Securing the Edge: CatBoost Classifier Optimized by the Lyrebird Algorithm to Detect Denial of Service Attacks in Internet of Things-Based Wireless Sensor Networks
<p>IoT-based Wireless Sensor Network—the basic structure [<a href="#B1-futureinternet-16-00381" class="html-bibr">1</a>].</p> "> Figure 2
<p>Flowchart of the LOA.</p> "> Figure 3
<p>Flowchart of the CatBoost classifier.</p> "> Figure 4
<p>Flow diagram of the proposed LOA-Cb-C.</p> ">
Abstract
:1. Introduction
2. Literature Review
3. Contributions of This Research Article
- The suggested LOA helps to optimize the hyperparameters of the Cb-C.
- The proposed Cb-C incorporates an efficient classification technique for enhancing the prediction capabilities of various attacks.
- This study mainly focuses on integrating the LOA and Cb-C, hence called LOA-Cb-C, which helps in the effective prediction of the maximum number of samples in each category of attack, thus enhancing the accuracy, true positive rate, and F1-score and reducing the error rate.
4. Proposed Methodology
4.1. General Structure of the Proposed Methodology
- (i)
- Dataset collection
- (ii)
- Data Splitting
- (iii)
- Model Selection and Optimization
- (iv)
- Training athe Cb-C for its effectiveness in handling categorical features nd Prediction
4.2. The WSN-DS Dataset
- Blackhole Attacks: A blackhole attack is a type of security threat where a malicious node in the network selectively drops or discards data packets, without sending them to their anticipated terminal. The purpose of a blackhole attack is to disrupt communication within the network by making the malicious node appear as an attractive route for data traffic.
- Greyhole Attacks: A grayhole attack is a type of security threat where a malicious node selectively drops or modifies data packets, rather than dropping all packets like in a blackhole attack. The goal of a grayhole attack is to disrupt communication in the network while remaining stealthy and difficult to detect.
- Flooding Attacks: A flooding attack is a type of Denial of Service (DoS) attack where an attacker deliberately sends a large volume of packets or messages to the network with the intention of overwhelming its resources. The goal of a flooding attack is to consume the network’s bandwidth, energy, or processing capabilities, leading to a disruption in communication and potentially causing legitimate messages to be dropped or delayed.
- TDMA/Scheduling: TDMA/scheduling is a channel access method used to allocate time slots to nodes for transmitting and receiving data. TDMA is a scheduling algorithm that divides the communication channel into time slots, with each node assigned a specific time slot during which it can transmit or receive data.
4.3. Lyrebird Optimization Algorithm (LOA)
- (i)
- Different phases of the LOA.
- (ii)
- Escape strategy (exploration phase).
- (iii)
- Hiding strategy (exploitation phase).
4.4. Lyrebird Optimization Algorithm for Intrusion Detection in WSNs
- (a)
- Fitness function (objective):In the proposed work, the objective is to minimize false positives and maximize detection accuracy. The fitness function is based on metrics such as accuracy, precision, recall, and F1-score.The fitness function is defined as
- (b)
- Exploration and exploitation phases:The exploration and exploitation phases are the same as in general optimization, but the updated positions of the solutions reflect the search for optimal network parameters that maximize detection accuracy or minimize energy consumption. The equation for exploration is as follows:
- (c)
- Termination:The termination criterion are based on reaching a desired detection threshold (e.g., achieving a minimum F1-score) or after a certain number of iterations
4.5. CatBoost Classifier (Cb-C) for WSN Attack Detection
- (a)
- Objective function (loss function):The objective function is a classification loss function, and the base equation for distinguishing between the normal traffic and attack traffic in WSN is given by
- (b)
- Handling categorical data in WSNs:CatBoost’s ordered target statistics help in managing the categorical data present in the WSN-DS dataset, and this prevents leakage and overfitting. The equation for the ordered target statistics is given by
- (c)
- Prediction of attack likelihood:After building the trees iteratively, the final prediction for a given instance is
4.6. CatBoost Classifier (Cb-C) Optimized by the Lyrebird Optimization Algorithm (LOA)
- Improved Accuracy: The CatBoost classifier’s ability to differentiate between normal and malicious attack can be enhanced by hyperparameter optimization.
- Robustness: Improved detection of DoS attacks is a result of the enhanced CatBoost classifier’s increased resilience to changes in IoT data.
- Efficiency: Because of its improved computing efficiency, the optimized classifier is well-suited for WSNs to identify DoS assaults in real time.
5. Performance Metrics
6. Simulation Results
7. Discussion
8. Complexity Analysis of the Proposed Approach
- a.
