Realtime Feature Engineering for Anomaly Detection in IoT Based MQTT Networks

被引:0
|
作者
Imran [2 ]
Zuhairi, Megat F. [1 ]
Ali, Syed Mubashir [1 ,3 ]
Shahid, Zeeshan [4 ]
Alam, Muhammad Mansoor [1 ,5 ,6 ,7 ]
Su'ud, Mazliham Mohd [7 ]
机构
[1] Univ Kuala Lumpur, Malaysian Inst Informat Technol, Kuala Lumpur 50250, Malaysia
[2] DHA Suffa Univ DSU, Dept Comp Sci, Karachi 75500, Sindh, Pakistan
[3] Muhammad Ali Jinnah Univ, Fac Comp, Dept Software Engn, Karachi 75400, Pakistan
[4] Nazeer Hussain Univ, Fac Engn Pract & Sci, Elect Engn Dept, Karachi 75950, Pakistan
[5] Riphah Int Univ, Fac Comp, Islamabad 46000, Pakistan
[6] Univ Technol Sydney, Fac Engn & Informat Technol, Sch Comp Sci, Ultimo, NSW 2007, Australia
[7] Multimedia Univ, Fac Comp & Informat, Cyberjaya 63100, Malaysia
关键词
IoT; DoS; anomaly detection; MQTT; INTERNET;
D O I
10.1109/ACCESS.2024.3363889
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The MQTTset dataset has been extensively investigated for enhancing anomaly detection in IoT-based systems, with a focus on identifying Denial of Service (DoS) attacks. The research addresses a critical gap in MQTT traffic anomaly detection by proposing the incorporation of the 'source' attribute from PCAP files and utilizing hand-crafted feature engineering techniques. Various filtering methods, including data conversion, attribute filtering, handling missing values, and scaling, are employed. Anomalies are categorized and prioritized based on frequency of occurrence, with a specific emphasis on DoS attacks. The study compares the performance of the decision tree and its eight variant models (ID3, C4.5, Random Forest, CatBoost, LightGBM, XGBoost, CART, and Gradient Boosting) for anomaly detection in IoT-based systems. Evaluation metrics such as prediction accuracy, F1 score, and computational times (training and testing) are utilized. Hyperparameter fine-tuning techniques like grid search and random search are applied to enhance model performance, accuracy, and reduce computational costs. Results indicate that the benchmark Decision Tree model achieved 92.57% accuracy and a 92.38% F1 score with training and testing times of 2.95 seconds and 0.86 seconds, respectively. The Feature Engineering (Modified) dataset demonstrated a substantial improvement, reaching 98.56% accuracy and a 98.50% F1 score, with comparable training and testing times of 0.70 seconds and 0.02 seconds. Furthermore, the Modified Decision Tree Algorithm significantly improved accuracy to 99.27%, F1 score to 99.26%, and reduced training time to 0.73 seconds and testing time to 0.14 seconds. The research contributes valuable insights into feature engineering and guides the selection of effective approaches for anomaly detection in IoT-based systems, providing early threat warnings and enhancing overall system security and reliability.
引用
收藏
页码:25700 / 25718
页数:19
相关论文
共 50 条
  • [21] Machine Learning Approaches for Anomaly Detection in IoT Networks
    Kumar, Gotte Ranjith
    Kulkarni, Anagha Deepak
    Kumar, B. Santhosh
    Singh, Navdeep
    Revathi, V
    Kumar, T. Ch. Anil
    2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,
  • [22] An Anomaly Detection Approach for Realtime Identification Systems Based on Centroids
    Michelena, Alvaro
    Zayas-Gato, Francisco
    Jove, Esteban
    Casteleiro-Roca, Jose-Luis
    Quintian, Hector
    Fontenla-Romero, Oscar
    Calvo-Rolle, Jose Luis
    INTERNATIONAL JOINT CONFERENCE 15TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS (CISIS 2022) 13TH INTERNATIONAL CONFERENCE ON EUROPEAN TRANSNATIONAL EDUCATION (ICEUTE 2022), 2023, 532 : 40 - 51
  • [23] A Toolbox for Realtime Timeseries Anomaly Detection
    Boebel, Markus
    Gerostathopoulos, Ilias
    Bures, Tomas
    2020 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE COMPANION (ICSA-C 2020), 2020, : 278 - 281
  • [24] DoS/DDoS-MQTT-IoT: A dataset for evaluating intrusions in IoT networks using the MQTT protocol
    Alatram, Alaa
    Sikos, Leslie F.
    Johnstone, Mike
    Szewczyk, Patryk
    Kang, James Jin
    COMPUTER NETWORKS, 2023, 231
  • [25] Feature-based anomaly detection
    Carlotto, Mark J.
    SIGNAL PROCESSING, SENSOR FUSION, AND TARGET RECOGNITION XVI, 2007, 6567
  • [26] Image Anomaly Detection Based on Adaptive Iteration and Feature Extraction in Edge-Cloud IoT
    Zhang, Weiwei
    Tang, Xinhua
    Zhang, Jiwei
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [27] Fast, Lightweight IoT Anomaly Detection Using Feature Pruning and PCA
    Carter, John
    Mancoridis, Spiros
    Galinkin, Erick
    37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2022, : 133 - 138
  • [28] Feature extraction for machine learning-based intrusion detection in IoT networks
    Sarhan, Mohanad
    Layeghy, Siamak
    Moustafa, Nour
    Gallagher, Marcus
    Portmann, Marius
    DIGITAL COMMUNICATIONS AND NETWORKS, 2024, 10 (01) : 205 - 216
  • [29] Feature extraction for machine learning-based intrusion detection in IoT networks
    Mohanad Sarhan
    Siamak Layeghy
    Nour Moustafa
    Marcus Gallagher
    Marius Portmann
    Digital Communications and Networks, 2024, 10 (01) : 205 - 216