DTXG-RF-based Intrusion Detection System for Artificial IoT Cyber Attacks
Received: 31 October 2024 | Revised: 22 November 2024 | Accepted: 27 November 2024 | Online: 2 February 2025
Corresponding author: Shayma Wail Nourildean
Abstract
The swift advancement of networking technology and the rising incidence of cyber-attacks have made effective cybersecurity a critical priority. The primary concern with IoT networks is their susceptibility to vulnerabilities. IoT security necessitates the substantial involvement of artificial intelligence as a security technology to mitigate these challenges. Cyberattacks are evolving in sophistication, consequently posing greater obstacles in the precise detection of intrusions. An Intrusion Detection System (IDS) is a device or software application that monitors the activities of network systems for malicious actions or policy breaches and produces reports. The primary objective of an IDS is to efficiently identify attacks. Moreover, it is imperative to identify attacks at an early stage to mitigate their effects. Machine learning models have become increasingly popular in IDSs due to their capacity to process substantial data volumes and identify patterns in real time. Machine learning involves building an algorithm to identify consistent patterns within a dataset. This study aimed to build an IDS using an ensemble machine learning (DTXG-RF) model and compare it with DT, XGBoost, KNN, RF, NB, and CatBoost on the CIC-IoT-2023 and a Ransomware dataset. The results showed that the proposed DTXG-RF outperformed other machine learning models with accuracy reaching 95.06%.
Keywords:
machine learning, dataset, IDS, IoT, AI, reliabilityDownloads
References
A. Karn, "Applications of Artificial Intelligence in IoT and Sensor Networks: A Survey," International Journal of Advance Research, Ideas and Innovations in Technology, vol. 7, no. 3, pp. 2297–3000.
N. A. S. Al-Jamali, I. R. K. Al-Saedi, A. R. Zarzoor, and H. Li, "A New Imputation Technique Based a Multi-Spike Neural Network to Handle Missing Data in the Internet of Things Network (IoT)," IEEE Access, vol. 11, pp. 112841–112850, 2023.
H. Nozari, A. Szmelter-Jarosz, and J. Ghahremani-Nahr, "Analysis of the Challenges of Artificial Intelligence of Things (AIoT) for the Smart Supply Chain (Case Study: FMCG Industries)," Sensors, vol. 22, no. 8, Jan. 2022, Art. no. 2931.
J. Dumoulin et al., "UNICITY: A depth maps database for people detection in security airlocks," in 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Auckland, New Zealand, Nov. 2018, pp. 1–6.
S. W. Nourildean and Y. A. Mohammed, "IoT based Wireless Sensor Network Improvement Against Jammers Using Ad-Hoc Routing Protocols," International Journal of Interactive Mobile Technologies (iJIM), vol. 17, no. 07, pp. 133–147, Apr. 2023.
P. Dini, A. Elhanashi, A. Begni, S. Saponara, Q. Zheng, and K. Gasmi, "Overview on Intrusion Detection Systems Design Exploiting Machine Learning for Networking Cybersecurity," Applied Sciences, vol. 13, no. 13, Jan. 2023, Art. no. 7507.
J. Jabez and B. Muthukumar, "Intrusion Detection System (IDS): Anomaly Detection Using Outlier Detection Approach," Procedia Computer Science, vol. 48, pp. 338–346, Jan. 2015.
S. H. Abd, I. A. Hashim, and A. S. A. Jalal, "Automatic deception detection system based on hybrid feature extraction techniques," Indonesian Journal of Electrical Engineering and Computer Science, vol. 26, no. 1, Apr. 2022.
A. Khraisat and A. Alazab, "A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges," Cybersecurity, vol. 4, no. 1, Mar. 2021, Art. no. 18.
J. C. S. Sicato, S. K. Singh, S. Rathore, and J. H. Park, "A Comprehensive Analyses of Intrusion Detection System for IoT Environment," Journal of Information Processing Systems, vol. 16, no. 4, pp. 975–990, 2020.
B. Xu, L. Sun, X. Mao, R. Ding, and C. Liu, "IoT Intrusion Detection System Based on Machine Learning," Electronics, vol. 12, no. 20, Jan. 2023, Art. no. 4289.
R. Alsulami, B. Alqarni, R. Alshomrani, F. Mashat, and T. Gazdar, "IoT Protocol-Enabled IDS based on Machine Learning," Engineering, Technology & Applied Science Research, vol. 13, no. 6, pp. 12373–12380, Dec. 2023.
