Abstract
The Internet of Things (IoT) and machine learning (ML) have various applications in different sectors of life, such as healthcare, agriculture, industries, transportation, smart cities, smart homes, etc., and their number is increasing with each passing day. The rapid development of IoT and its increasing demand in different fields of life create a serious problem of security for the IoT environment, which needs serious consideration to protect the IoT-enabled systems from external networks and cyber-attacks. Because of the open deployment environment and constrained resources, the IoT is prone to malicious assaults. Furthermore, the IoT’s diverse and dispersed properties make it difficult for conventional intrusion detection systems (IDS) to keep up with current technological developments. An ML-enabled IoT-based IDS is one of the most important security methods that can assist in defending computer networks and the IoT environment from numerous attacks and malicious activities. Keeping in mind the significant contribution of ML to securing the IoT environment, we proposed an ML-enabled IDS for securing the IoT networks and applications in this study. In the proposed system, we proposed a modified Random Forest (RF) algorithm and compared its performance with nine well-known ML algorithms for the detection of network attacks. Further, two of the most recent and well-known network datasets, i.e., TON-IoT and UNSW-NB15, are used to check the effectiveness of the ML-enabled IDS. The performance of the utilized ML algorithms was measured with the help of different performance measures such as accuracy, sensitivity, etc. The experimental outcomes illustrate the importance of the proposed ML-enabled IDS for securing the IoT environment and applications. The proposed system applies to almost all of the resource-constrained devices that use the IoT network.
Similar content being viewed by others
Data availability
All the data is available in the paper. For technical support, implementation process, and simulations guidelines, please contact the corresponding author of the paper.
References
Ahmad J, Shah SA, Latif S, Ahmed F, Zou Z, Pitropakis N (2022) DRaNN_PSO: a deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things. J King Saud Univ Comput Inf Sci 34:8112–8121
Almiani M, AbuGhazleh A, Al-Rahayfeh A, Atiewi S, Razaque A (2020) Deep recurrent neural network for IoT intrusion detection system. Simul Model Pract Theory 101:102031
Atlam HF, Wills GB (2020) IoT security, privacy, safety and ethics. Digital twin technologies and smart cities. Springer, Berlin, pp 123–149
Ayo FE, Folorunso SO, Abayomi-Alli AA, Adekunle AO, Awotunde JB (2020) Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection. Inf Secur J Glob Perspect 29:267–283
Booij TM, Chiscop I, Meeuwissen E, Moustafa N, den Hartog FT (2021) ToN_IoT: The role of heterogeneity and the need for standardization of features and attack types in IoT network intrusion data sets. IEEE Internet Things J 9(1):485–496
Cao B, Wang X, Zhang W, Song H, Lv Z (2020) A many-objective optimization model of industrial internet of things based on private blockchain. IEEE Netw 34:78–83
Cao K, Wang B, Ding H, Lv L, Tian J, Hu H, Gong F (2021) Achieving reliable and secure communications in wireless-powered NOMA systems. IEEE Trans Veh Technol 70:1978–1983
Cao Y, Wang Z, Ding H, Zhang J, Li B (2023) An intrusion detection system based on stacked ensemble learning for IoT network. Comput Electr Eng 110:108836
Cheng B, Wang M, Zhao S, Zhai Z, Zhu D, Chen J (2017) Situation-aware dynamic service coordination in an IoT environment. IEEE/ACM Trans Netw 25:2082–2095
Deng Y, Lv J, Huang D, Du S (2023) Combining the theoretical bound and deep adversarial network for machinery open-set diagnosis transfer. Neurocomputing:126391
Gu J, Lu S (2021) An effective intrusion detection approach using SVM with naïve Bayes feature embedding. Comput Secur 103:102158
Guezzaz A, Benkirane S, Azrour M, Khurram S (2021) A reliable network intrusion detection approach using decision tree with enhanced data quality. Secur Commun Netw 2021:1–8
Guo Y, Wu Y, Guo J (2017) Experimental validation of fuzzy PID control of flexible joint system in presence of uncertainties. In: 2017 36th Chinese control conference (CCC). IEEE, pp 4192–4197. https://doi.org/10.23919/ChiCC.2017.8028015
Hazrat B, Yin B, Kumar A, Ali M, Zhang J, Yao J (2023) Jerk-bounded trajectory planning for rotary flexible joint manipulator: an experimental approach. Soft Comput 27(7):4029–4039. https://doi.org/10.1007/s00500-023-07923-5
Jiang H, Xiao Z, Li Z, Xu J, Zeng F, Wang D (2020a) An energy-efficient framework for internet of things underlaying heterogeneous small cell networks. IEEE Trans Mob Comput 21:31–43
Jiang K, Wang W, Wang A, Wu H (2020b) Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access 8:32464–32476
Khraisat A, Gondal I, Vamplew P, Kamruzzaman J (2019) Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2:1–22
Kumar A, Shaikh AM, Li Y et al (2021) Pruning filters with L1-norm and capped L1-norm for CNN compression. Appl Intell 51:1152–1160. https://doi.org/10.1007/s10489-020-01894-y
