Skip to main content
Log in

A Hybrid Meta-heuristics Algorithm: XGBoost-Based Approach for IDS in IoT

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

In recent years, the importance of the Internet of Things (IoT) and its applications has increased. IoT networks are diverse, allowing for various real-time applications and making them indispensable to daily life. Even though these IoT gadgets make everyday tasks more straightforward, these networks are open to several security risks. IoT networks are currently vulnerable to security assaults due to inadequate security measures, making them attractive targets for different attackers. In this study, the Whale optimization method (WOM) is used to identify the ideal parameters for an intrusion detection model, and XGBoost (Extreme Gradient Boosting) is applied to those parameters that WOM selects. The principal component analysis (PCA) initially performs pre-processing on the gathered network data. To improve the overall model’s capacity for detecting intrusions after training, pre-processed data are first loaded into the WOM-Boost algorithm. The empirical results are applied to two datasets, IoTID20 and UNSW-NB15, and it is demonstrated that the IDS model using this method has greater accuracy, up to 99%, when compared to the results obtained by parameter adjustment in the conventional manner.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1:
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

Data Availability

The data set generated and/or analyzed during the current study is available upon reasonable request from the corresponding author. However, data sets are available as open source.

References

  1. Buczak AL, Guven E. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutor. 2016;18(2):1153–76. https://doi.org/10.1109/COMST.2015.2494502.

    Article  Google Scholar 

  2. Adhikari M, Hazra A, Menon VG, Chaurasia BK, Mumtaz S. A roadmap of next-generation wireless technology for 6G-enabled vehicular networks. IEEE Internet Things Mag. 2021;4(4):79–85. https://doi.org/10.1109/IOTM.001.2100075.

    Article  Google Scholar 

  3. Tripathi S, Chaurasia BK. Lightweight communication in IoT using MQTT. In: IEEE 6th international conference on information systems and computer networks (ISCON), pp. 1–6 (2023). https://doi.org/10.1109/ISCON57294.2023.10112105

  4. Kilincer IF, Ertam F, Sengur A. Machine learning methods for cyber security intrusion detection: datasets and comparative study. Comput Netw. 2021;188(107840):1–16. https://doi.org/10.1016/j.comnet.2021.107840.

    Article  Google Scholar 

  5. Tripathi G, Singh VK, Chaurasia BK. An energy-efficient heterogeneous data gathering for sensor-based internet of things. Multimedia Tools Appl. 2023;82:42593–42616. https://doi.org/10.1007/s11042-023-15161-y.

    Article  Google Scholar 

  6. Bacha S, Aljuhani A, Abdellafou KB, Taouali O, Liouane N, Alazab M. Anomaly-based intrusion detection system in IoT using kernel extreme learning machine. J Ambient Intell Human Comput. 2022. https://doi.org/10.1007/s12652-022-03887-w.

    Article  Google Scholar 

  7. Wang X, Lu X. A host-based anomaly detection framework using XGBoost and LSTM for IoT devices. Wirel Commun Mob Comput. 2020;8838571:1–13. https://doi.org/10.1155/2020/8838571.

    Article  Google Scholar 

  8. Wang J, Liu C, Li L, Li W, Yao L, Li H, Zhang H. A stacking-based model for non-invasive detection of coronary heart disease. IEEE Access. 2020;8:37124–33. https://doi.org/10.1109/ACCESS.2020.2975377.

    Article  Google Scholar 

  9. Jin Z, Li N. Diagnosis of each main coronary artery stenosis based on whale optimization method and stacking model. Math Biosci Eng. 2022;19(5):4568–91. https://doi.org/10.3934/mbe.2022211.

    Article  Google Scholar 

  10. Bajpai S, Sharma K, Chaurasia BK. Intrusion detection framework in IoT networks. Comput Sci J Spec Mach Learn Smart Syst. 2023;4(350):1–16. https://doi.org/10.1007/s42979-023-01770-9.

