Skip to main content

Intrusion Detection in IoT Devices Using ML and DL Models with Fisher Score Feature Selection

  • Conference paper
  • First Online:
Cryptology and Network Security with Machine Learning (ICCNSML 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 918))

  • 76 Accesses

Abstract

IoT devices are physical things that have sensors, network connectivity, and software built into them. This allows them to gather data and share it with other systems and devices. The rising usage of Internet of Things (IoT) systems in critical infrastructure and industrial settings has raised concerns about their vulnerability to cyber-attacks. Therefore, the IIoT desperately needs techniques for enhancing strategic actions. In this work, we propose an Intrusion Detection System (IDS) for IoT devices by using deep learning (DL) and machine learning (ML) algorithms, incorporating Fisher score feature selection on the Edge-IIoT dataset. To develop effective IDS models, we have first applied the Fisher score feature selection method for the identification of the most discriminative features from the Edge-IIoT dataset. For the ML-based IDS, we employ decision tree and random forest models, optimizing their hyperparameters using a systematic hyperparameter tuning approach getting 93.7% (Decision Tree), 94.36% (Random Forest), and 94.5% (Random Forest with hyperparameter tuning) accuracy. For the DL-based IDS, we propose a single-layered feed forward neural network (FFNN) and a multi-layered feed forward neural network (MLFNN) getting 96.1% and 96.5% accuracy, respectively. These models are trained on the selected features from the dataset and evaluated using various performance indicators, including recall, F1-score, accuracy, and precision. Overall, this research work contributes to the field of intrusion detection in IoT devices by combining Fisher score feature selection with both ML and DL algorithms. The findings highlight the prospective of hybrid approaches in increasing the security and resilience of IoT systems, ultimately enabling more robust and efficient intrusion detection mechanisms for IoT deployments in critical domains.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Faruqui N, Yousuf MA, Whaiduzzaman M, Azad AK, Barros A, Moni MA (2021) LungNet: a hybrid deep-CNN model for lung cancer diagnosis using CT and wearable sensor-based medical IoT data. Comput Biol Med 139:104961 (NL)

    Google Scholar 

  2. Abu Waraga O, Bettayeb M, Nasir Q, Talib MA (2020) Design and implementation of automated IoT security testbed. Comput Secur 88

    Google Scholar 

  3. Soldatos J, Gusmeroli S, Malo P, Di Orio G (2022) Internet of things applications in future manufacturing. In: Digitising the industry Internet of Things connecting the physical, digital and virtual worlds. River Publishers, The Netherlands, pp 153–183

    Google Scholar 

  4. Alani MM (2023) An explainable efficient flow-based Industrial IoT intrusion detection system. ISSN 0045-7906. https://doi.org/10.1016/j.compeleceng.2023.108732

  5. Williams R, McMahon E, Samtani S, Patton M, Chen H (2017) Identifying vulnerabilities of consumer Internet of Things (IoT) devices: a scalable approach. In: Proceedings of the 2017 IEEE international conference on intelligence and security informatics (ISI), Beijing, China, 22–24 July 2017, IEEE, New York (2017), pp 179–181 (NL)

    Google Scholar 

  6. Shukla V, Chaturvedi A, Srivastava N (2019) Nanotechnology and cryptographic protocols: issues and possible solutions. Nanomater Energy 8(1):1–6. https://doi.org/10.1680/jnaen.18.00006

    Article  Google Scholar 

  7. Misra MK, Chaturvedi A, Tripathi SP, Shukla V (2019) A unique key sharing protocol among three users using non-commutative group for electronic health record system. J Discrete Math Sci Crypt 22(8):1435–1451. https://doi.org/10.1080/09720529.2019.1692450

    Article  MathSciNet  Google Scholar 

  8. Chaturvedi A, Shukla V, Misra MK (2018) Three party key sharing protocol using polynomial rings. In: 5th IEEE Uttar Pradesh section international conference on electrical, electronics and computer engineering (UPCON), pp 1–5. https://doi.org/10.1109/UPCON.2018.8596905

