Abstract
IoT devices are physical things that have sensors, network connectivity, and software built into them. This allows them to gather data and share it with other systems and devices. The rising usage of Internet of Things (IoT) systems in critical infrastructure and industrial settings has raised concerns about their vulnerability to cyber-attacks. Therefore, the IIoT desperately needs techniques for enhancing strategic actions. In this work, we propose an Intrusion Detection System (IDS) for IoT devices by using deep learning (DL) and machine learning (ML) algorithms, incorporating Fisher score feature selection on the Edge-IIoT dataset. To develop effective IDS models, we have first applied the Fisher score feature selection method for the identification of the most discriminative features from the Edge-IIoT dataset. For the ML-based IDS, we employ decision tree and random forest models, optimizing their hyperparameters using a systematic hyperparameter tuning approach getting 93.7% (Decision Tree), 94.36% (Random Forest), and 94.5% (Random Forest with hyperparameter tuning) accuracy. For the DL-based IDS, we propose a single-layered feed forward neural network (FFNN) and a multi-layered feed forward neural network (MLFNN) getting 96.1% and 96.5% accuracy, respectively. These models are trained on the selected features from the dataset and evaluated using various performance indicators, including recall, F1-score, accuracy, and precision. Overall, this research work contributes to the field of intrusion detection in IoT devices by combining Fisher score feature selection with both ML and DL algorithms. The findings highlight the prospective of hybrid approaches in increasing the security and resilience of IoT systems, ultimately enabling more robust and efficient intrusion detection mechanisms for IoT deployments in critical domains.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Faruqui N, Yousuf MA, Whaiduzzaman M, Azad AK, Barros A, Moni MA (2021) LungNet: a hybrid deep-CNN model for lung cancer diagnosis using CT and wearable sensor-based medical IoT data. Comput Biol Med 139:104961 (NL)
Abu Waraga O, Bettayeb M, Nasir Q, Talib MA (2020) Design and implementation of automated IoT security testbed. Comput Secur 88
Soldatos J, Gusmeroli S, Malo P, Di Orio G (2022) Internet of things applications in future manufacturing. In: Digitising the industry Internet of Things connecting the physical, digital and virtual worlds. River Publishers, The Netherlands, pp 153–183
Alani MM (2023) An explainable efficient flow-based Industrial IoT intrusion detection system. ISSN 0045-7906. https://doi.org/10.1016/j.compeleceng.2023.108732
Williams R, McMahon E, Samtani S, Patton M, Chen H (2017) Identifying vulnerabilities of consumer Internet of Things (IoT) devices: a scalable approach. In: Proceedings of the 2017 IEEE international conference on intelligence and security informatics (ISI), Beijing, China, 22–24 July 2017, IEEE, New York (2017), pp 179–181 (NL)
Shukla V, Chaturvedi A, Srivastava N (2019) Nanotechnology and cryptographic protocols: issues and possible solutions. Nanomater Energy 8(1):1–6. https://doi.org/10.1680/jnaen.18.00006
Misra MK, Chaturvedi A, Tripathi SP, Shukla V (2019) A unique key sharing protocol among three users using non-commutative group for electronic health record system. J Discrete Math Sci Crypt 22(8):1435–1451. https://doi.org/10.1080/09720529.2019.1692450
Chaturvedi A, Shukla V, Misra MK (2018) Three party key sharing protocol using polynomial rings. In: 5th IEEE Uttar Pradesh section international conference on electrical, electronics and computer engineering (UPCON), pp 1–5. https://doi.org/10.1109/UPCON.2018.8596905
Shukla V, Chaturvedi A, Srivastava N (2017) Secure wireless communication protocol: to avoid vulnerabilities in shared authentication. Commun Appl Electron 7(6):4–7. https://doi.org/10.5120/cae2017652680
Chaturvedi A, Srivastava N, Shukla V (2015) A secure wireless communication protocol using Diffie-Hellman key exchange. Int J Comput Appl 126(5):35–38. https://doi.org/10.5120/ijca2015906060
Zheng Y, Li Z, Xu X, Zhao Q (2022) Dynamic defenses in cyber security: techniques, methods and challenges. Digit Commun Netw 8:422–435
