A Parallel Rank Based Multi-Class Ensemble Classification Framework on ISOT Cyber Threat Detection

Authors

  • Lakshmi Prasanna B. Research Scholar, Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Hyderabad, Telangana, India Assistant Professor, Department of IT, AnuragUniversity, Hyderabad, Telangana, India.
  • M. Saidi Reddy Associate Professor, Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Hyderabad, Telangana, India.

Keywords:

Multi-class classification, data filtering, outlier detection, cyber-attack detection

Abstract

A group of internet-connected compromised devices forming a network is called a Botnet. This network can consist of personal computers, servers, IoT devices, and mobile devices. Botnets are one of the most common network security threats, used for malicious activities such as data theft, spamming, collecting personal information from users, and launching Distributed Denial of Service (DDoS) attacks. The growing popularity of IoT and mobile devices has made them an attractive target for attackers, as they often have unpatched security vulnerabilities. In today's world, computer networks play a crucial role in the information and communication technology era, connecting heterogeneous devices for data communication and sharing. However, the large number of Internet-connected devices makes them vulnerable to massive security attacks. Most widely-used IoT devices lack security design, making them vulnerable to recent attacks that exploit these weaknesses and recruit the devices to cause severe harm. Parallel multi-class classification refers to the process of performing classification tasks simultaneously on multiple classes or categories of data using parallel computing techniques. In traditional multi-class classification, a model is trained to classify data into one of several mutually exclusive classes. However, in some scenarios, it may be advantageous to perform these classifications in parallel, especially when dealing with a large number of classes or when speed and efficiency are crucial. Parallel multi-class classification can be implemented using parallel processing or distributed computing frameworks to train and evaluate multiple classifiers concurrently.

Downloads

Download data is not yet available.

References

M. Elsisi, M. Amer, A. Dababat, and C.-L. Su, “A comprehensive review of machine learning and IoT solutions for demand side energy management, conservation, and resilient operation,” Energy, vol. 281, p. 128256, Oct. 2023, doi: 10.1016/j.energy.2023.128256.

C. Alex, G. Creado, W. Almobaideen, O. A. Alghanam, and M. Saadeh, “A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification and Machine Learning Mechanisms,” Computers & Security, vol. 132, p. 103283, Sep. 2023, doi: 10.1016/j.cose.2023.103283.

I. A. Adeleke, N. I. Nwulu, and O. A. Ogbolumani, “A hybrid machine learning and embedded IoT-based water quality monitoring system,” Internet of Things, vol. 22, p. 100774, Jul. 2023, doi: 10.1016/j.iot.2023.100774.

M. E. Elaraby, A. A. Ewees, and A. M. Anter, “A robust IoT-based cloud model for COVID-19 prediction using advanced machine learning technique,” Biomedical Signal Processing and Control, vol. 87, p. 105542, Jan. 2024, doi: 10.1016/j.bspc.2023.105542.

R. Lazzarini, H. Tianfield, and V. Charissis, “A stacking ensemble of deep learning models for IoT intrusion detection,” Knowledge-Based Systems, vol. 279, p. 110941, Nov. 2023, doi: 10.1016/j.knosys.2023.110941.

F. Aloraini, A. Javed, O. Rana, and P. Burnap, “Adversarial machine learning in IoT from an insider point of view,” Journal of Information Security and Applications, vol. 70, p. 103341, Nov. 2022, doi: 10.1016/j.jisa.2022.103341.

Md. A. Ahmed, Md. S. Hossain, W. Rahman, A. H. Uddin, and Md. T. Islam, “An advanced Bangladeshi local fish classification system based on the combination of deep learning and the internet of things (IoT),” Journal of Agriculture and Food Research, vol. 14, p. 100663, Dec. 2023, doi: 10.1016/j.jafr.2023.100663.

D. Tiwari, B. S. Bhati, B. Nagpal, S. Sankhwar, and F. Al-Turjman, “An enhanced intelligent model: To protect marine IoT sensor environment using ensemble machine learning approach,” Ocean Engineering, vol. 242, p. 110180, Dec. 2021, doi: 10.1016/j.oceaneng.2021.110180.

S. Hamdan, S. Almajali, M. Ayyash, H. Bany Salameh, and Y. Jararweh, “An intelligent edge-enabled distributed multi-task learning architecture for large-scale IoT-based cyber–physical systems,” Simulation Modelling Practice and Theory, vol. 122, p. 102685, Jan. 2023, doi: 10.1016/j.simpat.2022.102685.

Y. Cao, Z. Wang, H. Ding, J. Zhang, and B. Li, “An intrusion detection system based on stacked ensemble learning for IoT network,” Computers and Electrical Engineering, vol. 110, p. 108836, Sep. 2023, doi: 10.1016/j.compeleceng.2023.108836.

H. Huang, L. Zhao, and Y. Wu, “An IoT and machine learning enhanced framework for real-time digital human modeling and motion simulation,” Computer Communications, Sep. 2023, doi: 10.1016/j.comcom.2023.09.024.

B. Sharma, L. Sharma, C. Lal, and S. Roy, “Anomaly based network intrusion detection for IoT attacks using deep learning technique,” Computers and Electrical Engineering, vol. 107, p. 108626, Apr. 2023, doi: 10.1016/j.compeleceng.2023.108626.

