Abstract
The use of intrusion detection systems is one of the means to provide a secure and reassuring environment for computer system users. Updates and improvements for these protection systems are recommended due to the regular appearance of new vulnerabilities. Research has demonstrated the significant role of Machine Learning in the conception and implementation satisfactory techniques that can predict new attacks more quickly and efficiently to prepare the most suitable countermeasure. The main concern of this article is to establish a comparative study and implementation of Machine Learning and Ensemble Learning algorithms for IDS in the IoT domain. More specifically, the focus is directed towards the study and implementation of IDS using datasets containing real data, and through the utilization of unitary and ensemble learning algorithms, effective solutions can be achieved to enhance the detection capacity of intrusion detection systems, Furthermore, another part of the work involves initiating and setting up a Snort IDS on a Raspberry Pi board, thus adding a practical perspective to our paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ammar, M., et al.: Internet of things: a survey on the security of IoT frameworks. J. Inf. Secur. Appl. 38, 8–27 (2018). https://doi.org/10.1016/j.jisa.2017.11.002
Sugi, S.S.S., Ratna, S.R.: Investigation of machine learning techniques in intrusion detection system for IoT network. In: Proceedings of the Third International Conference on Intelligent Sustainable Systems [ICISS 2020] IEEE Xplore Part Number: CFP20M19-ART, pp. 1164–1167. ISBN: 978-1-7281-7089-3
Dua, M.: Machine learning approach to IDS: a comprehensive review. In: Proceedings of the Third International Conference on Electronics Communication and Aerospace Technology [ICECA 2019] IEEE Conference Record # 45616; IEEE Xplore ISBN: 978-1-7281-0167-5
Ullah, I., Mahmoud, Q.H.: A two-level flow- based anomalous activity detect ion system for IoT networks. Electronics 9(3), 530 (2020). https://doi.org/10.3390/electronics9030530. Accessed 31 Aug 2020
Vishwakarma, M., Kesswani, N.: A new two-phase intrusion detection system with Naïve Bayes machine learning for data classification and elliptic envelop method for anomaly detection. Decis. Anal. J. 7, 2–5, 100233 (2023)
Enigo, V.F., Ganesh, K.T., Raj, N.V., Sandeep, D.: Hybrid intrusion detection system for detecting new attacks using machine learning. In: Proceedings of the Fifth International Conference on Communication and Electronics Systems (ICCES 2020) IEEE Conference Record # 48766; IEEE Xplore ISBN: 978-1-7281-5371-1
Sumanth, R., Bhanu, K.N.: Raspberry Pi based intrusion detection system using K-Means clustering algorithm. In: Proceedings of the Second International Conference on Inventive Research in Computing Applications (ICIRCA-2020) IEEE Xplore Part Number: CFP20N67-ART; ISBN: 978-1-7281-5374-2
Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In : ICISSP, pp. 108–116 (2018)
Sivanathan, A., et al.: Classifying IoT devices in smart environments using network traffic characteristics. IEEE Trans. Mob. Comput. 18, 1–10 (2018)
Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A., Anwar, A.: TON_IoT telemetry dataset: a new generationdataset of IoT and IIoT for data-driven intrusion detection systems. CCBY - IEEE is not the copyright holder of this material
Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst. 100, 779–796 (2019)
Hamza, A., Gharakheili, H.H., Benson, T.A., Sivaraman, V.: Detecting volumetric attacks on loT devices via SDN-based monitoring of MUD activity. In: Proceedings of the 2019 ACM Symposium on SDN Research. ACM, 2019, pp. 36–48 (2019)
Gad, A.R., Nashat, A.A., Barkat, T.M.: Intrusion detection system using machine learning for vehicular ad hoc networks basedon ToN-IoT dataset. IEEE Access 9,142206–142217 (2021)
Alzubaidi, L., Zhang, J., Humaidi, A.J., et al.: Review of deep learning: concepts, CNN architectures, challenges, applications, future directions. J. Big Data 8, 53 (2021). https://doi.org/10.1186/s40537-021-00444-8
Tareq, I., Elbagoury, B.M., El-Regaily, S., El-Horbaty, E.S.M.: Analysis of ToN-IoT, UNW-NB15, and Edge-IIoT datasets using DL in cybersecurity for IoT. Appl. Sci. 12, pp. 1–26, 9572 (2022). https://doi.org/10.3390/app12199572
Arreche, O., Guntur, T.R., Roberts, J.W., Abdallah, M.: E-XAI: evaluating black-box explainable AI frameworks for network intrusion detection. IEEE Syst. Man Cybern. Soc. Sect. 12, 23954–23988 (2024)
Khamphakdee, N., Benjamas, N., Saiyod, S.: Improving intrusion detection system based on snort rules for network probe attack detection. In: 2014 2nd International Conference on Information and Communication Technology (ICoICT), pp. 69–74 (2014)
Khurat, A., Sawangphol, W.: An ontology for SNORT rule. 978-1-7281–0719-6/19/$31.00 , pp. 49–5. IEEE (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Hafid, B., Ezzouhairi, A., Haddouch, K. (2024). Toward the Use of Machine Learning and Ensemble Learning Algorithms for IDS in the IoT Domain. In: Mahboub, O., Haddouch, K., Omara, H., Hefnawi, M. (eds) Big Data and Internet of Things. BDIoT 2024. Lecture Notes in Networks and Systems, vol 887. Springer, Cham. https://doi.org/10.1007/978-3-031-74491-4_74
Download citation
DOI: https://doi.org/10.1007/978-3-031-74491-4_74
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-74490-7
Online ISBN: 978-3-031-74491-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)