Volume 13 , Issue 2 , PP: 272-292, 2024 | Cite this article as | XML | Html | PDF | Full Length Article
Rami Baazeem 1 *
Doi: https://doi.org/10.54216/JISIoT.130222
An influx of smart spaces that are now connected to the IoT network has increased new forms of cyber threats; thus, a need for more effective IDS to deal with these complex cyber threats. Traditional security measures cannot solve the modern problem of protecting IoT devices as they are a complex and homogeneously distributed network. Advancements and development of Artificial intelligent (AI) and machine learning technologies have provided new hope to make more reliable IDS. Our study presents Particle Swarm Optimization integrated Light-Weight Gradient Boosting Machine, abbreviated as LGBM-PSO in which, the PSO algorithm is applied for hyper parameters optimization in the model training. Based on the ensemble methodology, a new model for network intrusion detection is proposed in this study to improve the accuracy of the technique proposed. As for the current study project, the “DS2OS” dataset was employed to execute the suggested task. All of the data obtained from the traces of the smart devices placed in a smart home environment are incorporated in this dataset. The IDS model comprises several stages, one of which comprises data preprocessing that entails data cleaning, normalization, and encoding of network traffic data. Feature selection and dimensionality reduction are used which leads to the optimization of the dataset in this case. The core of the model comprises four classifiers: The compared models are Decision Tree (DT), LGBM-PSO, Light Gradient Boost Machine (LGBM), and Extreme Gradient Boost (XGB). Each of these classifiers can be combined with a majority voting ensemble method to increase the reliability of the predictions. The suggested model's accuracy that is LGBM-PSO is the highest with a value of 99.89%. The corresponding figures for the training data are 99.79%. Stand on the testing data proving the efficiency and stability of the algorithm. The use of the ensemble approach is superior especially when using a complex model like LGBM-PSO in the field of intrusion detection. As a result, high accuracy, optimized time, and effective threat identification ensure that it is a useful tool in strengthening security in the different applications.
CS , Cybersecurity , Artificial Intelligence , Internet of Things , Smart Environment , IDS , LGBM , SVM , KNN
[1] Schwab, K., 2017. The fourth industrial revolution. Crown Currency.
[2] Aliero, M.S., Qureshi, K.N., Pasha, M.F. and Jeon, G., 2021. Smart Home Energy Management Systems in Internet of Things networks for green cities demands and services. Environmental Technology & Innovation, 22, p.101443.
[3] Zeadally, S. and Bello, O., 2021. Harnessing the power of Internet of Things based connectivity to improve healthcare. Internet of Things, 14, p.100074.
[4] Andreev, S., Galinina, O., Pyattaev, A., Gerasimenko, M., Tirronen, T., Torsner, J., Sachs, J., Dohler, M. and Koucheryavy, Y., 2015. Understanding the IoT connectivity landscape: a contemporary M2M radio technology roadmap. IEEE Communications Magazine, 53(9), pp.32-40.
[5] Praveen, G. Pandian, D. F., C. "IntelliCare: Integrating IoT and Machine Learning for Remote Patient Monitoring in Healthcare: A Comprehensive Framework," Journal of Journal of Cognitive Human-Computer Interaction, vol. 7, no. 2, pp. 50-59, 2024. DOI: https://doi.org/10.54216/JCHCI.070205
[6] Ali, M.S., Vecchio, M., Pincheira, M., Dolui, K., Antonelli, F. and Rehmani, M.H., 2018. Applications of blockchains in the Internet of Things: A comprehensive survey. IEEE Communications Surveys & Tutorials, 21(2), pp.1676-1717.
[7] Khraisat, A. and Alazab, A., 2021. A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity, 4, pp.1-27.
[8] Choi, I., Lee, J., Kwon, T., Kim, K., Choi, Y. and Song, J., 2021, August. An easy-to-use framework to build and operate AI-based intrusion detection for in-situ monitoring. In 2021 16th Asia Joint Conference on Information Security (AsiaJCIS) (pp. 1-8). IEEE.
[9] Aziz, A. Mirzaliev, S. Maqsudjon, Y. "Enhancing Malware Detection in Cybersecurity through Optimized Machine Learning Technique," Journal of International Journal of Advances in Applied Computational Intelligence, vol. 4, no. 2, pp. 26-32, 2023. DOI: https://doi.org/10.54216/IJAACI.040203
[10] panthi, V. Kumar, A. "Enhancing Healthcare Monitoring through the Integration of IoT Networks and Machine Learning," Journal of International Journal of Wireless and Ad Hoc Communication, vol. 7, no. 1, pp. 28-39, 2023. DOI: https://doi.org/10.54216/IJWAC.070103
[11] Osman, M., He, J., Mokbal, F.M.M., Zhu, N. and Qureshi, S., 2021. ML-LGBM: A machine learning model based on light gradient boosting machine for the detection of version number attacks in RPL-based networks. IEEE Access, 9, pp.83654-83665.
[12] Okey, O.D., Maidin, S.S., Adasme, P., Lopes Rosa, R., Saadi, M., Carrillo Melgarejo, D. and Zegarra Rodríguez, D., 2022. BoostedEnML: Efficient technique for detecting cyberattacks in IoT systems using boosted ensemble machine learning. Sensors, 22(19), p.7409.
[13] Medjek, F., Tandjaoui, D., Djedjig, N. and Romdhani, I., 2021. Fault-tolerant AI-driven intrusion detection system for the internet of things. International Journal of Critical Infrastructure Protection, 34, p.100436.
