Nothing Special   »   [go: up one dir, main page]

Skip to main content

Toward the Use of Machine Learning and Ensemble Learning Algorithms for IDS in the IoT Domain

  • Conference paper
  • First Online:
Big Data and Internet of Things (BDIoT 2024)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 887))

Included in the following conference series:

  • 79 Accesses

Abstract

The use of intrusion detection systems is one of the means to provide a secure and reassuring environment for computer system users. Updates and improvements for these protection systems are recommended due to the regular appearance of new vulnerabilities. Research has demonstrated the significant role of Machine Learning in the conception and implementation satisfactory techniques that can predict new attacks more quickly and efficiently to prepare the most suitable countermeasure. The main concern of this article is to establish a comparative study and implementation of Machine Learning and Ensemble Learning algorithms for IDS in the IoT domain. More specifically, the focus is directed towards the study and implementation of IDS using datasets containing real data, and through the utilization of unitary and ensemble learning algorithms, effective solutions can be achieved to enhance the detection capacity of intrusion detection systems, Furthermore, another part of the work involves initiating and setting up a Snort IDS on a Raspberry Pi board, thus adding a practical perspective to our paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 179.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ammar, M., et al.: Internet of things: a survey on the security of IoT frameworks. J. Inf. Secur. Appl. 38, 8–27 (2018). https://doi.org/10.1016/j.jisa.2017.11.002

  2. Sugi, S.S.S., Ratna, S.R.: Investigation of machine learning techniques in intrusion detection system for IoT network. In: Proceedings of the Third International Conference on Intelligent Sustainable Systems [ICISS 2020] IEEE Xplore Part Number: CFP20M19-ART, pp. 1164–1167. ISBN: 978-1-7281-7089-3

    Google Scholar 

  3. Dua, M.: Machine learning approach to IDS: a comprehensive review. In: Proceedings of the Third International Conference on Electronics Communication and Aerospace Technology [ICECA 2019] IEEE Conference Record # 45616; IEEE Xplore ISBN: 978-1-7281-0167-5

    Google Scholar 

  4. Ullah, I., Mahmoud, Q.H.: A two-level flow- based anomalous activity detect ion system for IoT networks. Electronics 9(3), 530 (2020). https://doi.org/10.3390/electronics9030530. Accessed 31 Aug 2020

  5. Vishwakarma, M., Kesswani, N.: A new two-phase intrusion detection system with Naïve Bayes machine learning for data classification and elliptic envelop method for anomaly detection. Decis. Anal. J. 7, 2–5, 100233 (2023)

    Google Scholar 

  6. Enigo, V.F., Ganesh, K.T., Raj, N.V., Sandeep, D.: Hybrid intrusion detection system for detecting new attacks using machine learning. In: Proceedings of the Fifth International Conference on Communication and Electronics Systems (ICCES 2020) IEEE Conference Record # 48766; IEEE Xplore ISBN: 978-1-7281-5371-1

    Google Scholar 

  7. Sumanth, R., Bhanu, K.N.: Raspberry Pi based intrusion detection system using K-Means clustering algorithm. In: Proceedings of the Second International Conference on Inventive Research in Computing Applications (ICIRCA-2020) IEEE Xplore Part Number: CFP20N67-ART; ISBN: 978-1-7281-5374-2

    Google Scholar 

  8. Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In : ICISSP, pp. 108–116 (2018)

    Google Scholar 

  9. Sivanathan, A., et al.: Classifying IoT devices in smart environments using network traffic characteristics. IEEE Trans. Mob. Comput. 18, 1–10 (2018)

    Google Scholar 

  10. Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A., Anwar, A.: TON_IoT telemetry dataset: a new generationdataset of IoT and IIoT for data-driven intrusion detection systems. CCBY - IEEE is not the copyright holder of this material

    Google Scholar 

  11. Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst. 100, 779–796 (2019)

    Google Scholar 

  12. Hamza, A., Gharakheili, H.H., Benson, T.A., Sivaraman, V.: Detecting volumetric attacks on loT devices via SDN-based monitoring of MUD activity. In: Proceedings of the 2019 ACM Symposium on SDN Research. ACM, 2019, pp. 36–48 (2019)

    Google Scholar 

  13. Gad, A.R., Nashat, A.A., Barkat, T.M.: Intrusion detection system using machine learning for vehicular ad hoc networks basedon ToN-IoT dataset. IEEE Access 9,142206–142217 (2021)

    Google Scholar 

  14. Alzubaidi, L., Zhang, J., Humaidi, A.J., et al.: Review of deep learning: concepts, CNN architectures, challenges, applications, future directions. J. Big Data 8, 53 (2021). https://doi.org/10.1186/s40537-021-00444-8

  15. Tareq, I., Elbagoury, B.M., El-Regaily, S., El-Horbaty, E.S.M.: Analysis of ToN-IoT, UNW-NB15, and Edge-IIoT datasets using DL in cybersecurity for IoT. Appl. Sci. 12, pp. 1–26, 9572 (2022). https://doi.org/10.3390/app12199572

  16. Arreche, O., Guntur, T.R., Roberts, J.W., Abdallah, M.: E-XAI: evaluating black-box explainable AI frameworks for network intrusion detection. IEEE Syst. Man Cybern. Soc. Sect. 12, 23954–23988 (2024)

    Google Scholar 

  17. Khamphakdee, N., Benjamas, N., Saiyod, S.: Improving intrusion detection system based on snort rules for network probe attack detection. In: 2014 2nd International Conference on Information and Communication Technology (ICoICT), pp. 69–74 (2014)

    Google Scholar 

  18. Khurat, A., Sawangphol, W.: An ontology for SNORT rule. 978-1-7281–0719-6/19/$31.00 , pp. 49–5. IEEE (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bouchra Hafid .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hafid, B., Ezzouhairi, A., Haddouch, K. (2024). Toward the Use of Machine Learning and Ensemble Learning Algorithms for IDS in the IoT Domain. In: Mahboub, O., Haddouch, K., Omara, H., Hefnawi, M. (eds) Big Data and Internet of Things. BDIoT 2024. Lecture Notes in Networks and Systems, vol 887. Springer, Cham. https://doi.org/10.1007/978-3-031-74491-4_74

Download citation

Publish with us

Policies and ethics