Augmented whale feature selection for IoT attacks: Structure, analysis and applications

11/20/2020
by   Ali Asghar Heidari, et al.
1

Smart connected appliances expand the boundaries of the conventional Internet into the new Internet of Things (IoT). IoT started to hold a significant role in our life, and in several fields as in transportation, industry, smart homes, and cities. However, one of the critical issues is how to protect IoT environments and prevent intrusions. Attacks detection systems aim to identify malicious patterns and threats that cannot be detected by traditional security countermeasures. In literature, feature selection or dimensionality reduction has been profoundly studied and applied to the design of intrusion detection systems. In this paper, we present a novel wrapper feature selection approach based on augmented Whale Optimization Algorithm (WOA), which adopted in the context of IoT attacks detection and handles the high dimensionality of the problem. In our approach, we introduce the use of both V-shaped and S-shaped transfer functions into WOA and compare the superior variant with other well-known evolutionary optimizers. The experiments are conducted using N-BaIoT dataset; wherein, five datasets were sampled from the original dataset. The dataset represents real IoT traffic, which is drawn from the UCI repository. The experimental results show that WOA based on V-shaped transfer function combined with elitist tournament binarization method is superior over S-shaped transfer function and outperforms other well-regarded evolutionary optimizers based on the obtained average accuracy, fitness, number of features, running time and convergence curves. Hence, we can conclude that the proposed approach can be deployed in IoT intrusion detection systems. Visit: HTTP://aliasgharheidari.com

READ FULL TEXT

page 2

page 3

page 4

page 7

page 8

page 16

page 23

page 24

research
07/04/2023

Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction

Internet of things (IoT) has been playing an important role in many sect...
research
06/11/2019

TS-RF: Combinatorial Optimization based Feature Selection Method for Network Intrusion Detection

Advancements in computer networks and communication technologies like so...
research
07/18/2020

Toward a Deep Learning-Driven Intrusion Detection Approach for Internet of Things

Internet of Things (IoT) has brought along immense benefits to our daily...
research
06/06/2023

Effective Intrusion Detection in Highly Imbalanced IoT Networks with Lightweight S2CGAN-IDS

Since the advent of the Internet of Things (IoT), exchanging vast amount...
research
04/07/2017

Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System

The Internet of things (IoT) is still in its infancy and has attracted m...
research
08/29/2021

Feature Analysis for ML-based IIoT Intrusion Detection

Industrial Internet of Things (IIoT) networks have become an increasingl...
research
07/12/2020

A Novel Dimension Reduction Scheme for Intrusion Detection Systems in IoT Environments

Internet of Things (IoT) brings new challenges to the security solutions...

Please sign up or login with your details

Forgot password? Click here to reset