Almazrouei OSMBH, Magalingam P, Hasan MK, Shanmugam M (2023) A review on attack graph analysis for IoT vulnerability assessment: challenges, open issues, and future directions. IEEE Access 11:44350–44376. https://doi.org/10.1109/ACCESS.2023.3272053
Saxena U, Sodhi JS, Singh Y (2020) A comprehensive approach for DDoS attack detection in smart home network using shortest path algorithm. In: Proceedings of 8th international conference on reliability, infocom technologies and optimization, trends future directions (ICRITO), pp 392–395
Sharma S, Singh Y, Anand P (2023) Time series-based IDS for detecting botnet attacks in IoT and embedded devices. In Singh Y, Verma C, Zoltán I, Chhabra JK, Singh PK (eds) Proceedings of international conference on recent innovations in computing. ICRIC 2022. Lecture notes in electrical engineering, vol 1011. Springer, Singapore. https://doi.org/10.1007/978-981-99-0601-7_27
Kumari P, Jain AK (2023) A comprehensive study of DDoS attacks over IoT network and their countermeasures. ISSN 0167-4048. https://doi.org/10.1016/j.cose.2023.103096
Majid A (2023) Security and privacy concerns over IoT devices attacks in smart cities (2022). J Comput Commun 11:26–42. https://doi.org/10.4236/jcc.2023.111003
Kaur B, Dadkhah S, Shoeleh F, Neto EC, Xiong P, Iqbal S, Lamontagne P, Ray S, Ghorbani AA (2023) Internet of Things (IoT) security dataset evolution: challenges and future directions. ISSN 2542-6605. https://doi.org/10.1016/j.iot.2023.100780
Hammi B, Zeadally S, Nebhen J (2023) Security threats, countermeasures, and challenges of digital supply chains. ACM Comput Surv. Just Accepted (2023). https://doi.org/10.1145/3588999
Bellman C, van Oorschot PC (2023) Systematic analysis and comparison of security advice as datasets. ISSN 0167-4048. https://doi.org/10.1016/j.cose.2022.102989
Shukla V, Mishra A, Agarwal S (2020) A new one time password generation method for financial transactions with randomness analysis. In: Innovations in electrical and electronic engineering (part of the lecture notes in electrical engineering book series (LNEE, vol 661), pp 713–720. https://doi.org/10.1007/978-981-15-4692-1_54
Narwal B, Mohapatra AK (2021) A survey on security and authentication in wireless body area networks. J Syst Architect 113:101883
Shukla V, Chaturvedi A, Misra MK (2021) On authentication schemes using polynomials over non commutative rings. Wirel Pers Commun 118(1):1–9. https://doi.org/10.1007/s11277-020-08008-4
Narwal B, Mohapatra AK (2020) SEEMAKA: secured energy-efficient mutual authentication and key agreement scheme for wireless body area networks. Wirel Pers Commun 113(4):1985–2008
Narwal B, Mohapatra AK (2021) SAMAKA: secure and anonymous mutual authentication and key agreement scheme for wireless body area networks. Arab J Sci Eng 46(9):9197–9219
Sharma M, Narwal B, Anand R, Mohapatra AK, Yadav R (2023) PSECAS: a physical unclonable function based secure authentication scheme for Internet of Drones. Comput Electr Eng 108:108662
Shukla V, Mishra A, Yadav A (2019) An authenticated and secure electronic health record system. In: IEEE international conference on information and communication technology, 2019, pp 1–5. https://doi.org/10.1109/CICT48419.2019.9066168
Shukla V, Chaturvedi A (2018) Cryptocurrency: characteristics and future perspectives. 53(2):77–80. http://164.100.161.164/pdf/e-book/june-july-18.pdf#page=14
Shukla V, Misra MK, Chaturvedi A (2022) Journey of cryptocurrency in India in view of financial budget 2022–23, Cornell University arxiv, 2022, pp 1–6. https://doi.org/10.48550/arXiv.2203.12606
Zarpelão BB, Rodrigo SM, Cláudio TK, Sean CA (2017) A survey of intrusion detection in Internet of Things. J Netw Comput Appl 84:25–37
Arshad J, Azad MA, Abdeltaif MM, Salah K (2020) An intrusion detection framework for energy-constrained IoT devices. Mech Syst Signal Process 136:106436
Alghayadh F, Debnath D (2021) A hybrid intrusion detection system for smart home security based on machine learning and user behavior. Adv Internet Things 11(01):10–25. https://doi.org/10.4236/ait.2021.111002
Albulayhi K, Abu Al-Haija Q, Alsuhibany SA, Jillepalli AA, Ashrafuzzaman M, Sheldon FT (2022) IoT intrusion detection using machine learning with a novel high performing feature selection method. Appl Sci 12:5015. https://doi.org/10.3390/app12105015
Manimurugan S, Almutairi S, Aborokbah MM, Chilamkurti N, Ganesan S, Patan R (2020) Effective attack detection in the internet of medical things smart environment using a deep belief neural network. IEEE Access 8(1–1):77404
