Wrapper Based Linear Discriminant Analysis (LDA) for Intrusion Detection in IIoT

被引:0
|
作者
Yasotha B. [1 ]
Sasikala T. [2 ]
Krishnamurthy M. [3 ]
机构
[1] Department of Computer Science and Engineering, MNM Jain Engineering College, Chennai
[2] Department of School of Computing, Sathyabama Institute of Science and Technology, Chennai
[3] Department of Computer Science and Engineering, KCG College of Technology, Chennai
来源
关键词
feature selection; IIoT; Intrusion detection; LDA; random forest (RF); support vector machine (SVM); wrapper;
D O I
10.32604/csse.2023.025669
中图分类号
学科分类号
摘要
The internet has become a part of every human life. Also, various devices that are connected through the internet are increasing. Nowadays, the Industrial Internet of things (IIoT) is an evolutionary technology interconnecting various industries in digital platforms to facilitate their development. Moreover, IIoT is being used in various industrial fields such as logistics, manufacturing, metals and mining, gas and oil, transportation, aviation, and energy utilities. It is mandatory that various industrial fields require highly reliable security and preventive measures against cyber-attacks. Intrusion detection is defined as the detection in the network of security threats targeting privacy information and sensitive data. Intrusion Detection Systems (IDS) have taken an important role in providing security in the field of computer networks. Prevention of intrusion is completely based on the detection functions of the IDS. When an IIoT network expands, it generates a huge volume of data that needs an IDS to detect intrusions and prevent network attacks. Many research works have been done for preventing network attacks. Every day, the challenges and risks associated with intrusion prevention are increasing while their solutions are not properly defined. In this regard, this paper proposes a training process and a wrapper-based feature selection With Direct Linear Discriminant Analysis LDA (WDLDA). The implemented WDLDA results in a rate of detection accuracy (DRA) of 97% and a false positive rate (FPR) of 11% using the Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD) dataset. © 2023 CRL Publishing. All rights reserved.
引用
收藏
页码:1625 / 1640
页数:15
相关论文
共 50 条
  • [1] A new intrusion detection method based on discriminant analysis
    Asaka, M
    Onabuta, T
    Inoue, T
    Okazawa, S
    Goto, S
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2001, E84D (05) : 570 - 577
  • [2] Intrusion Detection Systems using Linear Discriminant Analysis and Logistic Regression
    Subba, Basant
    Biswas, Santosh
    Karmakar, Sushanta
    2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [3] Discrimination of Adulteration Orange Juice by Linear Discriminant Analysis (LDA)
    Das, Siuli
    Nandeshwar, Vikas J.
    Phadke, Gargi S.
    2015 IEEE INTERNATIONAL WIE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (WIECON-ECE), 2015, : 39 - 42
  • [4] Network Intrusion Detection System based on Direct LDA
    Saad, Alaoui-Adib
    Khalid, Chougdali
    Mohamed, Jedra
    PROCEEDINGS OF 2015 THIRD IEEE WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS), 2015,
  • [5] Recognition of Objects by Grasping Force Using Linear Discriminant Analysis(LDA)
    Nabilah, H. E.
    Wan, Khairunizam
    Talha, Kamil S.
    Ali, M. Hazwan
    Shahriman, A. B.
    Razlan, Zuradzman M.
    Hazry, D.
    PROCEEDINGS 5TH IEEE INTERNATIONAL CONFERENCE ON CONTROL SYSTEM, COMPUTING AND ENGINEERING (ICCSCE 2015), 2015, : 254 - 259
  • [6] 3E-LDA: Three Enhancements to Linear Discriminant Analysis
    Li, Yanni
    Liu, Bing
    Yu, Yongbo
    Li, Hui
    Sun, Jiacan
    Cui, Jiangtao
    ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2021, 15 (04)
  • [7] Management of Intrusion Detection Systems based-KDD99: Analysis with LDA and PCA
    Ibrahimi, Khalil
    Ouaddane, Mostafa
    2017 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2017, : 163 - 168
  • [8] An Advanced Intrusion Detection System for IIoT Based on GA and Tree Based Algorithms
    Kasongo, Sydney Mambwe
    IEEE ACCESS, 2021, 9 : 113199 - 113212
  • [9] An intrusion detection scheme based on the ensemble of discriminant classifiers
    Bhati, Bhoopesh Singh
    Rai, C. S.
    Balamurugan, B.
    Al-Turjman, Fadi
    COMPUTERS & ELECTRICAL ENGINEERING, 2020, 86
  • [10] An effective network intrusion detection based on truncated mean LDA
    Elkhadir, Zyad
    Chougdali, Khalid
    Benattou, Mohammed
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON ELECTRICAL AND INFORMATION TECHNOLOGIES (ICEIT 2017), 2017,