Latif S, Zou Z, Idrees Z, Ahmad J (2020) A novel attack detection scheme for the industrial internet of things using a lightweight random neural network. IEEE Access 8:89337–89350
Li B, Zhou X, Ning Z, Guan X, Yiu K-FC (2022a) Dynamic event-triggered security control for networked control systems with cyber-attacks: a model predictive control approach. Inf Sci 612:384–398
Li J, Deng Y, Sun W, Li W, Li R, Li Q, Liu Z (2022b) Resource orchestration of cloud-edge–based smart grid fault detection. ACM Trans Sens Netw (TOSN) 18:1–26
Lu C, Wang X, Yang A, Liu Y, Dong Z (2023) A few-shot based model-agnostic meta-learning for intrusion detection in security of Internet of Things. IEEE Internet Things J
Luo P, Wang B, Wang H, Ma F, Ma H, Wang L (2023) An ultrasmall bolt defect detection method for transmission line inspection. IEEE Trans Instrum Meas 72:1–12
Luyang W, Zhai Q, Yin B et al (2019) Second-order convolutional network for crowd counting. In: Proc. SPIE 11198, fourth international workshop on pattern recognition, 111980T (31 July 2019). https://doi.org/10.1117/12.2540362
Min H, Fang Y, Wu X, Lei X, Chen S, Teixeira R, Zhu B, Zhao X, Xu Z (2023) A fault diagnosis framework for autonomous vehicles with sensor self-diagnosis. Expert Syst Appl 224:120002
Moustafa N (2021) A new distributed architecture for evaluating AI-based security systems at the edge: network TON_IoT datasets. Sustain Cit Soc 72:102994
Moustafa N, Slay J (2015) In UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 military communications and information systems conference (MilCIS), IEEE, pp 1–6
Moustafa N, Slay J (2016) The evaluation of Network Anomaly Detection Systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf Secur J Glob Perspect 25(1–3):18–31
Muhammad A, Yin B, Kumar A, Sheikh AM et al (2020) Reduction of multiplications in convolutional neural networks. In: 2020 39th Chinese control conference (CCC). IEEE, pp 7406–7411. https://doi.org/10.23919/CCC50068.2020.9188843
Ni Q, Guo J, Wu W, Wang H, Wu J (2021) Continuous influence-based community partition for social networks. IEEE Trans Netw Sci Eng 9:1187–1197
Otoum Y, Liu D, Nayak A (2022) DL-IDS: a deep learning–based intrusion detection framework for securing IoT. Trans Emerg Telecommun Technol 33(3):e3803
Pajouh HH, Javidan R, Khayami R, Dehghantanha A, Choo K-KR (2016) A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Top Comput 7:314–323
Pan S, Lin M, Xu M, Zhu S, Bian L-A, Li G (2021) A low-profile programmable beam scanning holographic array antenna without phase shifters. IEEE Internet Things J 9:8838–8851
Papamartzivanos D, Mármol FG, Kambourakis G (2018) Dendron: genetic trees driven rule induction for network intrusion detection systems. Futur Gener Comput Syst 79:558–574
Sharma V, You I, Yim K, Chen R, Cho J-H (2019) BRIoT: behavior rule specification-based misbehavior detection for IoT-embedded cyber-physical systems. IEEE Access 7:118556–118580
Song Y, Xin R, Chen P, Zhang R, Chen J, Zhao Z (2023) Identifying performance anomalies in fluctuating cloud environments: a robust correlative-GNN-based explainable approach. Futur Gener Comput Syst 145:77–86
Telikani A, Shen J, Yang J, Wang P (2022) Industrial IoT intrusion detection via evolutionary cost-sensitive learning and fog computing. IEEE Internet Things J 9:23260–23271
Wattanapongsakorn N, Charnsripinyo C (2015) Web-based monitoring approach for network-based intrusion detection and prevention. Multimedia Tools Appl 74:6391–6411
Wu Z, Cao J, Wang Y, Wang Y, Zhang L, Wu J (2018) hPSD: a hybrid PU-learning-based spammer detection model for product reviews. IEEE Trans Cybernet 50:1595–1606
Xu H, Sun Z, Cao Y et al (2023) A data-driven approach for intrusion and anomaly detection using automated machine learning for the Internet of Things. Soft Comput. https://doi.org/10.1007/s00500-023-09037-4
Yao Y, Zhao J, Li Z, Cheng X, Wu L (2023) Jamming and eavesdropping defense scheme based on deep reinforcement learning in autonomous vehicle networks. IEEE Trans Inf Forens Secur 18:1211–1224
Yin B, Khan J, Wang L, Zhang J, Kumar A (2019) Real-time lane detection and tracking for advanced driver assistance systems. In: 2019 Chinese control conference (CCC). IEEE, pp 6772–6777. https://doi.org/10.23919/ChiCC.2019.8866334
Yin B, Aslam MS et al (2023) A practical study of active disturbance rejection control for rotary flexible joint robot manipulator. Soft Comput 27:4987–5001. https://doi.org/10.1007/s00500-023-08026-x
Zhang J, Peng S, Gao Y, Zhang Z, Hong Q (2023) APMSA: adversarial perturbation against model stealing attacks. IEEE Trans Inf Forens Secur 18:1667–1679
Funding
The authors have not disclosed any funding.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no conflict of interest.
Consent for publication
All authors reviewed and provided consents for publication.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Al-Ambusaidi, M., Yinjun, Z., Muhammad, Y. et al. ML-IDS: an efficient ML-enabled intrusion detection system for securing IoT networks and applications. Soft Comput 28, 1765–1784 (2024). https://doi.org/10.1007/s00500-023-09452-7
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-023-09452-7