Decision Tree with Pearson Correlation-based Recursive Feature Elimination Model for Attack Detection in IoT Environment

被引:13
|
作者
Padmashree, A. [1 ]
Krishnamoorthi, M. [2 ]
机构
[1] Bannari Amman Inst Technol, Dept Comp Sci & Business Syst, Sathyamangalam 638401, India
[2] Dr NGP Inst Technol, Dept Informat Technol, Coimbatore 641048, Tamil Nadu, India
来源
INFORMATION TECHNOLOGY AND CONTROL | 2022年 / 51卷 / 04期
关键词
Attack Detection; Internet of Things (IoT); Deep learning; Decision Tree; Recursive Feature Elimination; Deep neural network; BoT-IoT; INTRUSION DETECTION; NETWORKS;
D O I
10.5755/j01.itc.51.4.31818
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The industrial revolution in recent years made massive uses of Internet of Things (IoT) applications like smart cities' growth. This leads to automation in real-time applications to make human life easier. These IoT-enabled applications, technologies, and communications enhance the quality of life, quality of service, people's well-being, and operational efficiency. The efficiency of these smart devices may harm the end-users, misuse their sensitive information increase cyber-attacks and threats. This smart city expansion is difficult due to cyber attacks. Consequently, it is needed to develop an efficient system model that can protect IoT devices from attacks and threats. To enhance product safety and security, the IoT-enabled applications should be monitored in real-time. This paper proposed an efficient feature selection with a feature fusion technique for the detection of intruders in IoT. The input IoT data is subjected to preprocessing to enhance the data. From the preprocessed data, the higher-order statistical features are selected using the proposed Decision tree-based Pearson Correlation Recursive Feature Elimination (DT-PCRFE) model. This method efficiently eliminates the redundant and uncorrelated features which will increase resource utilization and reduces the time complexity of the system. Then, the request from IoT devices is converted into word embedding using the feature fusion model to enhance the system robustness. Finally, a Deep Neural network (DNN) has been used to detect malicious attacks with the selected features. This proposed model experiments with the BoT-IoT dataset and the result shows the proposed model efficiency which outperforms other existing models with the accuracy of 99.2%.
引用
收藏
页码:771 / 785
页数:15
相关论文
共 50 条
  • [1] A New Correlation Model of IoT Attack Based on Attack Tree
    Yu, Liu
    Chen, Kailiang
    Chang, Yue
    Chen, A.
    Yin, Qidi
    Zhang, Hangwei
    2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021, 2021, : 930 - 935
  • [2] An Intrusion Detection Method Based on Decision Tree-Recursive Feature Elimination in Ensemble Learning
    Lian, Wenjuan
    Nie, Guoqing
    Jia, Bin
    Shi, Dandan
    Fan, Qi
    Liang, Yongquan
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [3] Study on the Influencing Factors of Online Learning Effect Based on Decision Tree and Recursive Feature Elimination
    Chai, Yanmei
    Lei, Chenfang
    Yin, Chuantao
    2019 10TH INTERNATIONAL CONFERENCE ON E-EDUCATION, E-BUSINESS, E-MANAGEMENT AND E-LEARNING (IC4E 2019), 2019, : 52 - 57
  • [4] Linear Correlation-Based Feature Selection for Network Intrusion Detection Model
    Eid, Heba F.
    Hassanien, Aboul Ella
    Kim, Tai-hoon
    Banerjee, Soumya
    ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 240 - +
  • [5] Recursive Feature Elimination with Cross-Validation with Decision Tree: Feature Selection Method for Machine Learning-Based Intrusion Detection Systems
    Awad, Mohammed
    Fraihat, Salam
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2023, 12 (05)
  • [6] Pearson Correlation-Based Feature Selection for Document Classification Using Balanced Training
    Nasir, Inzamam Mashood
    Khan, Muhammad Attique
    Yasmin, Mussarat
    Shah, Jamal Hussain
    Gabryel, Marcin
    Scherer, Rafal
    Damasevicius, Robertas
    SENSORS, 2020, 20 (23) : 1 - 18
  • [7] A Similarity Attack to Correlation-based Public Watermarking Detection
    Yao, Xiaoming
    Du, Wencai
    Fu, Jundong
    THIRD INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING (MUE 2009), 2009, : 168 - +
  • [8] An anomaly-based intrusion detection system using recursive feature elimination technique for improved attack detection
    Kannari, Phanindra Reddy
    Chowdary, Noorullah Shariff
    Biradar, Rajkumar Laxmikanth
    THEORETICAL COMPUTER SCIENCE, 2022, 931 : 56 - 64
  • [9] An anomaly-based intrusion detection system using recursive feature elimination technique for improved attack detection
    Kannari, Phanindra Reddy
    Chowdary, Noorullah Shariff
    Laxmikanth Biradar, Rajkumar
    Theoretical Computer Science, 2022, 931 : 56 - 64
  • [10] Correlation-based feature selection for intrusion detection design
    Chou, Te-Shun
    Yen, Kang K.
    Luo, Jun
    Pissinou, Niki
    Makki, Kia
    2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 2300 - +