats
primarily
appropriate
manners
because
features
such
as
auto-scaling,
pay-as-you-go,
restricted
control,
cost
growth.
Serverless
computing,
frequently
recognized
Function-as-a-Service
(FaaS),
is
CC
method
that
permits
designers
construct
run
uses
without
the
requirement
accomplish
typical
server
structure.
Detecting
DoW
involves
monitoring
analyzing
system-level
resource
consumption
specific
bare-metal
mechanisms.
Efficient
precise
detection
internal
remains
crucial
challenge.
Timely
recognition
significant
preventing
potential
damage,
exploit
model
environments,
impacting
structure
operational
integrity
services.
In
this
study,
Multi-Head
Attention-based
Recurrent
Neural
Network
for
Attacks
Detection
(MHARNN-DoWAD)
technique
developed.
The
MHARNN-DoWAD
enables
on
environments.
At
first,
presented
performs
data
preprocessing
using
min-max
normalization
convert
input
into
constant
format.
Next,
wolf
pack
predation
(WPP)
employed
feature
selection.
classification
attacks,
multi-head
attention-based
bi-directional
gated
recurrent
unit
(MHA-BiGRU)
utilized.
Eventually,
improved
secretary
bird
optimizer
algorithm
(ISBOA)-based
hyperparameter
choice
process
accomplished
optimize
results
MHA-BiGRU
model.
A
comprehensive
set
simulations
was
conducted
demonstrate
promising
method.
experimental
validation
portrayed
superior
accuracy
value
98.30%
over
existing
models.
Язык: Английский
Detecting DDoS Attacks Through Decision Tree Analysis: An EDA Approach with the CIC DDoS 2019 Dataset
Опубликована: Авг. 29, 2024
Язык: Английский
Enhancing IoT security: A Creative Swagger Optimization algorithm for DDoS defence
Network Computation in Neural Systems,
Год журнала:
2024,
Номер
unknown, С. 1 - 39
Опубликована: Дек. 30, 2024
In
the
Internet
of
Things
(IoT),
security
information
between
network
transmissions
is
very
important
since
system
stores
data
in
storage
and
performed
by
exchange
about
things.
DDoS
an
IoT
attack
that
targets
availability
servers
flooding
communication
channel
with
impersonated
requests
coming
from
distributed
devices.
To
overcome
above-mentioned
issue,
this
research
proposed
a
Creative
Swagger
(CS)
Optimized
Deep
Convolutional
Neural
Network
(DeepCNN)
detects
mitigates
attacks.
The
CS
algorithm
designed
fusing
distinctive
behaviour
innovative
concepts
civilized
creature,
which
used
to
effectively
tune
parameters
CNN
improve
detection
accuracy
For
initial
verification,
blacklist
table
verification
includes
checking
IP
address
other
pertinent
attributes.
CS-optimized
model
obtains
high
effectiveness
attaining
97.07%,
sensitivity
97.23%,
specificity
96.91%
at
80%
training
for
utilizing
UNSW-NB15
Dataset.
Moreover,
method
provides
best
solution
detecting
attacks
platforms
higher
robustness.
Язык: Английский