- Lyrebird Optimization Algorithm:
- (i)
- Time Complexity:
- Population Initialization: Randomly generating an initial population requires O(N), where N is the population size.
- Fitness Calculation: For each iteration, the fitness of each individual is evaluated. Let the fitness evaluation take O (F). So, for each iteration, it takes O (N × F).
- Exploration and Exploitation (Search Process): For each iteration, the algorithm applies search mechanisms (exploitation and exploration) on the population. Since each individual is updated per iteration, it contributes to an additional O (N) per iteration.
- Overall Time Complexity of the LOA: O (T × N × F), where T is the number of iterations, N is the population size, and F is the time complexity for fitness calculation.
- (ii)
- Space Complexity of the LOA:
- Population storage: Each individual in the population is stored, so the space complexity is O (N).
- b.
- CatBoost Classifier:The complexity of CatBoost depends on the following:Number of trees (T), maximum depth of trees (D), number of data points (n), and number of features (f).
- (i)
- Time Complexity of CatBoost:
- Tree Construction: The complexity of building one tree in CatBoost is O(n × f × D), where n-n is the number of data points, f-f is the number of features, and D is the maximum depth of the trees.
- Total Time Complexity: With T trees, the overall time complexity for CatBoost is O(T × n × f × D).
- (ii)
- Space Complexity of CatBoost:
- Model Storage: CatBoost needs to store the trees, so the space complexity is O(T × n × D).
- c.
- Lyrebird Optimization Algorithm–CatBoost Classifier (LOA-Cb-C):
9. Conclusions
10. Future Research Directions
- a.
- Enhancing the LOA’s Adaptability for Complex IoT Environments: While the LOA demonstrates strong capabilities in balancing exploration and exploitation, future research could focus on improving its adaptability to more complex, multi-modal attack scenarios. Enhancing the LOA’s ability to adjust its exploration parameters dynamically based on the characteristics of the evolving network environment could further improve the accuracy of attack detection. Incorporating adaptive or self-tuning parameters within the LOA could be a significant improvement in achieving optimal performance in dynamic IoT environments.
- b.
- Integration of Real-Time Constraints and Resource Optimization: IoT-based WSNs often operate in resource-constrained environments where energy efficiency, memory, and computational power are limited. Future work could focus on optimizing the combination of the LOA and Cb-C to function effectively within these constraints. This may involve integrating energy-aware strategies, low-power communication protocols, or lightweight versions of the algorithm that minimize resource consumption while maintaining high detection accuracy.
- c.
- Expanding Detection to a Wider Range of Attack Types and Datasets: The current approach is primarily designed for detecting DoS attacks; however, future research could explore expanding the detection capabilities to cover a broader spectrum of IoT-based WSN attack types, such as routing attacks, Sybil attacks, and blackhole attacks. Testing the LOA-Cb-C framework on more diverse datasets and real-world environments could further validate its generalizability and effectiveness. Moreover, integrating multi-class classification approaches within CatBoost for more granular identification of attack subtypes could lead to deeper insights into network vulnerabilities.
- d.
- Hybrid Approaches and Deep Learning Integration: To further improve detection performance, combining LOA with deep learning techniques or other advanced optimization methods (e.g., particle swarm optimization, genetic algorithms) could be explored. Hybrid approaches could capitalize on the strengths of different algorithms and lead to more robust and accurate IDS. Additionally, real-time learning and adaptation, such as online learning techniques, could be integrated to continuously improve the classifier’s performance as new threats emerge.
