A Binary Bee Foraging Algorithm-Based Feature Selection Approach for IoT Intrusion Detection

被引:1
|
作者
Lv, Zhengnan [1 ]
Guo, Hongzhi [2 ]
Hu, Jing [1 ]
Zhang, Zhicheng [3 ]
Wu, Zhiyang [3 ]
机构
[1] China Elect Technol TAIJI Grp Corp Ltd, Beijing 100083, Peoples R China
[2] Beijing Acad Sci & Technol, Inst Urban Safety & Environm Sci, Beijing 100054, Peoples R China
[3] Beijing Univ Posts & Telecommun, Sch Artificial Intelligence, Beijing 100876, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 05期
关键词
Feature extraction; Transfer functions; Heuristic algorithms; Classification algorithms; Internet of Things; Metaheuristics; Machine learning algorithms; Bee foraging algorithm (BFA); binary optimization; feature selection; Internet of Thing (IoT); intrusion detection; FEATURE SUBSET-SELECTION; OPTIMIZATION;
D O I
10.1109/JIOT.2023.3317089
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection system (IDS) is a security solution to detect the anomalies of the Internet of Thing (IoT) network and raise alerts. Feature selection is one of the essential preprocess steps to build an efficient intelligent intrusion detection system (IDS), which is helpful to reduce the number of features (NF) that are used to classify attacks. The meta-heuristic algorithm-based approaches has been widely used to solve feature selection problems in the past few years. However, as the data dimension increases, the dramatically expanded search space challenges the optimization algorithms, including the recently proposed bee foraging algorithm (BFA). In this article, a binary variant of BFA (BBFA) is presented to binarize BFA. BBFA utilizes three diverse mechanisms to update the position of three different types of bees, which helps to promote the evolutionary efficiency. First, a Sigmoidal transfer function is utilized to update the positions of scout bees. Second, a V-shaped transfer function is applied to binarize the positions of forager bees. Third, a binary update strategy is proposed to make the onlooker bees efficiently search the space. The performance is evaluated using 22 well-known public machine learning data sets to compare the proposed approach with several similar variants of meta-heuristic algorithms of the literature in terms of fitness function values, classification accuracy, number of selected features, computational cost, and convergence properties. The results show that the proposed approach is able to find the subsets with high classification accuracy and few NF while also requiring less computational load.
引用
收藏
页码:7604 / 7618
页数:15
相关论文
共 50 条
  • [31] A Genetic Algorithm-based Solution for Intrusion Detection
    Bankovic, Zorana
    Moya, Jose M.
    Araujo, Alvaro
    Bojanic, Slobodan
    Nieto-Taladriz, Octavio
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (03): : 192 - 199
  • [32] Multiclass Intrusion Detection in IoT Using Boosting and Feature Selection
    Hamdouchi, Abderrahmane
    Idri, Ali
    GOOD PRACTICES AND NEW PERSPECTIVES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 3, WORLDCIST 2024, 2024, 987 : 128 - 137
  • [33] Feature selection for intrusion detection based on an improved rime optimization algorithm
    Peng, Qingyuan
    Wang, Xiaofeng
    Tang, Ao
    MCB Molecular and Cellular Biomechanics, 2024, 21 (03):
  • [34] A Filter Feature Selection Algorithm Based on Mutual Information for Intrusion Detection
    Zhao, Fei
    Zhao, Jiyong
    Niu, Xinxin
    Luo, Shoushan
    Xin, Yang
    APPLIED SCIENCES-BASEL, 2018, 8 (09):
  • [35] A Feature Selection Approach for Network Intrusion Detection
    Khor, Kok-Chin
    Ting, Choo-Yee
    Amnuaisuk, Somnuk-Phon
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 133 - 137
  • [36] An Intrusion Detection Mothod based on Feature Selection and Binary Classification Grouped Learning
    Gao, Xueqin
    Wang, Tao
    Wu, Qian
    Wu, Jiehu
    2022 IEEE 6TH ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2022, : 1723 - 1730
  • [37] A Genetic Algorithm-Based Approach for Fluctuating QoS Aware Selection of IoT Services
    Khadir, Karima
    Guermouche, Nawal
    Guittoum, Amal
    Monteil, Thierry
    IEEE ACCESS, 2022, 10 : 17946 - 17965
  • [38] Network Intrusion Detection System Based on the Combination of Multiobjective Particle Swarm Algorithm-Based Feature Selection and Fast-Learning Network
    Einy, Sajad
    Oz, Cemil
    Navaei, Yahya Dorostkar
    Wireless Communications and Mobile Computing, 2021, 2021
  • [39] Network Intrusion Detection System Based on the Combination of Multiobjective Particle Swarm Algorithm-Based Feature Selection and Fast-Learning Network
    Einy, Sajad
    Oz, Cemil
    Navaei, Yahya Dorostkar
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [40] Genetic Algorithm based Feature Selection Algorithm for Effective Intrusion Detection in Cloud Networks
    Kannan, Anand
    Maguire, Gerald Q.
    Sharma, Ayush
    Schoo, Peter
    12TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2012), 2012, : 416 - 423