Skip to main content
Log in

An Ensemble Intrusion Detection System based on Acute Feature Selection

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

As the Internet of Things (IoT), 5G, and Artificial intelligence (AI) continue to converge, the number of security incidents and occurrences on the networks has recently increased. Since more devices are connected to IoT networks, security is becoming a major concern. Conventional intrusion detection systems (IDS) are not well suited for use in the complex lightweight IoT environment. This research paper presented an IDS for the smart city environment based on IoT- Message queuing telemetry transport (MQTT) networks that could detect attacks using shallow learning algorithms. The proposed framework has four parts (i) a smart city network model with multiple MQTT clients (sensors and IoT devices) is created with the help of hardware. (ii) Injected a flooding attack on the MQTT broker to create the IDS dataset with normal and attack features, (iii) Based on the acute feature selection algorithm to select the optmized features from the raw dataset and validated with the Jaccard coefficient. (iv) The dataset is further trained and validated using shallow learning algorithms such as extreme gradient boosting (XGB), K-nearest Neighbors (KNN) and Random forest (RF). Experimental results outperform with better attack detection rate, attack prediction rate and improved accuracy over 97% with lower redundancy using selected features. Experimental results show that the proposed approach is more vulnerable to attacks in the IoT network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data Availability

Data available on request from the authors

Code Availability

Not Applicable

References

  1. Akhtar S, Zahoor E (2021) “Formal specification and verification of mqtt protocol in pluscal-2,” Wireless Personal Communications, pp. 1–18

  2. Al-Hawawreh M, Sitnikova E, Aboutorab N (2021) X-iiotid: A connectivity-agnostic and device-agnostic intrusion data set for industrial internet of things. IEEE Internet Things J 9(5):3962–3977

    Article  Google Scholar 

  3. Conti M, Dehghantanha A, Franke K, Watson S (2018) “Internet of things security and forensics: Challenges and opportunities,” pp. 544–546

  4. Dinculeană D, Cheng X (2019) Vulnerabilities and limitations of mqtt protocol used between iot devices. Appl Sci 9(5):848

    Article  Google Scholar 

  5. Du P, Abe S (2007) “Detecting dos attacks using packet size distribution,” in 2007 2nd Bio-Inspired Models of Network, Information and Computing Systems. IEEE, pp. 93–96

  6. Gupta V, Khera S, Turk N (2021) Mqtt protocol employing iot based home safety system with abe encryption. Multimed Tools Appl 80(2):2931–2949

    Article  Google Scholar 

  7. Haripriya A (2019) Kulothungan K (2019) “Secure-mqtt: an efficient fuzzy logic-based approach to detect dos attack in mqtt protocol for internet of things,’’. EURASIP J Wirel Commun Netw 1:1–15

    Google Scholar 

  8. Herrero R (2020) Mqtt-sn, coap, and rtp in wireless iot real-time communications. Multimedia Systems 26(6):643–654

    Article  Google Scholar 

  9. Hintaw AJ, Manickam S, Aboalmaaly MF, Karuppayah S (2021) Mqtt vulnerabilities, attack vectors and solutions in the internet of things (iot). IETE J Res 0(0):1–30. https://doi.org/10.1080/03772063.2021.1912651

    Article  Google Scholar 

  10. Hwang HC, Park J, Shon JG (2016) Design and implementation of a reliable message transmission system based on mqtt protocol in iot. Wirel Pers Commun 91(4):1765–1777

    Article  Google Scholar 

  11. Jin J, Gubbi J, Marusic S, Palaniswami M (2014) An information framework for creating a smart city through internet of things. IEEE Internet Things J 1(2):112–121

    Article  Google Scholar 

  12. Kawaguchi R, Bandai M (2020) “Edge based mqtt broker architecture for geographical iot applications,” In: 2020 International Conference on Information Networking (ICOIN). IEEE, pp. 232–235

  13. Khan R, Khan SU, Zaheer R, Khan S (2012) “Future internet: The internet of things architecture, possible applications and key challenges,” In: 2012 10th International Conference on Frontiers of Information Technology, pp. 257–260

  14. Kim G, Kang S, Park J, Chung K (2019) An mqtt-based context-aware autonomous system in onem2m architecture. IEEE Internet Things J 6(5):8519–8528

    Article  Google Scholar 

  15. Kondoro A, Dhaou IB, Tenhunen H, Mvungi N (2021) Real time performance analysis of secure iot protocols for microgrid communication. Futur Gener Comput Syst 116:1–12