  9. Shukla V, Chaturvedi A, Srivastava N (2017) Secure wireless communication protocol: to avoid vulnerabilities in shared authentication. Commun Appl Electron 7(6):4–7. https://doi.org/10.5120/cae2017652680

    Article  Google Scholar 

  10. Chaturvedi A, Srivastava N, Shukla V (2015) A secure wireless communication protocol using Diffie-Hellman key exchange. Int J Comput Appl 126(5):35–38. https://doi.org/10.5120/ijca2015906060

    Article  Google Scholar 

  11. Zheng Y, Li Z, Xu X, Zhao Q (2022) Dynamic defenses in cyber security: techniques, methods and challenges. Digit Commun Netw 8:422–435

    Article  Google Scholar 

  12. Almazrouei OSMBH, Magalingam P, Hasan MK, Shanmugam M (2023) A review on attack graph analysis for IoT vulnerability assessment: challenges, open issues, and future directions. IEEE Access 11:44350–44376. https://doi.org/10.1109/ACCESS.2023.3272053

    Article  Google Scholar 

  13. Saxena U, Sodhi JS, Singh Y (2020) A comprehensive approach for DDoS attack detection in smart home network using shortest path algorithm. In: Proceedings of 8th international conference on reliability, infocom technologies and optimization, trends future directions (ICRITO), pp 392–395

    Google Scholar 

  14. Sharma S, Singh Y, Anand P (2023) Time series-based IDS for detecting botnet attacks in IoT and embedded devices. In Singh Y, Verma C, Zoltán I, Chhabra JK, Singh PK (eds) Proceedings of international conference on recent innovations in computing. ICRIC 2022. Lecture notes in electrical engineering, vol 1011. Springer, Singapore. https://doi.org/10.1007/978-981-99-0601-7_27

  15. Kumari P, Jain AK (2023) A comprehensive study of DDoS attacks over IoT network and their countermeasures. ISSN 0167-4048. https://doi.org/10.1016/j.cose.2023.103096

  16. Majid A (2023) Security and privacy concerns over IoT devices attacks in smart cities (2022). J Comput Commun 11:26–42. https://doi.org/10.4236/jcc.2023.111003

    Article  Google Scholar 

  17. Kaur B, Dadkhah S, Shoeleh F, Neto EC, Xiong P, Iqbal S, Lamontagne P, Ray S, Ghorbani AA (2023) Internet of Things (IoT) security dataset evolution: challenges and future directions. ISSN 2542-6605. https://doi.org/10.1016/j.iot.2023.100780

  18. Hammi B, Zeadally S, Nebhen J (2023) Security threats, countermeasures, and challenges of digital supply chains. ACM Comput Surv. Just Accepted (2023). https://doi.org/10.1145/3588999

  19. Bellman C, van Oorschot PC (2023) Systematic analysis and comparison of security advice as datasets. ISSN 0167-4048. https://doi.org/10.1016/j.cose.2022.102989

  20. Shukla V, Mishra A, Agarwal S (2020) A new one time password generation method for financial transactions with randomness analysis. In: Innovations in electrical and electronic engineering (part of the lecture notes in electrical engineering book series (LNEE, vol 661), pp 713–720. https://doi.org/10.1007/978-981-15-4692-1_54

  21. Narwal B, Mohapatra AK (2021) A survey on security and authentication in wireless body area networks. J Syst Architect 113:101883

    Article  Google Scholar 

  22. Shukla V, Chaturvedi A, Misra MK (2021) On authentication schemes using polynomials over non commutative rings. Wirel Pers Commun 118(1):1–9. https://doi.org/10.1007/s11277-020-08008-4

    Article  Google Scholar 

  23. Narwal B, Mohapatra AK (2020) SEEMAKA: secured energy-efficient mutual authentication and key agreement scheme for wireless body area networks. Wirel Pers Commun 113(4):1985–2008

