Skip to main content
Log in

lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Smart cities are being enabled all around the world by Internet of Things (IoT) applications. A smart city idea necessitates the integration of information and communication technologies and devices throughout a network in order to provide improved services to consumers. Because of their increasing amount and mobility, they are increasingly appealing to attackers. Therefore, several solutions, including as encryptions, authentication, availability, and data integrity, have been combined to protect IoT. Intrusion detection systems (IDSs) are a powerful security tool that may be improved by incorporating machine learning (ML) and deep learning (DP) techniques. This paper presents a novel intrusion detection framework for IoT-based smart environments with Ensemble Learning called IDS-SIoEL. Typically, the framework proposed an optimal anomaly detection model that uses AdaBoost, and combining different feature selection techniques Boruta, mutual information and correlation furthermore. The proposed model was evaluated on IoT-23, BoT-IoT, and Edge-IIoT datasets using the GPU. When compared to existing IDS, our approach provides good rating performance features of ACC, recall, and precision, with around 99.9% on record detection and calculation time of 33.68 s for learning and 0.02156 s for detection.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Data availability

Assessments and experimental results, obtained using Anaconda 3 IDE, are available and will be shared with authors at https://sites-Google.com/umi.ac.ma/azrour.

References

  1. Jan, S.U., Ahmed, S., Shakhov, V., Koo, I.: Toward a lightweight intrusion detection system for the internet of things. IEEE Access 7, 42 (2019)

    Article  Google Scholar 

  2. Nivaashini, M.; Thangaraj, P.: A framework of novel feature set extraction based intrusion detection system for internet of things using hybrid machine learning algorithms. In: 2018 International conference on computing, power and communication technologies (GUCON). pp. 44–49, 2018.

  3. Tait, K.-A.; Khan, J. S.; Alqahtani, F.; Shah, A. A.; Khan, F. A.; Rehman, M. U.; Boulila, W.; Ahmad, J.: Intrusion detection using machine learning techniques: an experimental comparison. In: IEEE International congress of advanced technology and engineering (ICOTEN).

  4. Khan, M.A.; Khan, M.A.; Latif, S.; Shah, A.A.; Rehman, M.U.; Boulila, W.; Driss, M.; Ahmad, J.: Voting classifier-based intrusion detection for IOT networks. In: 2nd International conference of advanced computing and informatics (ICACIN), 2021.

  5. King, J., Awad, A.I.: A distributed security mechanism for resource-constrained IoT devices. Inform. (Slovenia) 40(1), 133–143 (2016)

    Google Scholar 

  6. Irshad, A., Usman, M., Chaudhry, S.A., Naqvi, H., Shafiq, M.: A provably secure and efficient authenticated key agreement scheme for energy internet-based vehicle-to-grid technology framework. IEEE Trans. Ind. Appl. 56(4), 4425–4435 (2020)

    Google Scholar 

  7. Guezzaz, A., Asimi, Y., Azrour, M., Asimi, A.: Mathematical validation of proposed machine learning classifier for heterogeneous traffic and anomaly detection. Big Data Min. Anal. 4(1), 18–24 (2021)

    Article  Google Scholar 

  8. Chanal, P.M., Kakkasageri, M.S.: Security and privacy in IoT: a survey. Springer Science, Cham (2020)

    Google Scholar 

  9. Rishnaveni, S., Vigneshwar, P., Kishore, S., Jothi, B., Sivamohan, S.: Anomaly-based intrusion detection system using support vector machine. In: Dash, S.S., Lakshmi, C., Das, S., Panigrahi, B.K. (eds.) Artificial intelligence and evolutionary computations in engineering systems, pp. 723–731. Springer, Singapore (2020)

    Chapter  Google Scholar 

  10. Azrour, M., Mabrouki, J., Guezzaz, A., Farhaoui, Y.: New enhanced authentication protocol for internet of things. Big Data Min. Anal. 4(1), 1–9 (2021)

  11. Thaseen S., Kumar, C. A.: An analysis of supervised tree-based classifiers for intrusion detection system. In: International conference on pattern recognition, informatics and mobile engineering, pp. 294–299. (2013)

  12. Giffinger, Rudolf, et al. Smart cities-Ranking of European mediumsized cities. Vienna University of Technology, 2007.

  13. H. Chourabi, T. Nam, S. Walker, J. R. Gil-Garcia, S. Mellouli, K. Nahon, T. a. Pardo, and H. J. Scholl, Understanding Smart Cities: An Integrative Framework,‖ 2012 45th Hawaii Int. Conf. Syst. Sci., pp. 2289–2297, Jan. 2012.