    Article  Google Scholar 

  11. Tripathi A, Misra A, Kumar K, Chaurasia BK. Optimized machine learning for classifying colorectal tissues. Comput Sci J Spec Mach Learn Smart Syst. 2023;4(461):1–14. https://doi.org/10.1007/s42979-023-01882-2.

    Article  Google Scholar 

  12. Ma L, Cheng S, Shi Y. Enhancing learning efficiency of brain storm optimization via orthogonal learning design. IEEE Trans Syst Man Cybern Syst. 2021;51(11):6723–42. https://doi.org/10.1109/TSMC.2020.2963943.

    Article  Google Scholar 

  13. Mirjalili S, Lewis A. The whale optimization algorithm. Adv Eng Softw. 2016;95:51–67. https://doi.org/10.1016/j.advengsoft.2016.01.008.

    Article  Google Scholar 

  14. Bhattacharya S, Krishnan SRS, Maddikunta PKR, Kaluri R, Singh S, Gadekallu TR, Alazab M, Tariq U. A novel PCA-firefly based XGBoost classification model for intrusion detection in networks. Electronics. 2020;9(219):1–16. https://doi.org/10.3390/electronics9020219.

    Article  Google Scholar 

  15. Mafarja M, Heidari AA, Habib M, Faris H, Thaher T, Aljarah I. Augmented whale feature selection for IoT attacks: Structure, analysis and applications. Futur Gener Comput Syst. 2020;112:18–40. https://doi.org/10.1016/j.future.2020.05.020.

    Article  Google Scholar 

  16. Ma L, Huang M, Yang S, Wang R, Wang X. An adaptive localized decision variable analysis approach to large-scale multiobjective and many-objective optimization. IEEE Trans Cybern. 2022;52:6684–96. https://doi.org/10.1109/TCYB.2020.3041212.

    Article  Google Scholar 

  17. Dey AK, Gupta GP, Sahu SP. Hybrid meta-heuristic based feature selection mechanism for cyber-attack detection in IoT-enabled networks. Procedia Comput Sci. 2023;218:318–27. https://doi.org/10.1016/j.procs.2023.01.014.

    Article  Google Scholar 

  18. Nagaraju R, Pentang JT, Abdufattokhov S, Cosio Borda RF, Mageswari N, Uganya G. Attack prevention in IoT through hybrid optimization mechanism and deep learning framework. Meas Sens. 2022;24(100431):1–10. https://doi.org/10.1016/j.measen.2022.100431.

    Article  Google Scholar 

  19. Saraladeve L, Chandrasekar A. An effective ids framework for IoT using feature selection and classification model. J Theor Appl Inf Technol. 2023;101(13):5298–312.

    Google Scholar 

  20. Verma N, Singh S, Prasad D. Performance analysis and comparison of machine learning and LoRa-based healthcare model. Neural Comput Appl. 2023;35(17):12751–61. https://doi.org/10.1007/s00521-023-08411-5.

    Article  Google Scholar 

  21. Muñoz Castañeda ÁL, Mata JAA, Aláiz-Moretón H. Characterization of threats in IoT from an MQTT protocol-oriented dataset. Complex Intell Syst. 2023;9(5):5281–96. https://doi.org/10.1007/s40747-023-01000-y.

    Article  Google Scholar 

  22. Sajjad F, Rashid M, Zafar A, Zafar K, Fida B, Arshad A, Riaz S, Dutta AK, Rodrigues JJ. An efficient hybrid approach for optimization using simulated annealing and grasshopper algorithm for IoT applications. Discov Internet Things. 2023;3(7):1–19. https://doi.org/10.1007/s43926-023-00036-3.

    Article  Google Scholar 

  23. Kareem SS, Mostafa RR, Hashim FA, El-Bakry HM. An effective feature selection model using hybrid metaheuristic algorithms for IoT intrusion detection. Sensors. 2022;22(1396):1–23. https://doi.org/10.3390/s22041396.

    Article  Google Scholar 

  24. Ramachandran D, Albathan M, Hussain A, Abbas Q. Enhancing cloud-based security: a novel approach for efficient cyber-threat detection using GSCSO-IHNN model. Systems. 2023;11(518):1–30. https://doi.org/10.3390/systems11100518.

