FOREX Press I. J. of Electrical & Electronics Research
Support Open Access

Research Article |

Empowering Smart City IoT Network Intrusion Detection with Advanced Ensemble Learning-based Feature Selection

Author(s): R. Tino Merlin* and R. Ravi

Publisher : FOREX Publication

Published : 30 April 2024

e-ISSN : 2347-470X

Page(s) : 367-374




R. Tino Merlin*, Research Scholar, Research and Development Centre, Bharathiar University, Coimbatore 641046, Tamil Nadu, India; Email: tinophd@gmail.com

R. Ravi, Anna University Recognized Research Centre, Department of Computer Science and Engineering, Francis Xavier Engineering College, Tirunelveli, India; Email: fxcsehod@gmail.com

    [1] M. M. Rathore, A. Ahmad, A. Paul, and S. Rho, “Urban planning and building smart cities based on the Internet of Things using Big Data analytics,” Computer Networks, vol. 101, pp. 63–80, Jun. 2016, doi: 10.1016/j.comnet.2015.12.023. [CrossRef]
    [2] A. L. Duguma and X. Bai, “Contribution of Internet of Things (IoT) in improving agricultural systems,” Int. J. Environ. Sci. Technol., vol. 21, no. 2, pp. 2195–2208, Jan. 2024, doi: 10.1007/s13762-023-05162-7. [CrossRef]
    [3] V. Hnamte and J. Hussain, “Dependable intrusion detection system using deep convolutional neural network: A Novel framework and performance evaluation approach,” Telematics and Informatics Reports, vol. 11, p. 100077, Sep. 2023, doi: 10.1016/j.teler.2023.100077. [CrossRef]
    [4] A.-D. Schmidt, F. Peters, F. Lamour, C. Scheel, S. A. Çamtepe, and Ş. Albayrak, “Monitoring Smartphones for Anomaly Detection,” Mobile Netw Appl, vol. 14, no. 1, pp. 92–106, Feb. 2009, doi: 10.1007/s11036-008-0113-x. [CrossRef]
    [5] M. W. Ahmad, M. Mourshed, and Y. Rezgui, “Tree-based ensemble methods for predicting PV power generation and their comparison with support vector regression,” Energy, vol. 164, pp. 465–474, Dec. 2018, doi: 10.1016/j.energy.2018.08.207. [CrossRef]
    [6] M. Asha Paul, K., Kavitha, J., & Jansi Rani, P. A. (2018). Keyframe extraction techniques: A review. Recent Patents on Computer Science, 11(1), 3–16. [CrossRef]
    [7] N. Moustafa, B. Turnbull, and K.-K. R. Choo, “An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4815–4830, Jun. 2019, doi: 10.1109/JIOT.2018.2871719. [CrossRef]
    [8] N. Moustafa and J. Slay, “The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems,” in 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), Nov. 2015, pp. 25–31. doi: 10.1109/BADGERS.2015.014. [CrossRef]
    [9] N. Moustafa, J. Hu, and J. Slay, “A holistic review of Network Anomaly Detection Systems: A comprehensive survey,” Journal of Network and Computer Applications, vol. 128, pp. 33–55, Feb. 2019, doi: 10.1016/j.jnca.2018.12.006. [CrossRef]
    [10] I. Zakariyya, M. O. Al-Kadri, and H. Kalutarage, “Resource Efficient Boosting Method for IoT Security Monitoring,” in 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), Jan. 2021, pp. 1–6. doi: 10.1109/CCNC49032.2021.9369620. [CrossRef]
    [11] M. Asha Paul, Jansi Rani, P. A. Statistical Modeling based Directional Pattern Design (SMDPD) feature extraction for coral reef classification. Environmental Monitoring and Assessment, 193, 583 (2021). [CrossRef]
    [12] Q. Wu, Z. Ma, J. Fan, G. Xu, and Y. Shen, “A Feature Selection Method Based on Hybrid Improved Binary Quantum Particle Swarm Optimization,” IEEE Access, vol. 7, pp. 80588–80601, 2019, doi: 10.1109/ACCESS.2019.2919956. [CrossRef]