  14. Nakano, S., Washizu, A.: Will smart cities enhance the social capital of residents? The importance of smart neighborhood management. Cities 115, 103244 (2021)

    Article  Google Scholar 

  15. Chatfield, A.T., Reddick, C.G.: A framework for Internet of Things-enabled smart government: a case of IoT cybersecurity policies and use cases in U.S. federal government. Gov. Inf. Q. 36(2), 346–357 (2019)

    Article  Google Scholar 

  16. Wang, W., et al.: Computation-transferable authenticated key agreement protocol for smart healthcare. J. Syst. Archit. 118, 102215 (2021)

    Article  Google Scholar 

  17. Singh, A., Chatterjee, K.: Securing smart healthcare system with edge computing. Comput. Secur. 108, 102353 (2021)

    Article  Google Scholar 

  18. Ahmad, T., Zhang, D.: Using the internet of things in smart energy systems and networks. Sustain. Cities Soc. 68, 102783 (2021)

    Article  Google Scholar 

  19. Jeong, H., et al.: A comprehensive survey on vehicular networking for safe and efficient driving in smart transportation: a focus on systems, protocols, and applications. Veh. Commun. 31, 100349 (2021)

    Google Scholar 

  20. M. Azrour, J. Mabrouki, Y. Farhaoui, A. Guezzaz. Security Analysis of Nikooghadam et al.’s Authentication Protocol for Cloud-IoT. Intelligent Systems in Big Data, Semantic Web and Machine Learning. Advances in Intelligent Systems and Computing, vol 1344. pp. 261–269. 2021.

  21. A. Guezzaz, A. Asimi, Y. Asimi, M. Azrour, S. Benkirane. A Distributed Intrusion Detection Approach Based on Machine Leaning Techniques for a Cloud Security. Intelligent Systems in Big Data, Semantic Web and Machine Learning. Advances in Intelligent Systems and Computing, vol 1344. pp. 85-94. Springer, 2021.

  22. Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection system: techniques, datasets and challenges. Cybersecurity 2, 1–22 (2019)

    Article  Google Scholar 

  23. Azrour, M., Mabrouki, J., Guezzaz, A., Kanwal, A.: Internet of things security: challenges and key issues. Security Commun. Netw. 2021, 11 (2021)

    Google Scholar 

  24. A. Guezzaz, S. Benkirane, M. Azrour. A Novel Anomaly Network Intrusion Detection System for Internet of Things Security. IoT and Smart Devices for Sustainable Environment. EAI/Springer Innovations in Communication and Computing. Springer, 2022.

  25. A. Guezzaz, A. Asimi, Y. Sadqi, Y. Asimi and Z. Tbatou. A New Hybrid Network Sniffer Model Based on Pcap Language and Sockets (PcapSockS)‖, International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 7, No. 2, 2016.

  26. Elijah, A. V., Abdullah, A., JhanJhi, N., Supramaniam, M., & Abdullateef, B. (2019). Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: an empirical study. International Journal of Advanced Computer Science and Applications, 10(9)

  27. Ponnusamy, V., Humayun, M., Jhanjhi, N.Z., Yichiet, A., Almufareh, M.F.: Intrusion detection systems in internet of things and mobile Ad-Hoc networks. Comput. Syst. Sci. Eng. 40(3), 1199–1215 (2022)

    Article  Google Scholar 

  28. Otoum, Y., Wan, Y., Nayak, A.: Transfer learning-driven intrusion detection for Internet of Vehicles (IoV). Int. Wirel. Commun. Mob. Comput. (IWCMC) 2022, 342–347 (2022). https://doi.org/10.1109/IWCMC55113.2022.9825115

    Article  Google Scholar 

  29. Alazzam, H., Sharieh, A., Sabri, K.E.: A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer. Expert Syst. Appl. 148, 113249 (2020)

    Article  Google Scholar 

  30. A. Sommer and V. Paxson, “Outside the closed world: on using machine learning for network intrusion detection,” in Proceedings of the 2010 IEEE Symposium on Security and Privacy, pp. 305–316, Oakland, 2010.

  31. Çavuşoğlu, Ü.: A new hybrid approach for intrusion detection using machine learning methods. Appl. Intell. 49, 2735–2761 (2019)

    Article  Google Scholar 

  32. Chatfield, A.T., Reddick, C.G.. A framework for Internet of Things-enabled smart government: A case of IoT cybersecurity policies and use cases in U.S. federal government. Gov. Inf. Q. 36 (2), 346–357. 2019.