    Article  Google Scholar 

  25. Alkanhel R, El-kenawy ESM, Abdelhamid AA, Ibrahim A, Alohali MA, Abotaleb M, Khafaga DS. Network intrusion detection based on feature selection and hybrid metaheuristic optimization. Comput Mater Contin. 2023;74(2):2678–93. https://doi.org/10.32604/cmc.2023.033273.

    Article  Google Scholar 

  26. Almarshdi R, Nassef L, Fadel E, Alowidi N. Hybrid deep learning based attack detection for imbalanced data classification. Intell Autom Soft Comput. 2023;35(1):297–320. https://doi.org/10.32604/iasc.2023.026799.

    Article  Google Scholar 

  27. Fragkos G, Minwalla C, Plusquellic J, Tsiropoulou EE. Artificially intelligent electronic money. IEEE Consum Electron Mag. 2021;10(4):81–9. https://doi.org/10.1109/MCE.2020.3024512.

    Article  Google Scholar 

  28. Aljarah I, Faris H, Mirjalili S. Optimizing connection weights in neural networks using the whale optimization algorithm. Soft Comput. 2018;22:1–15. https://doi.org/10.1007/s00500-016-2442-1.

    Article  Google Scholar 

  29. Song Y, Li H, Xu P, Liu D, Cheng S. A method of intrusion detection based on WOA-XGBoost algorithm. Discret Dyn Nat Soc. 2022. https://doi.org/10.1155/2022/5245622.

    Article  Google Scholar 

  30. Dataset IoTID20. https://www.kaggle.com/datasets/rohulaminlabid /iotid20-dataset. Accessed 29 Mar 2023.

  31. The UNSW-NB15. Dataset https://research.unsw.edu.au/projects/unsw-nb15-dataset. Accessed 29 Mar 2023.

  32. UNSW-NB15. https://www.kaggle.com/datasets/mrwellsdavid/unsw-nb15. Accessed 29 Mar 2023.

  33. Chen T, Guestrin C. XGBoost. A scalable tree boosting system. In: Proceedings of the ACM SIGKDD international conference on knowledge discovery and data mining, 13–17 August 2016, pp. 785–94 (2016). https://doi.org/10.1145/2939672.2939785

  34. Bajpai S, Sharma K, Chaurasia BK. Intrusion detection system in IoT network using ML. NeuroQuantology. 2022;20(13):3597–601. https://doi.org/10.14704/nq.2022.20.13.NQ88441.

    Article  Google Scholar 

  35. Sharawi M, Zawbaa HM, Emary E. Feature selection approach based on whale optimization algorithm. In: Ninth international conference on advanced computational intelligence (ICACI) 2017 Feb 4 , pp. 163–168. https://doi.org/10.1109/ICACI.2017.7974502

  36. Chaurasia BK, Raj H, Rathour SS, Singh PB. Transfer learning driven ensemble model for detection of diabetic retinopathy disease. Med Biol Eng Comput. 2023. https://doi.org/10.1007/s11517-023-02863-6.

    Article  Google Scholar 

  37. Bhavsar M, Roy K, Kelly O. Anomaly-based intrusion detection system for IoT application. Discov Internet Things. 2023;3(5):1–23. https://doi.org/10.1007/s43926-023-00034-5.

    Article  Google Scholar 

Download references

Funding

The authors are not received funding from any of the sources.

Author information

Authors and Affiliations

Authors

Contributions

The idea and problem formulation along with proposed solution, result analysis, and by corresponding author and supervisor, and verifies by all other authors.

Corresponding author

Correspondence to Brijesh Kumar Chaurasia.

Ethics declarations

Conflict of interest

The work is not submitted in any other journal. There is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bajpai, S., Sharma, K. & Chaurasia, B.K. A Hybrid Meta-heuristics Algorithm: XGBoost-Based Approach for IDS in IoT. SN COMPUT. SCI. 5, 537 (2024). https://doi.org/10.1007/s42979-024-02913-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-024-02913-2

Keywords

Navigation