Skip to main content
Log in

Towards optimized machine-learning-driven intrusion detection for Internet of Things applications

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

As the utilization of Internet of Things devices becomes increasingly important in real-life applications, the need to address potential threats to the infrastructure of these networks, such as security breaches and intrusions, has also grown. While intelligent systems for detecting attacks are often considered solutions to combat these threats, many of these systems lack the accuracy to effectively respond to evolving versions of these attacks and lack flexibility. In addition, constructing reliable intelligent systems for detecting intrusions relies heavily on the availability of valid datasets. In this study, an optimized machine learning-based model for intrusion detection in the IoT field is proposed. The model utilizes a collection of high-quality real-time data to train and test the performance of the proposed machine learning. based model, and the results are compared among a selection of ML algorithms. The algorithms used in the study include Fine and Optimizable Tree, Optimizable Discriminant, Optimizable KNN, Logistic Regression Kernel, and Optimizable Ensemble. The experiments were conducted on the NLS-KDD dataset using the MATLAB platform to evaluate the effectiveness of the proposed model, focusing on performance metrics, including accuracy, F1-score, precision, recall, and confusion matrix. A comparative analysis is performed by comparing the results with existing research findings. The findings highlight that the proposed model using the Optimizable Ensemble algorithm achieves best performance in terms of accuracy (99.9%).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig.1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data availability

The data that support the findings of this study are openly available in NSL at http://nsl.cs.unb.ca/NSL-KDD/, reference number [42].

References

  1. Kabiri Zamani A, Chapnevis A (2022) BotNet intrusion detection system in Internet of Things with developed deep learning. arXiv e-prints, arXiv-2207

  2. Arisdakessian S, Wahab OA, Mourad A, Otrok H, Guizani M (2022) A survey on IoT intrusion detection: federated learning, game theory, social psychology, and explainable AI as future directions. IEEE Internet Things J 10:4059–4092

    Article  Google Scholar 

  3. Ahsan M, Rifat N, Chowdhury M, Gomes R (2022) Intrusion detection for IoT network security with deep neural network. In: 2022 IEEE international conference on electro information technology (eIT), pp 467–472. IEEE

  4. Djenna A, Harous S, Saidouni DE (2021) Internet of things meet internet of threats: new concern cyber security issues of critical cyber infrastructure. Appl Sci 11(10):4580

    Article  Google Scholar 

  5. Aldweesh A, Derhab A, Emam AZ (2020) Deep learning approaches for anomaly-based intrusion detection systems: a survey, taxonomy, and open issues. Knowl-Based Syst 189:105124

    Article  Google Scholar 

  6. Anthi E, Williams L, Słowińska M, Theodorakopoulos G, Burnap P (2019) A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J 6(5):9042–9053

    Article  Google Scholar 

  7. Fischer EA (2014) Cybersecurity issues and challenges: In brief

  8. Rani S, Kataria A, Chauhan M (2022) Cyber security techniques, architectures, and design. In: Holistic approach to quantum cryptography in cyber security, pp 41–66, CRC Press

  9. Craigen D, Diakun-Thibault N, Purse R (2014) Defining cybersecurity. Technol Innov Manag Rev 4(10)‏

  10. Aftergood S (2017) Cybersecurity: the cold war online. 30–31

  11. Shandilya SK, Upadhyay S, Kumar A, Nagar AK (2022) AI-assisted computer network operations testbed for nature-inspired cyber security based adaptive defense simulation and analysis. Future Gener Comput Syst 127:297–308

    Article  Google Scholar 

  12. Djuitcheu H, Debes M, Aumüller M, Seitz J (2022). Recent review of distributed denial of service attacks in the internet of things. In: 2022 5th conference on cloud and internet of things (CIoT), pp 32–39. IEEE

  13. Singh J, Behal S (2020) Detection and mitigation of DDoS attacks in SDN: a comprehensive review, research challenges and future directions. Comput Sci Rev 37:100279

    Article  Google Scholar 

  14. Nguyen GL, Dumba B, Ngo QD, Le HV, Nguyen TN (2022) A collaborative approach to early detection of IoT Botnet. Comput Electr Eng 97:107525

    Article  Google Scholar 

  15. Liu H, Lang B (2019) Machine learning and deep learning methods for intrusion detection systems: a survey. Appl Sci 9(20):4396

    Article  Google Scholar 

  16. Smys S, Basar A, Wang H (2020) Hybrid intrusion detection system for internet of things (IoT). J ISMAC 2(04):190–199

    Article  Google Scholar 

  17. Khan AR, Kashif M, Jhaveri RH, Raut R, Saba T, Bahaj SA (2022) Deep learning for intrusion detection and security of Internet of things (IoT): current analysis, challenges, and possible solutions. Security Commun Netw 2022

  18. Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Futur Gener Comput Syst 82:761–768

    Article  Google Scholar 

  19. Attou H, Guezzaz A, Benkirane S, Azrour M, Farhaoui Y (2023) Cloud-based intrusion detection approach using machine learning techniques. Big Data Min Anal 6(3):311–320

    Article  Google Scholar 

  20. Carneiro J, Oliveira N, Sousa N, Maia E, Praça I (2021) Machine learning for network-based intrusion detection systems: an analysis of the CIDDS-001 dataset. In: International symposium on distributed computing and artificial intelligence, pp 148–158. Springer, Cham

  21. Panigrahi R, Borah S, Bhoi AK, Ijaz MF, Pramanik M, Kumar Y, Jhaveri RH (2021) A consolidated decision tree-based intrusion detection system for binary and multiclass imbalanced datasets. Mathematics 9(7):751

    Article  Google Scholar 

  22. Dhanabal L, Shantharajah SP (2015) A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int J Adv Res Comput Commun Eng 4(6):446–452

