Research Article |
A Hybrid Feature Selection Approach based on Random Forest and Particle Swarm Optimization for IoT Network Traffic Analysis
Author(s): Santosh H Lavate1* and P. K. Srivastava2
Published In : International Journal of Electrical and Electronics Research (IJEER) Volume 11, Issue 2 , Special Issue on Mobile Computing assisted by Artificial Intelligent for 5G/ 6G/ Radio Communication
Publisher : FOREX Publication
Published : 30 June 2023
e-ISSN : 2347-470X
Page(s) : 568-574
Abstract
The complexity and volume of network traffic has increased significantly due to the emergence of the “Internet of Things” (IoT). The classification accuracy of the network traffic is dependent on the most pertinent features. In this paper, we present a hybrid feature selection method that takes into account the optimization of Particle Swarms (PSO) and Random Forests. The data collected by the security firm, CIC-IDS2017, contains a large number of attacks and traffic instances. To improve the classification accuracy, we use the framework's RF algorithm to identify the most important features. Then, the PSO algorithm is used to refine the selection process. According to our experiments, the proposed method performed better than the other methods when it comes to the classification accuracy. It achieves a ~99.9% accuracy when using a hybrid of Random Forest and PSO. The hybrid approach also helps improve the model's performance. The suggested method can be utilized by security analysts and network administrators to identify and prevent attacks on the IoT
Keywords: IoT
, Network traffic
, Hybrid ensemble
, Particle Swarm Optimization
.
Santosh H Lavate*, Research Scholar, Department of Electronics and Telecommunication Engineering, AISSMS Institute of Information Technology, Maharashtra, India; Email: lavate.santosh@gmail.com
P. K. Srivastava, Department of Electronics and Telecommunication Engineering, ISBM College of Engineering Pune, Maharashtra,India; Email: pankoo74@gmail.com
-
[1] S. Li, L. Da Xu, and S. Zhao, “The internet of things: a survey,” Inf. Syst. Front., vol. 17, no. 2, pp. 243–259, 2015, doi: 10.1007/s10796-014-9492-7. [Cross Ref]
-
[2] Y. Luo, X. Chen, N. Ge, W. Feng, and J. Lu, “Transformer-Based Device Type Identification in Heterogeneous IoT Traffic,” IEEE Internet Things J., vol. 10, no. 6, pp. 5050–5062, 2022, doi: 10.1109/JIOT.2022.3221967. [Cross Ref]
-
[3] C. V. Oha et al., Machine Learning Models for Malicious Traffic Detection in IoT Networks /IoT-23 Dataset/, vol. 13175 LNCS. Springer International Publishing, 2022.
-
[4] M. Shafiq, S. Nazir, and X. Yu, “Identification of Attack Traffic Using Machine Learning in Smart IoT Networks,” Secur. Commun. Networks, vol. 2022, pp. 4–7, 2022, doi: 10.1155/2022/9804596. [Cross Ref]
-
[5] E. Oram, B. Naik, M. R. Senapati, and G. Bhoi, Identification of Malicious Access in IoT Network by Using Artificial Physics Optimized Light Gradient Boosting Machine, vol. 480 LNNS. Springer Nature Singapore, 2022. [Cross Ref]
-
[6] A. Sivanathan et al., “Classifying IoT Devices in Smart Environments Using Network Traffic Characteristics,” IEEE Trans. Mob. Comput., vol. 18, no. 8, pp. 1745–1759, 2019, doi: 10.1109/TMC.2018.2866249. [Cross Ref]
-
[7] H. Tahaei, F. Afifi, A. Asemi, F. Zaki, and N. B. Anuar, “The rise of traffic classification in IoT networks: A survey,” J. Netw. Comput. Appl., vol. 154, no. December 2019, 2020, doi: 10.1016/j.jnca.2020.102538. [Cross Ref]
-
[8] H. Yao, P. Gao, J. Wang, P. Zhang, C. Jiang, and Z. Han, “Capsule Network Assisted IoT Traffic Classification Mechanism for Smart Cities,” IEEE Internet Things J., vol. 6, no. 5, pp. 7515–7525, 2019, doi: 10.1109/JIOT.2019.2901348. [Cross Ref]
-
[9] H. Yao, P. Gao, J. Wang, P. Zhang, C. Jiang, and Z. Han, “Capsule Network Assisted IoT Traffic Classification Mechanism for Smart Cities,” IEEE Internet Things J., vol. 6, no. 5, pp. 7515–7525, 2019, doi: 10.1109/JIOT.2019.2901348. [Cross Ref]
-
[10] S. Neelakandan, M. A. Berlin, S. Tripathi, V. B. Devi, I. Bhardwaj, and N. Arulkumar, “IoT-based traffic prediction and traffic signal control system for smart city,” Soft Comput., vol. 25, no. 18, pp. 12241–12248, 2021, doi: 10.1007/s00500-021-05896-x. [Cross Ref]
-
[11] J. Mocnej, A. Pekar, W. K. G. Seah, and I. Zolotova, “Network Traffic Characteristics of the IoT Application Use Cases,” p. 20, 2017, [Online]. Available: https://ecs.victoria.ac.nz/foswiki/pub/Main/TechnicalReportSeries/IoT_network_technologies_embfonts.pdf.
