Intrusion Detection in IoT using Gaussian Fuzzy Mutual Information-based Feature Selection

Authors

  • Abdullah Hussain Abu Saq Department of Information Systems, College of Computer Science and Information Systems, Najran University, Saudi Arabia
  • Anazida Zainal Department of Computer Science, Faculty of Computing, Universiti Teknologi Malaysia, Johor Bahru, Malaysia
  • Bander Ali Saleh Al-Rimy School of Computing, University of Portsmouth, UK
  • Abdulrahman Alyami Department of Information Systems, College of Computer and Information Sciences, Jouf University, Sakaka, Saudi Arabia
  • Hamad Ali Abosaq Computer Science Department, College of Computer Science and Information Systems, Najran University, Saudi Arabia
Volume: 14 | Issue: 6 | Pages: 17564-17571 | December 2024 | https://doi.org/10.48084/etasr.8268

Abstract

The proliferation of Internet of Things (IoT) devices has revolutionized various sectors by enabling real-time monitoring, data collection, and intelligent decision-making. However, the massive volume of data generated by these devices presents significant challenges for data processing and analysis. Intrusion Detection Systems (IDS) for IoT require efficient and accurate identification of malicious activities amidst vast amounts of data. Feature selection is a critical step in this process, aiming to identify the most relevant features that contribute to accurate intrusion detection, thus reducing computational complexity and improving model performance. Traditional Mutual Information-based Feature Selection (MIFS) methods face challenges when applied to IoT data due to their inherent noise, uncertainty, and imprecision. This study introduces a novel Fuzzy Mutual Information-based Feature Selection (Fuzzy-MIFS) method that integrates fuzzy logic with Gaussian membership functions to address these challenges. The proposed method enhances the robustness and effectiveness of the feature selection process, resulting in improved accuracy and efficiency of IDSs in IoT environments. Experimental results demonstrate that the Fuzzy-MIFS method consistently outperformed existing feature selection techniques across various neural network models, such as CNN, LSTM, and DBN, showcasing its superior performance in handling the complexities of IoT data. The results show that Fuzzy-MIFS increased the accuracy from 0.962 to 0.986 for CNN, from 0.96 to 0.968 for LSTM, and from 0.96 to 0.97 for DBN.

Keywords:

IDS, IoT, Deep Learning, Cyber Attack

Downloads

Download data is not yet available.

References

O. Abu Alghanam, W. Almobaideen, M. Saadeh, and O. Adwan, "An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning," Expert Systems with Applications, vol. 213, Mar. 2023, Art. no. 118745.

R. Alsulami, B. Alqarni, R. Alshomrani, F. Mashat, and T. Gazdar, "IoT Protocol-Enabled IDS based on Machine Learning," Engineering, Technology & Applied Science Research, vol. 13, no. 6, pp. 12373–12380, Dec. 2023.

S. Subramani and M. Selvi, "Multi-objective PSO based feature selection for intrusion detection in IoT based wireless sensor networks," Optik, vol. 273, Feb. 2023, Art. no. 170419.

Y. Lyu, Y. Feng, and K. Sakurai, "A Survey on Feature Selection Techniques Based on Filtering Methods for Cyber Attack Detection," Information, vol. 14, no. 3, Mar. 2023, Art. no. 191.

N. A. Alsharif, S. Mishra, and M. Alshehri, "IDS in IoT using Machine ‎Learning and Blockchain," Engineering, Technology & Applied Science Research, vol. 13, no. 4, pp. 11197–11203, Aug. 2023.

S. Al-Emari, Y. Sanjalawe, D. Alsmadi, E. Alduweib, and A. Alharbi, "Employing Mutual Information Feature Selection and LightGBM for Intrusion Detection in IoT." ICIC International, 2024.

M. Gautam, S. Ahuja, and A. Kumar, "Intrusion Detection Techniques in Internet of Things: A Bird’s Eye View," in 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, Feb. 2024, pp. 622–628.

Z. Ling and Z. J. Hao, "An Intrusion Detection System Based on Normalized Mutual Information Antibodies Feature Selection and Adaptive Quantum Artificial Immune System," International Journal on Semantic Web and Information Systems, vol. 18, no. 1, pp. 1–25, Jan. 2022.

A. A. Anitha and L. Arockiam, "ANNIDS: Artificial Neural Network based Intrusion Detection System for Internet of Things," International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 11, pp. 2583–2588, Sep. 2019.

F. Hussain et al., "A Framework for Malicious Traffic Detection in IoT Healthcare Environment," Sensors, vol. 21, no. 9, Jan. 2021, Art. no. 3025.

H. Y. I. Khalid and N. B. I. Aldabagh, "A Survey on the Latest Intrusion Detection Datasets for Software Defined Networking Environments," Engineering, Technology & Applied Science Research, vol. 14, no. 2, pp. 13190–13200, Apr. 2024.

A. Wells and A. B. Usman, "Trust and Voice Biometrics Authentication for Internet of Things," International Journal of Information Security and Privacy, vol. 17, no. 1, pp. 1–28, Jan. 2023.