    Article  Google Scholar 

  24. Narwal B, Mohapatra AK (2021) SAMAKA: secure and anonymous mutual authentication and key agreement scheme for wireless body area networks. Arab J Sci Eng 46(9):9197–9219

    Article  Google Scholar 

  25. Sharma M, Narwal B, Anand R, Mohapatra AK, Yadav R (2023) PSECAS: a physical unclonable function based secure authentication scheme for Internet of Drones. Comput Electr Eng 108:108662

    Article  Google Scholar 

  26. Shukla V, Mishra A, Yadav A (2019) An authenticated and secure electronic health record system. In: IEEE international conference on information and communication technology, 2019, pp 1–5. https://doi.org/10.1109/CICT48419.2019.9066168

  27. Shukla V, Chaturvedi A (2018) Cryptocurrency: characteristics and future perspectives. 53(2):77–80. http://164.100.161.164/pdf/e-book/june-july-18.pdf#page=14

  28. Shukla V, Misra MK, Chaturvedi A (2022) Journey of cryptocurrency in India in view of financial budget 2022–23, Cornell University arxiv, 2022, pp 1–6. https://doi.org/10.48550/arXiv.2203.12606

  29. Zarpelão BB, Rodrigo SM, Cláudio TK, Sean CA (2017) A survey of intrusion detection in Internet of Things. J Netw Comput Appl 84:25–37

    Article  Google Scholar 

  30. Arshad J, Azad MA, Abdeltaif MM, Salah K (2020) An intrusion detection framework for energy-constrained IoT devices. Mech Syst Signal Process 136:106436

    Article  Google Scholar 

  31. Alghayadh F, Debnath D (2021) A hybrid intrusion detection system for smart home security based on machine learning and user behavior. Adv Internet Things 11(01):10–25. https://doi.org/10.4236/ait.2021.111002

    Article  Google Scholar 

  32. Albulayhi K, Abu Al-Haija Q, Alsuhibany SA, Jillepalli AA, Ashrafuzzaman M, Sheldon FT (2022) IoT intrusion detection using machine learning with a novel high performing feature selection method. Appl Sci 12:5015. https://doi.org/10.3390/app12105015

  33. Manimurugan S, Almutairi S, Aborokbah MM, Chilamkurti N, Ganesan S, Patan R (2020) Effective attack detection in the internet of medical things smart environment using a deep belief neural network. IEEE Access 8(1–1):77404

    Google Scholar 

  34. Kim J, Kim J, Kim H, Shim M, Choi E (2020) CNN-based network intrusion detection against denial-of-service attacks. Electronics 9:916. https://doi.org/10.3390/electronics9060919

    Article  Google Scholar 

  35. Illy P, Kaddoum G, Miranda C, Kaur K, Garg S (2019) Securing fog-to-things environment using intrusion detection system based on ensemble learning. IEEE Wirel Commun Netw Conf (WCNC). https://doi.org/10.1109/wcnc.2019.8885534

    Article  Google Scholar 

  36. Saheed YK, Abiodun AI, Misra S, Holone MK, Colomo-Palacios R (2022) A machine learning-based intrusion detection for detecting internet of things network attacks. Alex Eng J 61(12):9395–9409

    Article  Google Scholar 

  37. Guezzaz A, Azrour M, Benkirane S, Mohy-Eddine M, Attou H, Douiba M (2022) A lightweight hybrid intrusion detection framework using machine learning for edge-based IIoT security. Int Arab J Inf Technol 19(5)

    Google Scholar 

  38. Gaber T, El-Ghamry A, Hassanien AE (2022) Injection attack detection using machine learning for smart IoT applications. Physical Communication 52:101685