    Google Scholar 

  23. Masoodi F (2021) Machine learning for classification analysis of intrusion detection on NSL-KDD dataset. Turkish J Comput Math Educ (TURCOMAT) 12(10):2286–2293

    Google Scholar 

  24. Abrar I, Ayub Z, Masoodi F, Bamhdi AM (2020) A machine learning approach for intrusion detection system on NSL-KDD dataset. In: 2020 international conference on smart electronics and communication (ICOSEC) (pp 919–924). IEEE

  25. Ahmad U, Asim H, Hassan MT, Naseer S (2019) Analysis of classification techniques for intrusion detection. In: 2019 International conference on innovative computing (ICIC) (pp 1–6). IEEE

  26. Ravipati RD, Abualkibash M (2019) Intrusion detection system classification using different machine learning algorithms on KDD-99 and NSL-KDD datasets-a review paper. Int J Comput Sci Inf Technol (IJCSIT) 11

  27. Thomas R, Pavithran D (2018) A survey of intrusion detection models based on NSL-KDD data set. Fifth HCT Inf Technol Trends (ITT) 2018:286–291

    Article  Google Scholar 

  28. Revathi S, Malathi A (2013) A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int J Eng Res Technol (IJERT) 2(12):1848–1853

    Google Scholar 

  29. Mallissery S, Kolekar S, Ganiga R (2013) Accuracy analysis of machine learning algorithms for intrusion detection system using nsl-kdd dataset. In: Proceeding of international conference on future trends in computing and communication--FTCC 2013

  30. Bhati BS, Rai CS, Balamurugan B, Al-Turjman F (2020) An intrusion detection scheme based on the ensemble of discriminant classifiers. Comput Electr Eng 86:106742

    Article  Google Scholar 

  31. Ahmetoglu H, Das R (2022) A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions. Internet Things 20:100615

    Article  Google Scholar 

  32. Ghurab M, Gaphari G, Alshami F, Alchemy R, Othman S (2021) A detailed analysis of benchmark datasets for network intrusion detection system. Asian J Res Comput Sci 7(4):14–33

    Article  Google Scholar 

  33. Ferrag MA, Maglaras L, Moschoyiannis S, Janicke H (2020) Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J Inf Secur Appl 50:102419

    Google Scholar 

  34. Asif M, Abbas S, Khan MA, Fatima A, Khan MA, Lee SW (2021) MapReduce based intelligent model for intrusion detection using machine learning technique. J King Saud Univ-Comput Inf Sci 34(2022):9723–9731

    Google Scholar 

  35. Karthikeyan M, Manimegalai D, RajaGopal K (2024) Firefly algorithm based WSN-IoT security enhancement with machine learning for intrusion detection. Sci Rep 14(1):231

    Article  Google Scholar 

  36. Zakariah M, AlQahtani SA, Alawwad AM, Alotaibi AA (2023) Intrusion detection system with customized machine learning techniques for NSL-KDD dataset. Comput, Mater Continua 77(3)

  37. Alqahtani H, Sarker IH, Kalim A, Minhaz Hossain SM, Ikhlaq S, Hossain S (2020) Cyber intrusion detection using machine learning classification techniques. In: Computing science, communication and security: first international conference, COMS2 2020, Gujarat, India, March 26–27, 2020, Revised Selected Papers 1 (pp. 121–131). Springer Singapore.

  38. Biswas SK (2018) Intrusion detection using machine learning: a comparison study. Int J Pure Appl Math 118(19):101–114

    Google Scholar 

  39. Kaushik B, Sharma R, Dhama K, Chadha A, Sharma S (2023) Performance evaluation of learning models for intrusion detection system using feature selection. J Comput Virol Hack Tech 19:1–20

    Article  Google Scholar 

  40. Abdelmoumin G, Rawat DB, Rahman A (2021) On the performance of machine learning models for anomaly-based intelligent intrusion detection systems for the internet of things. IEEE Internet Things J 9(6):4280–4290

    Article  Google Scholar 

  41. Mendonca RV, Silva JC, Rosa RL, Saadi M, Rodriguez DZ, Farouk A (2022) A lightweight intelligent intrusion detection system for industrial internet of things using deep learning algorithms. Expert Syst 39(5):e12917

    Article  Google Scholar 

  42. NSL-KDD dataset (2023). http://nsl.cs.unb.ca/NSL- KDD/ last accessed in December, 14, 2023.

  43. Shokoohsaljooghi A, Mirvaziri H (2020) Performance improvement of intrusion detection system using neural networks and particle swarm optimization algorithms. Int J Inf Technol 12:849–860

    Google Scholar 

  44. Sarkar A, Sharma HS, Singh MM (2023) A supervised machine learning-based solution for efficient network intrusion detection using ensemble learning based on hyperparameter optimization. Int J Inf Technol 15(1):423–434

    Google Scholar 

  45. Srinivas K, Prasanth N, Trivedi R, Bindra N, Raja SP (2022) A novel machine learning inspired algorithm to predict real-time network intrusions. Int J Inf Technol 14(7):3471–3480

    Google Scholar 

  46. Singh P, Ranga V (2021) Attack and intrusion detection in cloud computing using an ensemble learning approach. Int J Inf Technol 13:565–571

    Google Scholar 

  47. Bhuvaneswari Amma NG, Valarmathi P (2022) ORaBaN: an optimized radial basis neuro framework for anomaly detection in large networks. Int J Inf Technol 14(5):2497–2503

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khalid Alemerien.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alemerien, K., Al-suhemat, S. & Almahadin, M. Towards optimized machine-learning-driven intrusion detection for Internet of Things applications. Int. j. inf. tecnol. (2024). https://doi.org/10.1007/s41870-024-01852-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s41870-024-01852-8

Keywords

Navigation