A Machine Learning Approach for Detecting DDOS Attack in IoT Network Using Random Forest Classifier

Authors

  • P. Elamparithi Assistant Professor, Department of Computer Science and Engineering, AAA College of Engineering and Technology, Sivakasi 626005, Tamil Nadu, India.
  • S. Kalaivani Assistant Professor, Department of Computer Applications, B.S.Abdur Rahman Crescent Institute of science and Technology, Vandalur, Tamil Nadu 600048,India.
  • S. Vijayalakshmi Professor, Department of Electronics and Communication Engineering, R.M.K. Engineering College , Kavaraipettai, Tamil Nadu 601206, India.
  • E. Keerthika Assistant Professor, Department of Biomedical Engineering, P. S. R Engineering College, Sevalpatti, Sivakasi-626140, Tamil Nadu,India
  • S. Koteswari Department of Electronics and Communication Engineering, Pragati Engineering College, Surampalem, East Godavari District, Andhra Pradesh, India
  • R. Sathesh Raaj Assistant Professor, Department of Electronics and Communication Engineering, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Chennai, 600062, India

Keywords:

Machine Learning, Internet of Things (IoT), Classification, Security, Accuracy

Abstract

The Internet of Things (IoT) has seen noteworthy growth and advancement in the last ten years, offering innovative keys to address social and industrial challenges. However, ensuring the safety of IoT devices has become a crucial concern because of their vulnerability to cyberattacks, which poses serious hazards and result in serious harm. Although researchers have made strides in this direction, Multiview feature integration and extensive semantic relationship capturing still need to be completed beyond the purview of existing work. Therefore, these methods may be more secure and better at identifying various threats in actual time. This study proposes a new technique using the Random Forest classifier to overcome these obstacles. By harnessing the potential of ensemble learning, this approach combines numerous decision trees to provide accurate and speedy predictions for the rapid and precise identification of threats in IoT networks. UDP-FLOOD, Smurf, HTTP-FLOOD, and SIDDOS are only some network assaults included in the collection. When applied to network traffic data, the Random Forest classifier is a powerful addition to more traditional machine learning-based categorization methods. The proposed Random Forest classifier enhances intrusion detection efficacy and shortens training time, indicating an enhanced solution for improving the network security in IoTs.

Downloads

Download data is not yet available.

References

L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: A survey," Computer Networks 54, no. 15 (2010): 2787-2805.

Faruqui, N.; Yousuf, M.A.; Whaiduzzaman, M.; Azad, A.; Barros, A.; Moni, M.A. LungNet: A hybrid deep-CNN model for lung cancer diagnosis using CT and wearable sensor-based medical IoT data. Comput. Biol. Med. 2021, 139, 104961. [CrossRef]

Wójcicki, K.; Biega ´nska, M.; Paliwoda, B.; Górna, J. Internet of Things in Industry: Research Profiling, Application, Challenges and Opportunities—A Review. Energies 2022, 15, 1806. [CrossRef]

Hasan, M.K.; Akhtaruzzaman, M.; Kabir, S.R.; Gadekallu, T.R.; Islam, S.; Magalingam, P.; Hassan, R.; Alazab, M.; Alazab, M.A. Evolution of industry and blockchain era: Monitoring price hike and corruption using BIoT for smart government and industry 4.0. IEEE Trans. Ind. Inform. 2022, 18, 9153–9161. [CrossRef]

Soldatos, J.; Gusmeroli, S.; Malo, P.; Di Orio, G. Internet of Things applications in future manufacturing. In Digitising the Industry Internet of Things Connecting the Physical, Digital and Virtual Worlds; River Publishers: Delft, The Netherlands, 2022; pp. 153–183.

Sharma, R.; Arya, R. Security threats and measures in the Internet of Things for smart city infrastructure: A state of the art. Trans. Emerg. Telecommun. Technol. 2022, 1, e4571. [CrossRef]

Balaji, R.; Deepajothi, S.; Prabaharan, G.; Daniya, T.; Karthikeyan, P.; Velliangiri, S. Survey on Intrusions Detection System using Deep learning in IoT Environment. In Proceedings of the 2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS), Erode, India, 7–9 April 2022; IEEE: Manhattan, NY, USA; pp. 195–199.

Alsamiri, J.; Khalid, A. Internet of Things cyber-attacks detection using machine learning. Int. J. Adv. Comput. Sci. Appl. 2019, 10, 627–634. [CrossRef]

S. Ramakrishnan1 and S. Devaraju, “Attack’s Feature Selection-Based Network Intrusion Detection System Using Fuzzy Control Language,” Taiwan Fuzzy Systems Association and Springer-Verlag Berlin Heidelberg (2016).

P. Wu, N. Moustafa, S. Yang, and H. Guo, "Densely Connected Residual Network for Attack Recognition," IEEE 19th International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom) (2020).

S. Latif, Z. Idrees, Z. Zou, and J. Ahmad. Drain, “A deep random neural network model for intrusion detection in industrial IoT," International Conference on UK-China Emerging Technologies (UCET) IEEE (2020).

P. Kumar, G. P. Gupta, and R. Tripathi, “An ensemble learning and fogcloud architecture-driven cyber-attack detection framework for IoMT networks,” Computer Communications (2021).

Roopak, M.; Tian, G.Y.; Chambers, J. An intrusion detection system against DDoS attacks in IoT networks. In Proceedings of the 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 6–8 January 2020; IEEE: Manhattan, NY, USA; pp. 562–567.

Hanif, S.; Ilyas, T.; Zeeshan, M. Intrusion detection in IoT using artificial neural networks on UNSW-15 dataset. In Proceedings of the 2019 IEEE 16th International Conference on Smart Cities: Improving Quality of Life Using ICT & IoT and AI (HONET-ICT), Charlotte, NC, USA, 6–9 October 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 152–156.