    Article  Google Scholar 

  39. Liu J, Kantarci B, Adams C (2020) Machine learning-driven intrusion detection for Contiki-NG-based IoT networks exposed to NSL-KDD dataset. In: Proceedings of the 2nd ACM workshop on wireless security and machine learning (WiseML ‘20). Association for Computing Machinery, New York, pp 25–30. https://doi.org/10.1145/3395352.3402621

  40. Rashid MM, Khan SU, Eusufzai F, Redwan MA, Sabuj SR, Elsharief M (2023) A federated learning-based approach for improving intrusion detection in industrial Internet of Things networks. Network 3(1):158–179

    Article  Google Scholar 

  41. Mendonça RV, Silva JC, Rosa RL, Saadi M, Rodriguez DZ, Farouk A (2022) A lightweight intelligent intrusion detection system for industrial internet of things using deep learning algorithms. Expert Syst 39(5):e12917

    Article  Google Scholar 

  42. Saba T, Rehman A, Sadad T, Kolivand H, Bahaj SA (2022) Anomaly-based intrusion detection system for IoT networks through deep learning model. Comput Electr Eng 99:107810

    Article  Google Scholar 

  43. Chaganti R, Suliman W, Ravi V, Dua A (2023) Deep learning approach for SDN-enabled intrusion detection system in IoT networks. Information 14(1):41. https://doi.org/10.3390/info14010041

    Article  Google Scholar 

  44. Edge-IIoTset Cyber Security Dataset of IoT and IIoT. Edge-IIoTset cyber security dataset of IoT & IIoT | Kaggle. https://www.kaggle.com/datasets/mohamedamineferrag/edgeiiotset-cyber-security-dataset-of-iot-iiot

  45. Davis JJ, Clark AJ (2011) Data preprocessing for anomaly based network intrusion detection: a review. Comput Secur 30(6–7):353–375

    Google Scholar 

  46. An Overview of Encoding Techniques. An overview of encoding techniques | Kaggle, www.kaggle.com/code/shahules/an-overview-of-encoding-techniques

  47. Dunne K, Cunningham P, Azuaje F (2002) Solutions to instability problems with sequential wrapper-based approaches to feature selection. Trinity College Dublin, Department of Computer Science

    Google Scholar 

  48. Gu Q, Li Z, Han J (2012) Generalized fisher score for feature selection. In: Proceedings of the 27th conference on uncertainty in artificial intelligence, UAI 2011

    Google Scholar 

  49. Myles AJ, Feudale RN, Liu Y, Woody NA, Brown SD (2004) An introduction to decision tree modeling. J Chemometr A J Chemometr Soc 18(6):275–285y

    Google Scholar 

  50. Biau G (2012) Analysis of a random forests model. J Mach Learn Res 13(1):1063–1095

    MathSciNet  Google Scholar 

  51. Pandian S (2022) A comprehensive guide on hyperparameter tuning and its techniques. Analytics Vidhya, 22 Feb. 2022. www.analyticsvidhya.com/blog/2022/02/a-comprehensive-guide-on-hyperparameter-tuning-and-its-techniques

  52. Sazli MH (2006) A brief review of feed-forward neural networks. Commun Fac Sci Univ Ankara Ser A2–A3 Phys Sci Eng 50(01)

    Google Scholar 

  53. Svozil D, Kvasnicka V, Pospichal J (1997) Introduction to multi-layer feed-forward neural networks. Chemom Intell Lab Syst 39(1):43–62

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deeksha Rajput .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rajput, D., Sharma, D.K., Gupta, M. (2024). Intrusion Detection in IoT Devices Using ML and DL Models with Fisher Score Feature Selection. In: Chaturvedi, A., Hasan, S.U., Roy, B.K., Tsaban, B. (eds) Cryptology and Network Security with Machine Learning. ICCNSML 2023. Lecture Notes in Networks and Systems, vol 918. Springer, Singapore. https://doi.org/10.1007/978-981-97-0641-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-0641-9_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-0640-2

  • Online ISBN: 978-981-97-0641-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics