Skip to main content
Log in

ML-IDS: an efficient ML-enabled intrusion detection system for securing IoT networks and applications

  • Neural Networks
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) and machine learning (ML) have various applications in different sectors of life, such as healthcare, agriculture, industries, transportation, smart cities, smart homes, etc., and their number is increasing with each passing day. The rapid development of IoT and its increasing demand in different fields of life create a serious problem of security for the IoT environment, which needs serious consideration to protect the IoT-enabled systems from external networks and cyber-attacks. Because of the open deployment environment and constrained resources, the IoT is prone to malicious assaults. Furthermore, the IoT’s diverse and dispersed properties make it difficult for conventional intrusion detection systems (IDS) to keep up with current technological developments. An ML-enabled IoT-based IDS is one of the most important security methods that can assist in defending computer networks and the IoT environment from numerous attacks and malicious activities. Keeping in mind the significant contribution of ML to securing the IoT environment, we proposed an ML-enabled IDS for securing the IoT networks and applications in this study. In the proposed system, we proposed a modified Random Forest (RF) algorithm and compared its performance with nine well-known ML algorithms for the detection of network attacks. Further, two of the most recent and well-known network datasets, i.e., TON-IoT and UNSW-NB15, are used to check the effectiveness of the ML-enabled IDS. The performance of the utilized ML algorithms was measured with the help of different performance measures such as accuracy, sensitivity, etc. The experimental outcomes illustrate the importance of the proposed ML-enabled IDS for securing the IoT environment and applications. The proposed system applies to almost all of the resource-constrained devices that use the IoT network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Data availability

All the data is available in the paper. For technical support, implementation process, and simulations guidelines, please contact the corresponding author of the paper.

References

  • Ahmad J, Shah SA, Latif S, Ahmed F, Zou Z, Pitropakis N (2022) DRaNN_PSO: a deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things. J King Saud Univ Comput Inf Sci 34:8112–8121

    Google Scholar 

  • Almiani M, AbuGhazleh A, Al-Rahayfeh A, Atiewi S, Razaque A (2020) Deep recurrent neural network for IoT intrusion detection system. Simul Model Pract Theory 101:102031

    Article  Google Scholar 

  • Atlam HF, Wills GB (2020) IoT security, privacy, safety and ethics. Digital twin technologies and smart cities. Springer, Berlin, pp 123–149

    Chapter  Google Scholar 

  • Ayo FE, Folorunso SO, Abayomi-Alli AA, Adekunle AO, Awotunde JB (2020) Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection. Inf Secur J Glob Perspect 29:267–283

    Article  Google Scholar 

  • Booij TM, Chiscop I, Meeuwissen E, Moustafa N, den Hartog FT (2021) ToN_IoT: The role of heterogeneity and the need for standardization of features and attack types in IoT network intrusion data sets. IEEE Internet Things J 9(1):485–496

    Article  Google Scholar 

  • Cao B, Wang X, Zhang W, Song H, Lv Z (2020) A many-objective optimization model of industrial internet of things based on private blockchain. IEEE Netw 34:78–83

    Article  Google Scholar 

  • Cao K, Wang B, Ding H, Lv L, Tian J, Hu H, Gong F (2021) Achieving reliable and secure communications in wireless-powered NOMA systems. IEEE Trans Veh Technol 70:1978–1983

    Article  Google Scholar 

  • Cao Y, Wang Z, Ding H, Zhang J, Li B (2023) An intrusion detection system based on stacked ensemble learning for IoT network. Comput Electr Eng 110:108836

    Article  Google Scholar 

  • Cheng B, Wang M, Zhao S, Zhai Z, Zhu D, Chen J (2017) Situation-aware dynamic service coordination in an IoT environment. IEEE/ACM Trans Netw 25:2082–2095

    Article  Google Scholar 

  • Deng Y, Lv J, Huang D, Du S (2023) Combining the theoretical bound and deep adversarial network for machinery open-set diagnosis transfer. Neurocomputing:126391

  • Gu J, Lu S (2021) An effective intrusion detection approach using SVM with naïve Bayes feature embedding. Comput Secur 103:102158

    Article  Google Scholar 

  • Guezzaz A, Benkirane S, Azrour M, Khurram S (2021) A reliable network intrusion detection approach using decision tree with enhanced data quality. Secur Commun Netw 2021:1–8

    Article  Google Scholar 

  • Guo Y, Wu Y, Guo J (2017) Experimental validation of fuzzy PID control of flexible joint system in presence of uncertainties. In: 2017 36th Chinese control conference (CCC). IEEE, pp 4192–4197. https://doi.org/10.23919/ChiCC.2017.8028015

  • Hazrat B, Yin B, Kumar A, Ali M, Zhang J, Yao J (2023) Jerk-bounded trajectory planning for rotary flexible joint manipulator: an experimental approach. Soft Comput 27(7):4029–4039. https://doi.org/10.1007/s00500-023-07923-5

    Article  Google Scholar 

  • Jiang H, Xiao Z, Li Z, Xu J, Zeng F, Wang D (2020a) An energy-efficient framework for internet of things underlaying heterogeneous small cell networks. IEEE Trans Mob Comput 21:31–43

    Article  Google Scholar 

  • Jiang K, Wang W, Wang A, Wu H (2020b) Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access 8:32464–32476

    Article  Google Scholar 

  • Khraisat A, Gondal I, Vamplew P, Kamruzzaman J (2019) Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2:1–22

    Article  Google Scholar 

  • Kumar A, Shaikh AM, Li Y et al (2021) Pruning filters with L1-norm and capped L1-norm for CNN compression. Appl Intell 51:1152–1160. https://doi.org/10.1007/s10489-020-01894-y

    Article  Google Scholar 

  • Latif S, Zou Z, Idrees Z, Ahmad J (2020) A novel attack detection scheme for the industrial internet of things using a lightweight random neural network. IEEE Access 8:89337–89350

    Article  Google Scholar 

  • Li B, Zhou X, Ning Z, Guan X, Yiu K-FC (2022a) Dynamic event-triggered security control for networked control systems with cyber-attacks: a model predictive control approach. Inf Sci 612:384–398

    Article  Google Scholar 

  • Li J, Deng Y, Sun W, Li W, Li R, Li Q, Liu Z (2022b) Resource orchestration of cloud-edge–based smart grid fault detection. ACM Trans Sens Netw (TOSN) 18:1–26

    Article  Google Scholar 

  • Lu C, Wang X, Yang A, Liu Y, Dong Z (2023) A few-shot based model-agnostic meta-learning for intrusion detection in security of Internet of Things. IEEE Internet Things J

  • Luo P, Wang B, Wang H, Ma F, Ma H, Wang L (2023) An ultrasmall bolt defect detection method for transmission line inspection. IEEE Trans Instrum Meas 72:1–12

    Google Scholar 

  • Luyang W, Zhai Q, Yin B et al (2019) Second-order convolutional network for crowd counting. In: Proc. SPIE 11198, fourth international workshop on pattern recognition, 111980T (31 July 2019). https://doi.org/10.1117/12.2540362

  • Min H, Fang Y, Wu X, Lei X, Chen S, Teixeira R, Zhu B, Zhao X, Xu Z (2023) A fault diagnosis framework for autonomous vehicles with sensor self-diagnosis. Expert Syst Appl 224:120002

    Article  Google Scholar 

  • Moustafa N (2021) A new distributed architecture for evaluating AI-based security systems at the edge: network TON_IoT datasets. Sustain Cit Soc 72:102994

    Article  Google Scholar 

  • Moustafa N, Slay J (2015) In UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 military communications and information systems conference (MilCIS), IEEE, pp 1–6

  • Moustafa N, Slay J (2016) The evaluation of Network Anomaly Detection Systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf Secur J Glob Perspect 25(1–3):18–31

    Article  Google Scholar 

  • Muhammad A, Yin B, Kumar A, Sheikh AM et al (2020) Reduction of multiplications in convolutional neural networks. In: 2020 39th Chinese control conference (CCC). IEEE, pp 7406–7411. https://doi.org/10.23919/CCC50068.2020.9188843

  • Ni Q, Guo J, Wu W, Wang H, Wu J (2021) Continuous influence-based community partition for social networks. IEEE Trans Netw Sci Eng 9:1187–1197

    Article  MathSciNet  Google Scholar 

  • Otoum Y, Liu D, Nayak A (2022) DL-IDS: a deep learning–based intrusion detection framework for securing IoT. Trans Emerg Telecommun Technol 33(3):e3803

    Article  Google Scholar 

  • Pajouh HH, Javidan R, Khayami R, Dehghantanha A, Choo K-KR (2016) A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Top Comput 7:314–323

    Article  Google Scholar 

  • Pan S, Lin M, Xu M, Zhu S, Bian L-A, Li G (2021) A low-profile programmable beam scanning holographic array antenna without phase shifters. IEEE Internet Things J 9:8838–8851

    Article  Google Scholar 

  • Papamartzivanos D, Mármol FG, Kambourakis G (2018) Dendron: genetic trees driven rule induction for network intrusion detection systems. Futur Gener Comput Syst 79:558–574

    Article  Google Scholar 

  • Sharma V, You I, Yim K, Chen R, Cho J-H (2019) BRIoT: behavior rule specification-based misbehavior detection for IoT-embedded cyber-physical systems. IEEE Access 7:118556–118580

    Article  Google Scholar 

  • Song Y, Xin R, Chen P, Zhang R, Chen J, Zhao Z (2023) Identifying performance anomalies in fluctuating cloud environments: a robust correlative-GNN-based explainable approach. Futur Gener Comput Syst 145:77–86

    Article  Google Scholar 

  • Telikani A, Shen J, Yang J, Wang P (2022) Industrial IoT intrusion detection via evolutionary cost-sensitive learning and fog computing. IEEE Internet Things J 9:23260–23271

    Article  Google Scholar 

  • Wattanapongsakorn N, Charnsripinyo C (2015) Web-based monitoring approach for network-based intrusion detection and prevention. Multimedia Tools Appl 74:6391–6411

    Article  Google Scholar 

  • Wu Z, Cao J, Wang Y, Wang Y, Zhang L, Wu J (2018) hPSD: a hybrid PU-learning-based spammer detection model for product reviews. IEEE Trans Cybernet 50:1595–1606

    Article  Google Scholar 

  • Xu H, Sun Z, Cao Y et al (2023) A data-driven approach for intrusion and anomaly detection using automated machine learning for the Internet of Things. Soft Comput. https://doi.org/10.1007/s00500-023-09037-4

    Article  Google Scholar 

  • Yao Y, Zhao J, Li Z, Cheng X, Wu L (2023) Jamming and eavesdropping defense scheme based on deep reinforcement learning in autonomous vehicle networks. IEEE Trans Inf Forens Secur 18:1211–1224

    Article  Google Scholar 

  • Yin B, Khan J, Wang L, Zhang J, Kumar A (2019) Real-time lane detection and tracking for advanced driver assistance systems. In: 2019 Chinese control conference (CCC). IEEE, pp 6772–6777. https://doi.org/10.23919/ChiCC.2019.8866334

  • Yin B, Aslam MS et al (2023) A practical study of active disturbance rejection control for rotary flexible joint robot manipulator. Soft Comput 27:4987–5001. https://doi.org/10.1007/s00500-023-08026-x

    Article  Google Scholar 

  • Zhang J, Peng S, Gao Y, Zhang Z, Hong Q (2023) APMSA: adversarial perturbation against model stealing attacks. IEEE Trans Inf Forens Secur 18:1667–1679

    Article  Google Scholar 

Download references

Funding

The authors have not disclosed any funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhang Yinjun.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Consent for publication

All authors reviewed and provided consents for publication.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Al-Ambusaidi, M., Yinjun, Z., Muhammad, Y. et al. ML-IDS: an efficient ML-enabled intrusion detection system for securing IoT networks and applications. Soft Comput 28, 1765–1784 (2024). https://doi.org/10.1007/s00500-023-09452-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-023-09452-7

Keywords

Navigation