  33. Ghazali, A., Nuaimy, W., Al-Atabi, A., Jamaludin, I.: Comparison of classification models for Nsl-Kdd dataset for network anomaly detection. Acad. J. Sci. 4(1), 199–206 (2015)

    Google Scholar 

  34. Kevric, J., Jukic, S., Subasi, A.: An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput. Appl. 28, 1051–1058 (2017)

    Article  Google Scholar 

  35. Pham, N.T., Ernest, F., Suriadi, S., Helen, J., Hassan Fareed, M.L.: Improving performance of intrusion detection system using ensemble methods and feature selection. In: Kim, D.S., Camtepe, S. (eds.) Proceedings of the Australasian computer science week multiconference, pp. 1–6. Association for Computing Machinery, Newyork (2018)

    Google Scholar 

  36. A. Ahmim, L. Maglaras, M. A. Ferrag, M. Derdour and H. Janicke, "A novel hierarchical intrusion detection system based on decision tree and rules-based models," in 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), IEEE, , pp. 228–233, 2019.

  37. Liu C, Yang J, Chen R, Zhang Y, Zeng J. Research on immunity-based intrusion detection technology for the internet of things. In: 2011 Seventh International Conference on Natural Computation, vol. 1. IEEE, Shanghai. Pp 212–216, 2011.

  38. Jun C, Chi C Design of complex event-processing IDS in internet of things. In: 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation. IEEE, Zhangjiajie. pp 226–229, 2014.

  39. Bostani, H., Sheikhan, M.: Hybrid of anomaly-based and specification-based IDS for internet of things using unsupervised OPF based on MapReduce approach. Comput. Commun. 98, 52–71 (2017)

    Article  Google Scholar 

  40. Kasinathan P, Pastrone C, Spirito MA, Vinkovits M. Denial-of-service detection in 6LoWPAN based internet of things. In: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, Lyon. pp 600–607.24, 2013.

  41. Deng, L., Li, D., Yao, X., Cox, D., Wang, H.: Mobile network intrusion detection for IoT system based on transfer learning algorithm. Clust. Comput. 21, 1–16 (2018)

    Google Scholar 

  42. Garcia-Font, V., Garrigues, C., Rifà-Pous, H.: Attack classification schema for smart city WSNs. Sensors 17(4), 1–24 (2017)

    Article  Google Scholar 

  43. Krimmling J, Peter S. Integration and evaluation of intrusion detection for CoAP in smart city applications. In: 2014 IEEE Conference on Communications and Network Security. IEEE, San Francisco. pp 73–78, 2014.

  44. Jabbar, M.A., Aluvalu, R., Seelam, S.S.R.: RFAODE: a novel ensemble intrusion detection system. Procedia Comput. Sci. 115, 226–234 (2017)

    Article  Google Scholar 

  45. Amouri A, Alaparthy VT, Morgera SD. Cross layer-based intrusion detection based on network behavior for IoT. In: 2018 IEEE 19th Wireless and Microwave Technology Conference (WAMICON). IEEE, Sand Key. pp 1–4, 2018.

  46. Liu, L., Xu, B., Zhang, X., Wu, X.: An intrusion detection method for internet of things based on suppressed fuzzy clustering. EURASIP J. Wirel. Commun. Netw. 2018(1), 113I (2018)

    Article  Google Scholar 

  47. Guezzaz, A., Benkirane, S., Azrour, M., Khurram, S.: A reliable network intrusion detection approach using decision tree with enhanced data quality. Secur. Commun. Netw. (2021). https://doi.org/10.1155/2021/1230593

    Article  Google Scholar 

  48. Meidan, Y., Sachidananda, V., Peng, H., Sagron, R., Elovici, Y., Shabtai, A.: A novel approach for detecting vulnerable IoT devices connected behind a home NAT. Comput. Secur. 97, 101968 (2020)

    Article  Google Scholar 

  49. Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C.: A OneM2M intrusion detection and prevention system based on edge machine learning. IEEE/IFIP Netw. Op. Manag. Symp. (2020). https://doi.org/10.1109/NOMS47738.2020.9110473

    Article  Google Scholar 

  50. Ullah, I., Mahmoud, Q.H.: Design and development of a deep learning-based model for anomaly detection in IoT networks. IEEE Access 9, 103906–103926 (2021)

    Article  Google Scholar 

  51. M. Al-kasassbeh, M. A. Abbadi, and A. M. AlBustanji, ―LightGBM Algorithm for Malware Detection‖. Intelligent Computing, 2020.

