Wrapper Based Linear Discriminant Analysis (LDA) for Intrusion Detection in IIoT

被引:0
|
作者
Yasotha B. [1 ]
Sasikala T. [2 ]
Krishnamurthy M. [3 ]
机构
[1] Department of Computer Science and Engineering, MNM Jain Engineering College, Chennai
[2] Department of School of Computing, Sathyabama Institute of Science and Technology, Chennai
[3] Department of Computer Science and Engineering, KCG College of Technology, Chennai
来源
关键词
feature selection; IIoT; Intrusion detection; LDA; random forest (RF); support vector machine (SVM); wrapper;
D O I
10.32604/csse.2023.025669
中图分类号
学科分类号
摘要
The internet has become a part of every human life. Also, various devices that are connected through the internet are increasing. Nowadays, the Industrial Internet of things (IIoT) is an evolutionary technology interconnecting various industries in digital platforms to facilitate their development. Moreover, IIoT is being used in various industrial fields such as logistics, manufacturing, metals and mining, gas and oil, transportation, aviation, and energy utilities. It is mandatory that various industrial fields require highly reliable security and preventive measures against cyber-attacks. Intrusion detection is defined as the detection in the network of security threats targeting privacy information and sensitive data. Intrusion Detection Systems (IDS) have taken an important role in providing security in the field of computer networks. Prevention of intrusion is completely based on the detection functions of the IDS. When an IIoT network expands, it generates a huge volume of data that needs an IDS to detect intrusions and prevent network attacks. Many research works have been done for preventing network attacks. Every day, the challenges and risks associated with intrusion prevention are increasing while their solutions are not properly defined. In this regard, this paper proposes a training process and a wrapper-based feature selection With Direct Linear Discriminant Analysis LDA (WDLDA). The implemented WDLDA results in a rate of detection accuracy (DRA) of 97% and a false positive rate (FPR) of 11% using the Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD) dataset. © 2023 CRL Publishing. All rights reserved.
引用
收藏
页码:1625 / 1640
页数:15
相关论文
共 50 条
  • [21] Network intrusion detection: Evaluating cluster, discriminant, and logit analysis
    Katos, Vasilios
    INFORMATION SCIENCES, 2007, 177 (15) : 3060 - 3073
  • [22] An effective intrusion detection approach based on ensemble learning for IIoT edge computing
    Mohy-Eddine, Mouaad
    Guezzaz, Azidine
    Benkirane, Said
    Azrour, Mourade
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023, 19 (04) : 469 - 481
  • [23] A wrapper-based feature selection for improving performance of intrusion detection systems
    Samadi Bonab, Maryam
    Ghaffari, Ali
    Soleimanian Gharehchopogh, Farhad
    Alemi, Payam
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (12)
  • [24] Topic Reconstruction: A Novel Method Based on LDA Oriented to Intrusion Detection
    Lei, Shengwei
    Xia, Chunhe
    Wang, Tianbo
    Wang, Shizhao
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING (ICA3PP 2019), PT I, 2020, 11944 : 578 - 594
  • [25] A Bayesian Classification Intrusion Detection Method Based on the Fusion of PCA and LDA
    Shen, Zhidong
    Zhang, Yuhao
    Chen, Weiying
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [26] Intrusion Detection for WSN Based on Kernel Fisher Discriminant and SVM
    Hu, Zhipeng
    Zhang, Jing
    Wang, Xu An
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 2017, 1 : 197 - 208
  • [27] An effective intrusion detection approach based on ensemble learning for IIoT edge computing
    Mouaad Mohy-eddine
    Azidine Guezzaz
    Said Benkirane
    Mourade Azrour
    Journal of Computer Virology and Hacking Techniques, 2023, 19 : 469 - 481
  • [28] GPT and Interpolation-Based Data Augmentation for Multiclass Intrusion Detection in IIoT
    Melicias, Francisco S.
    Ribeiro, Tiago F. R.
    Rabadao, Carlos
    Santos, Leonel
    Costa, Rogerio Luis De C.
    IEEE ACCESS, 2024, 12 : 17945 - 17965
  • [29] Transmissibility-based damage detection using linear discriminant analysis
    Zhou, Y. L.
    Figueiredo, E.
    Maia, N.
    Sampaio, R.
    Perera, R.
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON NOISE AND VIBRATION ENGINEERING (ISMA2014) AND INTERNATIONAL CONFERENCE ON UNCERTAINTY IN STRUCTURAL DYNAMICS (USD2014), 2014, : 527 - 535
  • [30] Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models
    Casajus-Setien, Jorge
    Bielza, Concha
    Larranaga, Pedro
    2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, : 72 - 77