S. Kaddoura, A. El Arid, and A. Al-Dulaimy, “Chapter 2 - Supervised machine learning techniques to protect IoT healthcare environment against cyberattacks,” in Intelligent Edge Computing for Cyber Physical Applications, D. J. Hemanth, B. B. Gupta, M. Elhoseny, and S. V. Shinde, Eds., in Intelligent Data-Centric Systems. , Academic Press, 2023, pp. 17–34. doi: 10.1016/B978-0-323-99412-5.00001-0.

S. Kakandwar, B. Bhushan, and A. Kumar, “Chapter 3 - Integrated machine learning techniques for preserving privacy in Internet of Things (IoT) systems,” in Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems, B. Bhushan, S. K. Sharma, M. Saračević, and A. Boulmakoul, Eds., in Cognitive Data Science in Sustainable Computing. , Academic Press, 2023, pp. 45–75. doi: 10.1016/B978-0-323-99199-5.00012-4.

R. K. Muna, M. I. Hossain, Md. G. R. Alam, M. M. Hassan, M. Ianni, and G. Fortino, “Demystifying machine learning models of massive IoT attack detection with Explainable AI for sustainable and secure future smart cities,” Internet of Things, vol. 24, p. 100919, Dec. 2023, doi: 10.1016/j.iot.2023.100919.

A. Alatram, L. F. Sikos, M. Johnstone, P. Szewczyk, and J. J. Kang, “DoS/DDoS-MQTT-IoT: A dataset for evaluating intrusions in IoT networks using the MQTT protocol,” Computer Networks, vol. 231, p. 109809, Jul. 2023, doi: 10.1016/j.comnet.2023.109809.

N. Tekin, A. Acar, A. Aris, A. S. Uluagac, and V. C. Gungor, “Energy consumption of on-device machine learning models for IoT intrusion detection,” Internet of Things, vol. 21, p. 100670, Apr. 2023, doi: 10.1016/j.iot.2022.100670.

N. Prazeres, R. L. de C. Costa, L. Santos, and C. Rabadão, “Engineering the application of machine learning in an IDS based on IoT traffic flow,” Intelligent Systems with Applications, vol. 17, p. 200189, Feb. 2023, doi: 10.1016/j.iswa.2023.200189.

P. Sanju, “Enhancing intrusion detection in IoT systems: A hybrid metaheuristics-deep learning approach with ensemble of recurrent neural networks,” Journal of Engineering Research, p. 100122, Jun. 2023, doi: 10.1016/j.jer.2023.100122.

S. A. Bakhsh, M. A. Khan, F. Ahmed, M. S. Alshehri, H. Ali, and J. Ahmad, “Enhancing IoT network security through deep learning-powered Intrusion Detection System,” Internet of Things, vol. 24, p. 100936, Dec. 2023, doi: 10.1016/j.iot.2023.100936.

B. Sharma, L. Sharma, C. Lal, and S. Roy, “Explainable artificial intelligence for intrusion detection in IoT networks: A deep learning based approach,” Expert Systems with Applications, vol. 238, p. 121751, Mar. 2024, doi: 10.1016/j.eswa.2023.121751.

M. Sarhan, S. Layeghy, N. Moustafa, M. Gallagher, and M. Portmann, “Feature extraction for machine learning-based intrusion detection in IoT networks,” Digital Communications and Networks, Sep. 2022, doi: 10.1016/j.dcan.2022.08.012.

S. Ben Atitallah, M. Driss, and H. Ben Ghezala, “FedMicro-IDA: A federated learning and microservices-based framework for IoT data analytics,” Internet of Things, vol. 23, p. 100845, Oct. 2023, doi: 10.1016/j.iot.2023.100845.

A. Hennebelle, H. Materwala, and L. Ismail, “HealthEdge: A Machine Learning-Based Smart Healthcare Framework for Prediction of Type 2 Diabetes in an Integrated IoT, Edge, and Cloud Computing System,” Procedia Computer Science, vol. 220, pp. 331–338, Jan. 2023, doi: 10.1016/j.procs.2023.03.043.

S. Saif, P. Das, S. Biswas, M. Khari, and V. Shanmuganathan, “HIIDS: Hybrid intelligent intrusion detection system empowered with machine learning and metaheuristic algorithms for application in IoT based healthcare,” Microprocessors and Microsystems, p. 104622, Aug. 2022, doi: 10.1016/j.micpro.2022.104622.

A. Sharifi and S. Goli-Bidgoli, “IFogLearn++: A new platform for fog layer’s IoT attack detection in critical infrastructure using machine learning and big data processing,” Computers and Electrical Engineering, vol. 103, p. 108374, Oct. 2022, doi: 10.1016/j.compeleceng.2022.108374.

O. Habibi, M. Chemmakha, and M. Lazaar, “Imbalanced tabular data modelization using CTGAN and machine learning to improve IoT Botnet attacks detection,” Engineering Applications of Artificial Intelligence, vol. 118, p. 105669, Feb. 2023, doi: 10.1016/j.engappai.2022.105669.

T. Gaber, A. El-Ghamry, and A. E. Hassanien, “Injection attack detection using machine learning for smart IoT applications,” Physical Communication, vol. 52, p. 101685, Jun. 2022, doi: 10.1016/j.phycom.2022.101685.

Downloads

Published

07.01.2024

How to Cite

Prasanna B. , L. ., & Reddy , M. S. . (2024). A Parallel Rank Based Multi-Class Ensemble Classification Framework on ISOT Cyber Threat Detection. International Journal of Intelligent Systems and Applications in Engineering, 12(10s), 556–566. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4405

Issue

Section

Research Article