  52. Abu Al-Haija, Q.; Zein-Sabatto, S. An Efficient Deep-Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Stoian, N.A, Machine Learning for anomaly detection in IoT networks : Malware analysis on the IoT-23 dataset - University of Twente Student Theses (utwente.nl) ", 2020

  53. Ge, M., Syed, N.F., Fu, X., Baig, Z., Robles-Kelly, A.: Towards a deep learning-driven intrusion detection approach for internet of things. Comput. Netw. 186, 107784 (2021)

    Article  Google Scholar 

  54. Jin, D., Lu, Y., Qin, J., Cheng, Z., Mao, Z.: SwiftIDS: real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism. Comput. Secur. 97(10), 101984 (2020). https://doi.org/10.1016/j.cose.2020.101984

    Article  Google Scholar 

  55. Revathi, S., Malathi, A.: A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. (IJERT) 02(12), 1848–1853 (2013)

    Google Scholar 

  56. Guezzaz, A., Asimi, A., Batou, Z., Asimi, Y., Sadqi, Y.: A global intrusion detection system using PcapSockS sniffer and multilayer perceptron classifier. Int. J. Netw. Secur. 21(3), 438–450 (2019)

    Google Scholar 

  57. Abu Al-Haija, Q., Al-Badawi, A.: Attack-aware IoT network traffic routing leveraging ensemble learning. Sensors 22, 241 (2022)

    Article  Google Scholar 

  58. Gyamfi, E., Jurcut, A.D.: Novel online network intrusion detection system for industrial IoT based on OI-SVDD and AS-ELM. IEEE Internet Things J. (2022). https://doi.org/10.1109/JIOT.2022.3172393

    Article  Google Scholar 

  59. Abu Al-Haija, Q., Al-Dala’ien, M.: ELBA-IoT: an ensemble learning model for botnet attack detection in IoT networks. J. Sens. Actuator Netw. (2022). https://doi.org/10.3390/jsan11010018

    Article  Google Scholar 

  60. Albulayhi, K., Abu Al-Haija, Q., Alsuhibany, S.A., Jillepalli, A.A., Ashrafuzzaman, M., Sheldon, F.T.: IoT intrusion detection using machine learning with a novel high performing feature selection method. Appl. Sci. 12, 5015 (2022)

    Article  Google Scholar 

  61. Kursa, M.B., Rudnicki, W.R.: Feature selection with the boruta package. J. Stat. Softw. 36, 1–13 (2010)

    Article  Google Scholar 

  62. Ferrag, M.A., Friha, O., Hamouda, D., Maglaras, L., Janicke, H.: Edge-IIoTset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access 10, 40281–40306 (2022)

    Article  Google Scholar 

  63. Garcia, S., Parmisano, A., Erquiaga, M. J.: IoT-23: a labeled dataset with malicious and benign IoT network traffic (Version 1.0.0) [Data set]. Zenodo, (2020). https://doi.org/10.5281/zenodo.4743746

  64. Shafiq, M., Tian, Z., Sun, Y., Du, X., Guizani, M.: Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city. Futur. Gener. Comput. Syst. 107, 433–442 (2020)

    Article  Google Scholar 

  65. Koroniotis, N., Moustafa, N., Sitnikova, E.: A new network forensic framework based on deep learning for internet of things networks: a particle deep framework. Future Gene. Comput. Syst. 110, 91–106 (2020)

    Article  Google Scholar 

Download references

Funding

This study was not funded and without financially supporting. We did this research work as professors of computer sciences at University.

Author information

Authors and Affiliations

Authors

Contributions

CH is the main author that manages the contribution and gives the detailed description of the model. AG writes the abstract, introduction and analyzes the related works section. SB evaluates the results obtained from implementation and drowing the figures. MA participates in implementation of the model prepared the final manuscript and corrected the English language.

Corresponding author

Correspondence to Azidine Guezzaz.

Ethics declarations

Competing interests

The authors declare no competing interests.

Conflict of interest

We declare that we have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hazman, C., Guezzaz, A., Benkirane, S. et al. lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning. Cluster Comput 26, 4069–4083 (2023). https://doi.org/10.1007/s10586-022-03810-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-022-03810-0

Keywords

Navigation