Q. A. Arshad, W. Z. Khan, F. Azam, M. K. Khan, H. Yu, and Y. B. Zikria, "Blockchain-based decentralized trust management in IoT: systems, requirements and challenges," Complex & Intelligent Systems, vol. 9, no. 6, pp. 6155–6176, Dec. 2023.

A. M. Banaamah and I. Ahmad, "Intrusion Detection in IoT Using Deep Learning," Sensors, vol. 22, no. 21, Jan. 2022, Art. no. 8417.

S. H. S. Ariffin et al., "Intrusion Detection System (IDS) Accuracy Testing for Software Defined Network Internet of Things (SDN-IOT) Testbed," ELEKTRIKA- Journal of Electrical Engineering, vol. 21, no. 3, pp. 23–27, Dec. 2022.

G. Thamilarasu and S. Chawla, "Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things," Sensors, vol. 19, no. 9, Jan. 2019, Art. no. 1977.

A. Khraisat, I. Gondal, P. Vamplew, J. Kamruzzaman, and A. Alazab, "A Novel Ensemble of Hybrid Intrusion Detection System for Detecting Internet of Things Attacks," Electronics, vol. 8, no. 11, Nov. 2019, Art. no. 1210.

J. Wu, H. Dai, Y. Wang, K. Ye, and C. Xu, "Heterogeneous Domain Adaptation for IoT Intrusion Detection: A Geometric Graph Alignment Approach," IEEE Internet of Things Journal, vol. 10, no. 12, pp. 10764–10777, 2023.

R. Khilar et al., "Artificial Intelligence-Based Security Protocols to Resist Attacks in Internet of Things," Wireless Communications and Mobile Computing, vol. 2022, no. 1, 2022, Art. no. 1440538.

O. Shende, R. K. Pateriya, P. Verma, and A. Jain, "CEBM: Collaborative Ensemble Blockchain Model for Intrusion Detection in IoT Environment." Research Square, 2021.

M. M. Alani and A. Miri, "Towards an Explainable Universal Feature Set for IoT Intrusion Detection," Sensors, vol. 22, no. 15, Jan. 2022, Art. no. 5690.

P. R. Agbedanu, R. Musabe, J. Rwigema, I. Gatare, T. J. Maginga, and D. K. Amenyedzi, "Towards achieving lightweight intrusion detection systems in Internet of Things, the role of incremental machine learning: A systematic literature review." F1000Research, Nov. 24, 2022.

M. Nasri, A. Helali, and H. Maaref, "Energy-efficient fuzzy logic-based cross-layer hierarchical routing protocol for wireless Internet-of-Things sensor networks," International Journal of Communication Systems, vol. 34, no. 9, 2021, Art. no. e4808.

Q. Yin, "Design and Application of Smart City Internet of Things Service Platform Based on Fuzzy Clustering Algorithm," Mobile Information Systems, vol. 2022, no. 1, 2022, Art. no. 8405306.

M. P. Pitchai, M. Ramachandran, F. Al-Turjman, and L. Mostarda, "Intelligent Framework for Secure Transportation Systems Using Software-Defined-Internet of Vehicles," Computers, Materials & Continua, vol. 68, no. 3, pp. 3947–3966, 2021.

W. Zang, "Construction of Mobile Internet Financial Risk Cautioning Framework Based on BP Neural Network," Mobile Information Systems, vol. 2022, no. 1, 2022, Art. no. 3374674.

X. Guo, T. Zeng, Y. Wang, and J. Zhang, "Fuzzy TOPSIS Approaches for Assessing the Intelligence Level of IoT-Based Tourist Attractions," IEEE Access, vol. 7, pp. 1195–1207, 2019.

M. I. Tariq, N. A. Mian, A. Sohail, T. Alyas, and R. Ahmad, "Evaluation of the Challenges in the Internet of Medical Things with Multicriteria Decision Making (AHP and TOPSIS) to Overcome Its Obstruction under Fuzzy Environment," Mobile Information Systems, vol. 2020, no. 1, 2020, Art. no. 8815651.

A. D. Indriyanti, "Design and Build Smart Agriculture Using Cognitive Internet of Things (C IoT)," Journal Research of Social Science, Economics, and Management, vol. 1, no. 7, Feb. 2022.

A. R. A. Tahtawi and R. Kurniawan, "Kendali pH untuk sistem IoT hidroponik deep flow technique berbasis fuzzy logic controller," Jurnal Teknologi dan Sistem Komputer, vol. 8, no. 4, pp. 323–329, Oct. 2020,.

S. Titi, H. B. Elhadj, and L. C. Fourati, "A Fuzzy-Ontology Based Diabetes Monitoring System Using Internet of Things," in The Impact of Digital Technologies on Public Health in Developed and Developing Countries, Hammamet, Tunisia, 2020, pp. 287–295.

R. Yauri, J. Lezama, and M. Rios, "Evaluation of a wireless low-energy mote with fuzzy algorithms and neural networks for remote environmental monitoring," Indonesian Journal of Electrical Engineering and Computer Science, vol. 23, no. 2, Aug. 2021.

