Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction

07/04/2023
by   Vu-Duc Ngo, et al.
0

Internet of things (IoT) has been playing an important role in many sectors, such as smart cities, smart agriculture, smart healthcare, and smart manufacturing. However, IoT devices are highly vulnerable to cyber-attacks, which may result in security breaches and data leakages. To effectively prevent these attacks, a variety of machine learning-based network intrusion detection methods for IoT networks have been developed, which often rely on either feature extraction or feature selection techniques for reducing the dimension of input data before being fed into machine learning models. This aims to make the detection complexity low enough for real-time operations, which is particularly vital in any intrusion detection systems. This paper provides a comprehensive comparison between these two feature reduction methods of intrusion detection in terms of various performance metrics, namely, precision rate, recall rate, detection accuracy, as well as runtime complexity, in the presence of the modern UNSW-NB15 dataset as well as both binary and multiclass classification. For example, in general, the feature selection method not only provides better detection performance but also lower training and inference time compared to its feature extraction counterpart, especially when the number of reduced features K increases. However, the feature extraction method is much more reliable than its selection counterpart, particularly when K is very small, such as K = 4. Additionally, feature extraction is less sensitive to changing the number of reduced features K than feature selection, and this holds true for both binary and multiclass classifications. Based on this comparison, we provide a useful guideline for selecting a suitable intrusion detection type for each specific scenario, as detailed in Tab. 14 at the end of Section IV.

READ FULL TEXT

page 1

page 4

page 11

research
06/28/2021

Feature selection for intrusion detection systems

In this paper, we analyze existing feature selection methods to identify...
research
11/20/2020

Augmented whale feature selection for IoT attacks: Structure, analysis and applications

Smart connected appliances expand the boundaries of the conventional Int...
research
12/21/2018

A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT

Internet of Things (IoT) is a disruptive technology with applications ac...
research
05/27/2021

Intrusion Detection using Machine Learning Techniques: An Experimental Comparison

Due to an exponential increase in the number of cyber-attacks, the need ...
research
04/11/2021

Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review

Machine Learning (ML) techniques are becoming an invaluable support for ...
research
08/29/2021

Feature Analysis for ML-based IIoT Intrusion Detection

Industrial Internet of Things (IIoT) networks have become an increasingl...
research
09/02/2020

Cost-aware Feature Selection for IoT Device Classification

Classification of IoT devices into different types is of paramount impor...

Please sign up or login with your details

Forgot password? Click here to reset