M. Baich, T. Hamim, N. Sael, and Y. Chemlal, "Machine Learning for IoT based networks intrusion detection: a comparative study," Procedia Computer Science, vol. 215, pp. 742–751, Jan. 2022.
P. Sanju, "Enhancing intrusion detection in IoT systems: A hybrid metaheuristics-deep learning approach with ensemble of recurrent neural networks," Journal of Engineering Research, vol. 11, no. 4, pp. 356–361, Dec. 2023.
A. Kaushik and H. Al-Raweshidy, "A novel intrusion detection system for internet of things devices and data," Wireless Networks, vol. 30, no. 1, pp. 285–294, Jan. 2024.
X. Yang, G. Peng, D. Zhang, and Y. Lv, "An Enhanced Intrusion Detection System for IoT Networks Based on Deep Learning and Knowledge Graph," Security and Communication Networks, vol. 2022, no. 1, 2022, Art. no. 4748528.
A. S. Dawood, "Machine learning and artificial neural network for data mining classification and prediction of brain diseases," International Journal of Reasoning-based Intelligent Systems, vol. 15, no. 3/4, pp. 313–322, 2023.
I. H. Sarker, "AI-Based Modeling: Techniques, Applications and Research Issues Towards Automation, Intelligent and Smart Systems," SN Computer Science, vol. 3, no. 2, Feb. 2022, Art. no. 158.
P. D. Babu, C. Pavani, and C. E. Naidu, "Cyber Security with IOT," in 2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM), Chennai, India, Mar. 2019, pp. 109–113.
S. W. Nourildean, S. I. Jasim, M. T. Abdulhadi, and M. M. Jaber, "Point coordination mechanism based mobile ad hoc network investigation against jammers," Eastern-European Journal of Enterprise Technologies, vol. 5, no. 9(119), pp. 45–53, Oct. 2022.
M. Aljanabi, M. A. Ismail, R. A. Hasan, and J. Sulaiman, "Intrusion Detection: A Review," Mesopotamian Journal of Cyber Security, Jan. 2021.
C. T. Dhumal and D. S. V. Pingale, "Analysis of Intrusion Detection Systems: Techniques, Datasets and Research Opportunity." Social Science Research Network, Mar. 06, 2024.
G. Sarailidis, T. Wagener, and F. Pianosi, "Integrating scientific knowledge into machine learning using interactive decision trees," Computers & Geosciences, vol. 170, Jan. 2023, Art. no. 105248.
T. Chen and C. Guestrin, "XGBoost: A Scalable Tree Boosting System," in Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, Aug. 2016, pp. 785–794.
S. Sperandei, "Understanding logistic regression analysis," Biochemia Medica, pp. 12–18, 2014.
J. Sun, W. Du, and N. Shi, "A Survey of kNN Algorithm," Information Engineering and Applied Computing, vol. 1, no. 1, May 2018.
I. Wickramasinghe and H. Kalutarage, "Naive Bayes: applications, variations and vulnerabilities: a review of literature with code snippets for implementation," Soft Computing, vol. 25, no. 3, pp. 2277–2293, Feb. 2021.
L. Prokhorenkova, G. Gusev, A. Vorobev, A. V. Dorogush, and A. Gulin, "CatBoost: unbiased boosting with categorical features," in Advances in Neural Information Processing Systems, 2018, vol. 31.
E. C. P. Neto, S. Dadkhah, R. Ferreira, A. Zohourian, R. Lu, and A. A. Ghorbani, "CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment," Sensors, vol. 23, no. 13, Jan. 2023, Art. no. 5941.
A. Bensalah, "Ransomware detection data set." Kaggle, [Online]. Available: https://www.kaggle.com/datasets/amdj3dax/ransomware-detection-data-set.
E. Elmahfoud, S. Elhajla, Y. Maleh, and S. Mounir, "Machine Learning Algorithms for Intrusion Detection in IoT Prediction and Performance Analysis," Procedia Computer Science, vol. 236, pp. 460–467, Jan. 2024.
M. Vakili, M. Ghamsari, and M. Rezaei, "Performance Analysis and Comparison of Machine and Deep Learning Algorithms for IoT Data Classification." arXiv, Jan. 27, 2020.
Downloads
How to Cite
License
Copyright (c) 2024 Shayma Wail Nourildean, Wafa Mefteh, Ali Mouhsin Frihida

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.