[14] Otoum, S., Kantarci, B. and Mouftah, H., 2021. A comparative study of AI-based intrusion detection techniques in critical infrastructures. ACM Transactions on Internet Technology (TOIT), 21(4), pp.1-22.
[15] Schmitt, M., 2023. Securing the Digital World: Protecting smart infrastructures and digital industries with Artificial Intelligence (AI)-enabled malware and intrusion detection. Journal of Industrial Information Integration, 36, p.100520.
[16] Abed, A.K. and Anupam, A., 2023. Review of security issues in Internet of Things and artificial intelligence‐driven solutions. Security and Privacy, 6(3), p. e285.
[17] Alsarhan, A., Alauthman, M., Alshdaifat, E.A., Al-Ghuwairi, A.R. and Al-Dubai, A., 2023. Machine Learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks. Journal of Ambient Intelligence and Humanized Computing, 14(5), pp.6113-6122.
[18] Kornaros, G., 2022. Hardware-assisted machine learning in resource-constrained IoT environments for security: review and future prospective. IEEE Access, 10, pp.58603-58622.
[19] Sarker, I.H., Furhad, M.H. and Nowrozy, R., 2021. Ai-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Computer Science, 2(3), p.173.
[20] Thomas, L. and Bhat, S., 2021. Machine learning and deep learning techniques for IoT-based intrusion detection systems: A literature review. International Journal of Management, Technology and Social Sciences (IJMTS), 6(2), pp.296-314.
[21] Ge, M., Syed, N.F., Fu, X., Baig, Z. and Robles-Kelly, A., 2021. Towards a deep learning-driven intrusion detection approach for Internet of Things. Computer Networks, 186, p.107784.
[22] Thamilarasu, G. and Chawla, S., 2019. Towards deep-learning-driven intrusion detection for the internet of things. Sensors, 19(9), p.1977.
[23] Naithani, K., 2019. AI-based Intrusion Detection System for Internet of Things (IoT) Networks. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 10(2), pp.1095-1100.
[24] Banaamah, A.M. and Ahmad, I., 2022. Intrusion detection in IoT using deep learning. Sensors, 22(21), p.8417.
[25] Jayalaxmi, P.L.S., Saha, R., Kumar, G., Conti, M. and Kim, T.H., 2022. Machine and deep learning solutions for intrusion detection and prevention in IoTs: A survey. IEEE Access, 10, pp.121173-121192.
[26] Asharf, J., Moustafa, N., Khurshid, H., Debie, E., Haider, W. and Wahab, A., 2020. A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions. Electronics, 9(7), p.1177.
[27] Alsoufi, M.A., Razak, S., Siraj, M.M., Nafea, I., Ghaleb, F.A., Saeed, F. and Nasser, M., 2021. Anomaly-based intrusion detection systems in IoT using deep learning: A systematic literature review. Applied Sciences, 11(18), p.8383.
[28] (2018). DS2OS Traffic Traces, IoT Traffic Traces Gathered in the DS2OS IoT Environment. Accessed: Jul. 28, 2022. [Online]. Available: https://www.kaggle.com/francoisxa/ds2ostraffictraces
[29] Y. K. Anupama, S. Amutha, and D. R. R. Babu, ‘‘Exploring efficient preprocessing techniques for breast cancer diagnosis,’’ in Futuristic Communication and Network Technologies (Lecture Notes in Electrical Engineering), vol. 792. Singapore: Springer, 2021, pp. 855–864.
[30] S. B. Kotsiantis, D. Kanellopoulos, and P. E. Pintelas, ‘‘Data preprocessing for supervised learning,’’ Int. J. Comput. Sci., vol. 1, no. 2, pp. 111–117, Jan. 2006.
[31] T. Rawat and V. Khemchandani, ‘‘Feature engineering (FE) tools and techniques for better classification performance,’’ Int. J. Innov. Eng. Technol., vol. 8, no. 2, pp. 169–179, 2017.
[32] S. Ullah, J. Ahmad, M. A. Khan, E. H. Alkhammash, M. Hadjouni, Y. Y. Ghadi, F. Saeed, and N. Pitropakis, ‘‘A new intrusion detection system for the Internet of Things via deep convolutional neural network and feature engineering,’’ Sensors, vol. 22, no. 10, p. 3607, May 2022.
[33] S. Seth, G. Singh, and K. K. Chahal, ‘‘A novel time efficient learning-based approach for smart intrusion detection system,’’ J. Big Data, vol. 8, no. 1, pp. 1–28, Dec. 2021.
[34] D. Jin, Y. Lu, J. Qin, Z. Cheng, and Z. Mao, ‘‘SwiftIDS: Real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism,’’ Comput. Secur. vol. 97, pp. 1–17, Oct. 2020.
[35] Md. K. Islam, P. Hridi, Md. S. Hossain, and H. S. Narman, ‘‘Network anomaly detection using LightGBM: A gradient boosting classifier,’’ in Proc. 30th Int. Telecommun. Netw. Appl. Conf. (ITNAC), Melbourne, VIC, Australia, Nov. 2020, pp. 1–7.
[36] D. Rani, N. S. Gill, P. Gulia, and J. M. Chatterjee, ‘‘an ensemble-based multiclass classifier for intrusion detection using Internet of Things,’’ Comput. Intell. Neurosis. vol. 2022, pp. 1–16, May 2022.
[37] De Almeida, B.S.G. and Leite, V.C., 2019. Particle swarm optimization: A powerful technique for solving engineering problems. Swarm intelligence-recent advances, new perspectives and applications, pp.31-51.