Kim J, Kim J, Kim H, Shim M, Choi E (2020) CNN-based network intrusion detection against denial-of-service attacks. Electronics 9:916. https://doi.org/10.3390/electronics9060919
Illy P, Kaddoum G, Miranda C, Kaur K, Garg S (2019) Securing fog-to-things environment using intrusion detection system based on ensemble learning. IEEE Wirel Commun Netw Conf (WCNC). https://doi.org/10.1109/wcnc.2019.8885534
Saheed YK, Abiodun AI, Misra S, Holone MK, Colomo-Palacios R (2022) A machine learning-based intrusion detection for detecting internet of things network attacks. Alex Eng J 61(12):9395–9409
Guezzaz A, Azrour M, Benkirane S, Mohy-Eddine M, Attou H, Douiba M (2022) A lightweight hybrid intrusion detection framework using machine learning for edge-based IIoT security. Int Arab J Inf Technol 19(5)
Gaber T, El-Ghamry A, Hassanien AE (2022) Injection attack detection using machine learning for smart IoT applications. Physical Communication 52:101685
Liu J, Kantarci B, Adams C (2020) Machine learning-driven intrusion detection for Contiki-NG-based IoT networks exposed to NSL-KDD dataset. In: Proceedings of the 2nd ACM workshop on wireless security and machine learning (WiseML ‘20). Association for Computing Machinery, New York, pp 25–30. https://doi.org/10.1145/3395352.3402621
Rashid MM, Khan SU, Eusufzai F, Redwan MA, Sabuj SR, Elsharief M (2023) A federated learning-based approach for improving intrusion detection in industrial Internet of Things networks. Network 3(1):158–179
Mendonça RV, Silva JC, Rosa RL, Saadi M, Rodriguez DZ, Farouk A (2022) A lightweight intelligent intrusion detection system for industrial internet of things using deep learning algorithms. Expert Syst 39(5):e12917
Saba T, Rehman A, Sadad T, Kolivand H, Bahaj SA (2022) Anomaly-based intrusion detection system for IoT networks through deep learning model. Comput Electr Eng 99:107810
Chaganti R, Suliman W, Ravi V, Dua A (2023) Deep learning approach for SDN-enabled intrusion detection system in IoT networks. Information 14(1):41. https://doi.org/10.3390/info14010041
Edge-IIoTset Cyber Security Dataset of IoT and IIoT. Edge-IIoTset cyber security dataset of IoT & IIoT | Kaggle. https://www.kaggle.com/datasets/mohamedamineferrag/edgeiiotset-cyber-security-dataset-of-iot-iiot
Davis JJ, Clark AJ (2011) Data preprocessing for anomaly based network intrusion detection: a review. Comput Secur 30(6–7):353–375
An Overview of Encoding Techniques. An overview of encoding techniques | Kaggle, www.kaggle.com/code/shahules/an-overview-of-encoding-techniques
Dunne K, Cunningham P, Azuaje F (2002) Solutions to instability problems with sequential wrapper-based approaches to feature selection. Trinity College Dublin, Department of Computer Science
Gu Q, Li Z, Han J (2012) Generalized fisher score for feature selection. In: Proceedings of the 27th conference on uncertainty in artificial intelligence, UAI 2011
Myles AJ, Feudale RN, Liu Y, Woody NA, Brown SD (2004) An introduction to decision tree modeling. J Chemometr A J Chemometr Soc 18(6):275–285y
Biau G (2012) Analysis of a random forests model. J Mach Learn Res 13(1):1063–1095
Pandian S (2022) A comprehensive guide on hyperparameter tuning and its techniques. Analytics Vidhya, 22 Feb. 2022. www.analyticsvidhya.com/blog/2022/02/a-comprehensive-guide-on-hyperparameter-tuning-and-its-techniques
Sazli MH (2006) A brief review of feed-forward neural networks. Commun Fac Sci Univ Ankara Ser A2–A3 Phys Sci Eng 50(01)
Svozil D, Kvasnicka V, Pospichal J (1997) Introduction to multi-layer feed-forward neural networks. Chemom Intell Lab Syst 39(1):43–62
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Rajput, D., Sharma, D.K., Gupta, M. (2024). Intrusion Detection in IoT Devices Using ML and DL Models with Fisher Score Feature Selection. In: Chaturvedi, A., Hasan, S.U., Roy, B.K., Tsaban, B. (eds) Cryptology and Network Security with Machine Learning. ICCNSML 2023. Lecture Notes in Networks and Systems, vol 918. Springer, Singapore. https://doi.org/10.1007/978-981-97-0641-9_8
Download citation
DOI: https://doi.org/10.1007/978-981-97-0641-9_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-0640-2
Online ISBN: 978-981-97-0641-9
eBook Packages: EngineeringEngineering (R0)