M. Alalhareth and S. C. Hong, "An Adaptive Intrusion Detection System in the Internet of Medical Things Using Fuzzy-Based Learning," Sensors, vol. 23, no. 22, Jan. 2023, Art. no. 9247.

F. S. Alrayes et al., "Optimal Fuzzy Logic Enabled Intrusion Detection for Secure IoT-Cloud Environment," Computers, Materials & Continua, vol. 74, no. 3, pp. 6737–6753, 2023.

J. B. Awotunde, F. E. Ayo, R. Panigrahi, A. Garg, A. K. Bhoi, and P. Barsocchi, "A Multi-level Random Forest Model-Based Intrusion Detection Using Fuzzy Inference System for Internet of Things Networks," International Journal of Computational Intelligence Systems, vol. 16, no. 1, Mar. 2023, Art. no. 31.

S. R. Zahra and M. A. Chishti, "A generic and lightweight security mechanism for detecting malicious behavior in the uncertain Internet of Things using fuzzy logic- and fog-based approach," Neural Computing and Applications, vol. 34, no. 9, pp. 6927–6952, May 2022.

M. Savva, I. Ioannou, and V. Vassiliou, "Performance evaluation of a Fuzzy Logic-based IDS (FLIDS) technique for the Detection of Different Types of Jamming Attacks in IoT Networks," in 2023 21st Mediterranean Communication and Computer Networking Conference (MedComNet), Island of Ponza, Italy, Jun. 2023, pp. 93–100.

S. S. Pandi et. al., "Advancing IoT security with flame: A hybrid approach combining fuzzy logic and artificial lizard search optimization," Computers & Security, vol. 145, Oct. 2024, Art. no. 103984.

M. A. Alohali, M. Elsadig, F. N. Al-Wesabi, M. Al Duhayyim, A. Mustafa Hilal, and A. Motwakel, "Enhanced Chimp Optimization-Based Feature Selection with Fuzzy Logic-Based Intrusion Detection System in Cloud Environment," Applied Sciences, vol. 13, no. 4, Jan. 2023, Art. no. 2580.

M. Alalhareth and S. C. Hong, "An Improved Mutual Information Feature Selection Technique for Intrusion Detection Systems in the Internet of Medical Things," Sensors, vol. 23, no. 10, Jan. 2023, Art. no. 4971.

B. A. S. Al-rimy et al., "Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection," Future Generation Computer Systems, vol. 115, pp. 641–658, Feb. 2021.

Y. A. Ahmed, B. Koçer, S. Huda, B. A. S. Al-rimy, and M. M. Hassan, "A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection," Journal of Network and Computer Applications, vol. 167, Oct. 2020, Art. no. 102753.

P. Zhang, G. Liu, and J. Song, "MFSJMI: Multi-label feature selection considering join mutual information and interaction weight," Pattern Recognition, vol. 138, Jun. 2023, Art. no. 109378.

M. Bennasar, Y. Hicks, and R. Setchi, "Feature selection using Joint Mutual Information Maximisation," Expert Systems with Applications, vol. 42, no. 22, pp. 8520–8532, Dec. 2015.

Y. Shi, J. Chu, C. Ji, J. Li, and S. Ning, "A Fuzzy-Based Mobile Edge Architecture for Latency-Sensitive and Heavy-Task Applications," Symmetry, vol. 14, no. 8, Aug. 2022, Art. no. 1667.

N. Radwan and M. Farouk, "The Growth of Internet of Things (IoT) In The Management of Healthcare Issues and Healthcare Policy Development," International Journal of Technology, Innovation and Management, vol. 1, no. 1, pp. 69–84, Sep. 2021.

L. A. Saddik, B. A. Khalifa, and B. Fateh, "Evaluation quality of service for internet of things based on fuzzy logic: a smart home case study," Indonesian Journal of Electrical Engineering and Computer Science, vol. 25, no. 2, Feb. 2022, Art. no. 825.

S. M. Othman and M. B. Abdulrazzaq, "Fuzzy logic system for drug storage based on the internet of things: a survey," Indonesian Journal of Electrical Engineering and Computer Science, vol. 29, no. 3, Mar. 2023, Art. no. 1382.

A. A. Hady, A. Ghubaish, T. Salman, D. Unal, and R. Jain, "Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study," IEEE Access, vol. 8, pp. 106576–106584, 2020.

Downloads

How to Cite

[1]
Abu Saq, A.H., Zainal, A., Al-Rimy, B.A.S., Alyami, A. and Abosaq, H.A. 2024. Intrusion Detection in IoT using Gaussian Fuzzy Mutual Information-based Feature Selection. Engineering, Technology & Applied Science Research. 14, 6 (Dec. 2024), 17564–17571. DOI:https://doi.org/10.48084/etasr.8268.

Metrics

Abstract Views: 448
PDF Downloads: 396

Metrics Information

Most read articles by the same author(s)