    [13] Y. Wan, M. Wang, Z. Ye, and X. Lai, “A feature selection method based on modified binary coded ant colony optimization algorithm,” Applied Soft Computing, vol. 49, pp. 248–258, Dec. 2016, doi: 10.1016/j.asoc.2016.08.011. [CrossRef]
    [14] M. Alzaqebah et al., “Hybrid Feature Selection Method based on Particle Swarm Optimization and Adaptive local Search Method,” International Journal of Electrical and Computer Engineering, vol. 11, Dec. 2020, doi: 10.11591/ijece.v11i3.pp2414-2422. [CrossRef]
    [15] J. Feng and Z. Gong, “A Novel Feature Selection Method With Neighborhood Rough Set and Improved Particle Swarm Optimization,” IEEE Access, vol. 10, pp. 33301–33312, 2022, doi: 10.1109/ACCESS.2022.3162074. [CrossRef]
    [16] K. Bouzoubaa, Y. Taher, and B. Nsiri, “Predicting DOS-DDOS Attacks: Review and Evaluation Study of Feature Selection Methods based on Wrapper Process,” IJACSA, vol. 12, no. 5, 2021, doi: 10.14569/IJACSA.2021.0120517. [CrossRef]
    [17] R. P. Lippmann et al., “Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation,” in Proceedings DARPA Information Survivability Conference and Exposition. DISCEX’00, Hilton Head, SC, USA: IEEE Comput. Soc, 1999, pp. 12–26. doi: 10.1109/DISCEX.2000.821506. [CrossRef]
    [18] S. Revathi and D. A. Malathi, “A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection,” International Journal of Engineering Research, vol. 2, no. 12, 2013.
    [19] A. Husain, A. Salem, C. Jim, and G. Dimitoglou, “Development of an Efficient Network Intrusion Detection Model Using Extreme Gradient Boosting (XGBoost) on the UNSW-NB15 Dataset,” in 2019 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Dec. 2019, pp. 1–7. [CrossRef]
    [20] H. M. Gomes, J. P. Barddal, F. Enembreck, and A. Bifet, “A Survey on Ensemble Learning for Data Stream Classification,” ACM Comput. Surv., vol. 50, no. 2, p. 23:1-23:36, Mar. 2017, doi: 10.1145/3054925. [CrossRef]
    [21] P. Singh and V. Ranga, “Attack and intrusion detection in cloud computing using an ensemble learning approach,” Int. j. inf. tecnol., vol. 13, no. 2, pp. 565–571, Apr. 2021, doi: 10.1007/s41870-020-00583-w. [CrossRef]
    [22] Md. K. Islam, P. Hridi, Md. S. Hossain, and H. S. Narman, “Network Anomaly Detection Using LightGBM: A Gradient Boosting Classifier,” in 2020 30th International Telecommunication Networks and Applications Conference (ITNAC), Nov. 2020, pp. 1–7. doi: 10.1109/ITNAC50341.2020.9315049. [CrossRef]
    [23] A. Singh, K. Chatterjee, and S. C. Satapathy, “An edge based hybrid intrusion detection framework for mobile edge computing,” Complex Intell. Syst., vol. 8, no. 5, pp. 3719–3746, Oct. 2022, doi: 10.1007/s40747-021-00498-4. [CrossRef]
    [24] N. G. Bhuvaneswari Amma and P. Valarmathi, “ORaBaN: an optimized radial basis neuro framework for anomaly detection in large networks,” Int. j. inf. tecnol., vol. 14, no. 5, pp. 2497–2503, Aug. 2022, doi: 10.1007/s41870-022-00991-0. [CrossRef]
    [25] M. A. Ferrag, L. Shu, H. Djallel, and K.-K. R. Choo, “Deep Learning-Based Intrusion Detection for Distributed Denial of Service Attack in Agriculture 4.0,” Electronics, vol. 10, no. 11, Art. no. 11, Jan. 2021, doi: 10.3390/electronics10111257. [CrossRef]
    [26] S. Mahadik, P. M. Pawar, and R. Muthalagu, “Efficient Intelligent Intrusion Detection System for Heterogeneous Internet of Things (HetIoT),” J Netw Syst Manage, vol. 31, no. 1, p. 2, Oct. 2022, doi: 10.1007/s10922-022-09697-x. [CrossRef]

R. Tino Merlin and R. Ravi (2024), Empowering Smart City IoT Network Intrusion Detection with Advanced Ensemble Learning-based Feature Selection. IJEER 12(2), 367-374. DOI: 10.37391/IJEER.120206.