    Article  Google Scholar 

  16. Kotak J, Shah A, Rajdev P (2019) “A comparative analysis on security of mqtt brokers”

  17. Larriva-Novo X, Vega-Barbas M, Villagra VA, Rivera D, Alvarez-Campana M, Berrocal J (2020) Efficient distributed preprocessing model for machine learning-based anomaly detection over large-scale cybersecurity datasets. Appl Sci 10(10):3430

    Article  Google Scholar 

  18. Layeghy S, Portmann M (2022) “On generalisability of machine learning-based network intrusion detection systems,” arXiv:2205.04112

  19. Mishra B, Kertesz A (2020) “The use of mqtt in m2m and iot systems: A survey,” IEEE Access, vol. 8, pp. 201 071–201 086

  20. MQTT, “MQTT: The Standard for IoT Messaging,” 2021. [Online]. Available: https://mqtt.org/

  21. Muthukrishnan R, Rohini R (2016) “Lasso: A feature selection technique in predictive modeling for machine learning,” In: 2016 IEEE international conference on advances in computer applications (ICACA). IEEE, spp. 18–20s

  22. Narote A, Zutshi V, Potdar A, Vichare R (2022) “D-dos attack prediction using machine learning algorithms.”

  23. Nawandar NK, Satpute VR (2019) Iot based low cost and intelligent module for smart irrigation system. Comput Electron Agric 162:979–990

    Article  Google Scholar 

  24. Park CS, Nam HM (2020) “Security architecture and protocols for secure mqtt-sn,” IEEE Access, vol. 8, pp. 226 422–226 436

  25. Rathore MM, Ahmad A, Paul A, Rho S (2016) Urban planning and building smart cities based on the internet of things using big data analytics. Comput Netw 101:63–80

    Article  Google Scholar 

  26. Sarker IH (2021) Cyberlearning: Effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks. Internet of Things 14:100393

    Article  Google Scholar 

  27. Seoane V, Garcia-Rubio C, Almenares F, Campo C (2021) Performance evaluation of coap and mqtt with security support for iot environments. Comput Netw vol 197:18–27

    Article  Google Scholar 

  28. Syed NF, Baig Z, Ibrahim A, Valli C (2020) Denial of service attack detection through machine learning for the iot. J Inf Telecommun 4(4):482–503

    Google Scholar 

  29. Vaccari I, Aiello M, Cambiaso E (2020) Slowite, a novel denial of service attack affecting mqtt. Sensors 20(10):2932

    Article  Google Scholar 

  30. Vaccari I, Chiola G, Aiello M, Mongelli M, Cambiaso E (2020) Mqttset, a new dataset for machine learning techniques on mqtt. Sensors 20(22):6578

    Article  Google Scholar 

  31. Veeramanikandan M, Sankaranarayanan S (2019) Publish/subscribe based multi-tier edge computational model in internet of things for latency reduction. J Parallel Distrib Comput 127:18–27

    Article  Google Scholar 

  32. Wang Z, Wu C, Zheng K, Niu X, Wang X (2019) “Smotetomek-based resampling for personality recognition,” IEEE Access, vol. 7, pp. 129 678–129 689

  33. Whitmore A, Agarwal A, Da Xu L (2015) The internet of things-a survey of topics and trends. Inf Syst Front 17(2):261–274

    Article  Google Scholar 

  34. Xin Y, Kong L, Liu Z, Chen Y, Li Y, Zhu H, Gao M, Hou H, Wang C (2018) “Machine learning and deep learning methods for cybersecurity,” Ieee access, vol. 6, pp. 35 365–35 381

  35. Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M (2014) Internet of things for smart cities. IEEE Internet Things J 1(1):22–32

    Article  Google Scholar 

Download references

Funding

This research received no external funding

Author information

Authors and Affiliations

Authors

Contributions

SH; Designed the study and implementation, draft and DT; Conceptualization, Investigation, Validation and Review.

Corresponding author

Correspondence to Deepa T.

Ethics declarations

Conflicts of interest

The authors declare no conflict of interest

Ethical Approval

Not Applicable

Informed consent

Not Applicable

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

S, H., T, D. An Ensemble Intrusion Detection System based on Acute Feature Selection. Multimed Tools Appl 83, 8267–8280 (2024). https://doi.org/10.1007/s11042-023-15788-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15788-x

Keywords

Navigation