-
[12] D. H. Hoang and H. D. Nguyen, “A PCA-based method for IoT network traffic anomaly detection,” Int. Conf. Adv. Commun. Technol. ICACT, vol. 2018-Febru, pp. 381–386, 2018, doi: 10.23919/ICACT.2018.8323766. [Cross Ref]
-
[13] Y. Amar, H. Haddadi, R. Mortier, A. Brown, J. Colley, and A. Crabtree, “An Analysis of Home IoT Network Traffic and Behaviour,” 2018, [Online]. Available: http://arxiv.org/abs/1803.05368.
-
[14] F. C. Kuo, “Assessment of LTE Wireless Accessing for Managing Traffic Flow of IoT Services,” Mob. Networks Appl., vol. 24, no. 3, pp. 853–863, 2019, doi: 10.1007/s11036-018-1092-1. [Cross Ref]
-
[15] P. Kuppusamy, R. Kalpana, and P. V. Venkateswara Rao, “Optimized traffic control and data processing using IoT,” Cluster Comput., vol. 22, no. s1, pp. 2169–2178, 2019, doi: 10.1007/s10586-018-2172-5. [Cross Ref]
-
[16] M. R. Shahid, G. Blanc, Z. Zhang, and H. Debar, “IoT Devices Recognition Through Network Traffic Analysis,” Proc. - 2018 IEEE Int. Conf. Big Data, Big Data 2018, pp. 5187–5192, 2019, doi: 10.1109/BigData.2018.8622243. [Cross Ref]
-
[17] P. Gowtham, V. P. Arunachalam, V. A. Vijayakumar, and S. Karthik, “An Efficient Monitoring of Real Time Traffic Clearance for an Emergency Service Vehicle Using IOT,” Int. J. Parallel Program., vol. 48, no. 5, pp. 786–812, 2020, doi: 10.1007/s10766-018-0603-9. [Cross Ref]
-
[18] B. Charyyev and M. H. Gunes, “IoT event classification based on network traffic,” IEEE INFOCOM 2020 - IEEE Conf. Comput. Commun. Work. INFOCOM WKSHPS 2020, pp. 854–859, 2020, doi: 10.1109/INFOCOMWKSHPS50562.2020.9162885. [Cross Ref]
-
[19] B. Mohammed et al., “Edge Computing Intelligence Using Robust Feature Selection for Network Traffic Classification in Internet-of-Things,” IEEE Access, vol. 8, pp. 224059–224070, 2020, doi: 10.1109/ACCESS.2020.3037492. [Cross Ref]
-
[20] A. K. M. Al-Qurabat, Z. A. Mohammed, and Z. J. Hussein, Data Traffic Management Based on Compression and MDL Techniques for Smart Agriculture in IoT, vol. 120, no. 3. Springer US, 2021. [Cross Ref]
-
[21] Y. Ashibani and Q. H. Mahmoud, “Design and evaluation of a user authentication model for IoT networks based on app event patterns,” Cluster Comput., vol. 24, no. 2, pp. 837–850, 2021, doi: 10.1007/s10586-020-03156-5. [Cross Ref]
-
[22] H. Azath, M. Devi Mani, G. K. D. Prasanna Venkatesan, D. Sivakumar, J. P. Ananth, and S. Kamalraj, “Identification of IoT Device From Network Traffic Using Artificial Intelligence Based Capsule Networks,” Wirel. Pers. Commun., vol. 123, no. 3, pp. 2227–2243, 2022, doi: 10.1007/s11277-021-09236-y. [Cross Ref]
-
[23] H. Gebrye, Y. Wang, and F. Li, “Traffic data extraction and labeling for machine learning based attack detection in IoT networks,” Int. J. Mach. Learn. Cybern., no. 0123456789, 2023, doi: 10.1007/s13042-022-01765-7. [Cross Ref]
-
[24] R. R. Chowdhury, A. C. Idris, and P. E. Abas, “A Deep Learning Approach for Classifying Network Connected IoT Devices Using Communication Traffic Characteristics,” J. Netw. Syst. Manag., vol. 31, no. 1, pp. 1–21, 2023, doi: 10.1007/s10922-022-09716-x. [Cross Ref]
-
[25] P. Khandait, N. Hubballi, and B. Mazumdar, “IoTHunter: IoT network traffic classification using device specific keywords,” IET Networks, vol. 10, no. 2, pp. 59–75, 2021, doi: 10.1049/ntw2.12007. [Cross Ref]
-
[26] K. Lin, X. Xu, and F. Xiao, “MFFusion: A Multi-level Features Fusion Model for Malicious Traffic Detection based on Deep Learning,” Comput. Networks, vol. 202, no. February 2021, p. 108658, 2022, doi: 10.1016/j.comnet.2021.108658. [Cross Ref]
-
[27] T. D. Diwan et al., “Feature Entropy Estimation (FEE) for Malicious IoT Traffic and Detection Using Machine Learning,” Mob. Inf. Syst., vol. 2021, 2021, doi: 10.1155/2021/8091363. [Cross Ref]
-
[28] I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “Toward generating a new intrusion detection dataset and intrusion traffic characterization,” ICISSP 2018 - Proc. 4th Int. Conf. Inf. Syst. Secur. Priv., vol. 2018-January, no. Cic, pp. 108–116, 2018, doi: 10.5220/0006639801080116. [Cross Ref]