Prathyusha, D.J.; Kannayaram, G. A Cognitive Mechanism for Mitigating DDoS Attacks Using the Artificial Immune System in a Cloud Environment. Evol. Intell. 2021, 14, 607–618. [CrossRef]

Gurung, S.; Chauhan, S. A dynamic threshold-based approach for mitigating black hole attack in MANET. Wirel. Netw. 2017, 24, 2957–2971. [CrossRef]

Shareena, J.; Ramdas, A. APH Intrusion detection system for IoT botnet attacks using deep learning. SN Comput. Sci. 2021, 2, 205.

Alghanam, O.A.; Almobaideen, W.; Saadeh, M.; Adwan, O. An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning. Expert Syst. Appl. 2023, 213, 118745. [CrossRef]

20. Syed, N.F.; Ge, M.; Baig, Z. Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks. Comput. Netw. 2023, 225, 109662. [CrossRef]

Le, T.T.; Kim, H.; Kang, H.; Kim, H. Classification and explanation for intrusion detection system based on ensemble trees and SHAP method. Sensors 2022, 22, 1154. [CrossRef]

Hemanand, D., Reddy, G. ., Babu, S. S. ., Balmuri, K. R. ., Chitra, T., & Gopalakrishnan, S. (2022). An Intelligent Intrusion Detection and Classification System using CSGO-LSVM Model for Wireless Sensor Networks (WSNs). International Journal of Intelligent Systems and Applications in Engineering, 10(3), 285–293.

P. Satyanarayana, U. D. Yalavarthi, Y. S. S. Sriramam, M. Arun, V. G. Krishnan and S. Gopalakrishnan, "Implementation of Enhanced Energy Aware Clustering Based Routing (EEACBR)Algorithm to Improve Network Lifetime in WSN’s," 2022 IEEE 2nd International Conference on Mobile Networks and Wireless Communications (ICMNWC), Tumkur, Karnataka, India, 2022, pp. 1-6,

Yaseen, M., Hayder Sabah Salih, Mohammad Aljanabi, Ahmed Hussein Ali, & Saad Abas Abed. (2023). Improving Process Efficiency in Iraqi universities: a proposed management information system. Iraqi Journal For Computer Science and Mathematics, 4(1), 211–219. https://doi.org/10.52866/ijcsm.2023.01.01.0020

Aljanabi, M. ., & Sahar Yousif Mohammed. (2023). Metaverse: open possibilities. Iraqi Journal For Computer Science and Mathematics, 4(3), 79–86. https://doi.org/10.52866/ijcsm.2023.02.03.007

Atheel Sabih Shaker, Omar F. Youssif, Mohammad Aljanabi, ABBOOD, Z., & Mahdi S. Mahdi. (2023). SEEK Mobility Adaptive Protocol Destination Seeker Media Access Control Protocol for Mobile WSNs. Iraqi Journal For Computer Science and Mathematics, 4(1), 130–145. https://doi.org/10.52866/ijcsm.2023.01.01.0011

Hayder Sabah Salih, Mohanad Ghazi, & Aljanabi, M. . (2023). Implementing an Automated Inventory Management System for Small and Medium-sized Enterprises. Iraqi Journal For Computer Science and Mathematics, 4(2), 238–244. https://doi.org/10.52866/ijcsm.2023.02.02.021

Perumal, G., Subburayalu, G., Abbas, Q., Naqi, S. M., & Qureshi, I. (2023). VBQ-Net: A Novel Vectorization-Based Boost Quantized Network Model for Maximizing the Security Level of IoT System to Prevent Intrusions. Systems, 11(8), 436. MDPI AG. Retrieved from http://dx.doi.org/10.3390/systems11080436

Satyanarayana, P., Diwakar, G., Subbayamma, B. V., Phani Sai Kumar, N. V., Arun, M., & Gopalakrishnan, S. (2023). Comparative analysis of new meta-heuristic-variants for privacy preservation in wireless mobile adhoc networks for IoT applications. Computer Communications, 198, 262–281. https://doi.org/10.1016/j.comcom.2022.12.006

Gopalakrishnan Subburayalu, Hemanand Duraivelu, Arun Prasath Raveendran, Rajesh Arunachalam, Deepika Kongara & Chitra Thangavel (2023) Cluster Based Malicious Node Detection System for Mobile Ad-Hoc Network Using ANFIS Classifier, Journal of Applied Security Research, 18:3, 402-420, DOI: 10.1080/19361610.2021.2002118

Yadav, R. ., & Singh, R. . (2023). A Hyper-parameter Tuning based Novel Model for Prediction of Software Maintainability. International Journal on Recent and Innovation Trends in Computing and Communication, 11(2), 106–113. https://doi.org/10.17762/ijritcc.v11i2.6134

Hiroshi Yamamoto, An Ensemble Learning Approach for Credit Risk Assessment in Banking , Machine Learning Applications Conference Proceedings, Vol 1 2021.

Anand, R., Ahamad, S., Veeraiah, V., Janardan, S.K., Dhabliya, D., Sindhwani, N., Gupta, A. Optimizing 6G wireless network security for effective communication (2023) Innovative Smart Materials Used in Wireless Communication Technology, pp. 1-20.

Downloads

Published

27.10.2023

How to Cite

Elamparithi, P. ., Kalaivani, S. ., Vijayalakshmi, S. ., Keerthika, E. ., Koteswari, S. ., & Raaj, R. S. . (2023). A Machine Learning Approach for Detecting DDOS Attack in IoT Network Using Random Forest Classifier. International Journal of Intelligent Systems and Applications in Engineering, 12(2s), 495–502. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3649

Issue

Section

Research Article