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviation
Acronym | Expansion |
ANN | Artificial Neural Network |
BCOA-MLID | Binary Chimp Optimization Algorithm with Machine Learning-based Intrusion Detection |
Cb-C | Catboost classifier |
CMPRO | Chimp social incentive-based Mutated Poor Rich Optimization |
CNN | Convolutional Neural Network |
CNS | Cooja Network Simulator |
COS | Contiki Operating System |
CRNN | convolutional recurrent neural network |
CSA | Crow Search Algorithm |
CSCA | Compact Sine Cosine Algorithm |
DFFF | Distance-based Fruit Fly Fuzzy |
DL | deep learning |
DL-HIDS | deep learning-based host intrusion detection |
DoS | Denial of Service |
ELDA | entropy-based linear discriminant analysis |
FA | Firefly Algorithm |
FC | Fully Connected |
FSA | fish swarm algorithm |
GA | genetic algorithm |
GRU | Gated Recurrent Unit |
GSWO | Genetic Sacrificial Whale Optimization |
GWDTO | Grey Wolf Dipper Throated Optimization |
GWO | Grey Wolf Optimizer |
ID | intrusion detection |
IDS | intrusion detection system |
IoT | Internet of Things |
LOA | Lyrebird Optimization Algorithm |
LSTM | long short-term memory |
MBOLT-IDS | MegaBAT optimized Long Short-Term Memory |
ML | machine learning |
MLP | Multi-Layer Perceptron |
MLPNN | Multi-Layer Perceptron Neural Network |
MSO | Moth Search Optimizer |
MSODL-ID | Moth Search Optimizer with Deep Learning Enabled Intrusion Detection |
NIDS | Network ID System |
NSL | National Security Laboratory |
OBPNN | Optimized Back Propagation Neural Network |
PCA | Principal Component Analysis |
PM | Polymorphic Mutation |
PSO | particle swarm optimization |
QN3 | Quasi-Newton Neural Network |
RBFNN | Radial Basis Function Neural Network |
RF | Random Forest |
RF-RFE | Random Forest-Recursive Feature Elimination |
SFS | Sequential Forward Selection |
SMOTE | Synthetic Minority Oversampling Technique |
SNs | sensor nodes |
SVD | Singular Value Decomposition |
SVM | Support Vector Machine |
TVP-IPSO | Time-Varying Parameter-Improved Particle Swarm Optimization |
WOA | Whale Optimization Algorithm |
WSN | Wireless Sensor Network |
References
- Avinash, B.; Manmohan, S.; Ajay Shriaram, K.; Shilpa, S.; Hussien Sobahi, M. Nonlinear Energy Optimization in the Wireless Sensor Network through NN-LEACH. Math. Prob. Eng. 2023, 2023, 5143260. [Google Scholar]
- Nagalalli, G.; Ravi, G. A Novel MegaBAT Optimized Intelligent Intrusion Detection System in Wireless Sensor Networks. Intell. Autom. Soft Comput. 2023, 35, 475–490. [Google Scholar] [CrossRef]
- Gautami, A.; Shanthini, J.; Karthik, S. A Quasi-Newton Neural Network Based Efficient Intrusion Detection System for Wireless Sensor Network. Comput. Syst. Sci. Eng. 2023, 45, 427–443. [Google Scholar] [CrossRef]
- Aljebreen, M.; Ahmed, M.; Ahmad, M.; Abbas, M.; Khan, A.; Alqahtani, S.; Hussien, M.A. Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks. Sensors 2023, 23, 4073. [Google Scholar] [CrossRef]
- Karthikeyan, M.; Manimegalai, D.; RajaGopal, K. Firefly Algorithm Based WSN-IoT Security Enhancement with Machine Learning for Intrusion Detection. Sci. Rep. 2024, 14, 231. [Google Scholar] [CrossRef]
- Azar, A.T.; Shehab, E.; Mattar, A.M.; Hameed, I.A.; Elsaid, S.A. Deep Learning Based Hybrid Intrusion Detection Systems to Protect Satellite Networks. J. Netw. Syst. Manag. 2023, 31, 767–788. [Google Scholar] [CrossRef]
- Alhasan, R.A.; Hamza, E.K. A Novel CNN Model with Dimensionality Reduction for WSN Intrusion Detection. Rev. d’Intell. Artif. 2023, 37, 1121–1131. [Google Scholar] [CrossRef]
- Abbas, Q.; Hina, S.; Sajjad, H.; Zaidi, K.S.; Akbar, R. Optimization of Predictive Performance of Intrusion Detection System Using Hybrid Ensemble Model for Secure Systems. PeerJ Comput. Sci. 2023, 9, e1552. [Google Scholar] [CrossRef]
- Darla, S.; Naveena, C. An Optimized Deep Learning Based Malicious Nodes Detection in Intelligent Sensor-Based Systems Using Blockchain. J. Adv. Inf. Technol. 2023, 14, 1037–1045. [Google Scholar] [CrossRef]
- Murugesh, C.; Murugan, S. Moth Search Optimizer with Deep Learning Enabled Intrusion Detection System in Wireless Sensor Networks. SSRG Int. J. Electr. Electron. Eng. 2023, 10, 77–90. [Google Scholar] [CrossRef]
- Yang, Y.; Gu, Y.; Yan, Y. Machine Learning-Based Intrusion Detection for Rare-Class Network Attacks. Electronics 2023, 12, 3911. [Google Scholar] [CrossRef]
- Awajan, A. A Novel Deep Learning-Based Intrusion Detection System for IoT Networks. Computers 2023, 12, 34. [Google Scholar] [CrossRef]
- Mandala, V.; Senthilnathan, T.; Suganyadevi, S.; Gobhinath, S.; Selvaraj, D.S.; Dhanapal, R. An Optimized Back Propagation Neural Network for Automated Evaluation of Health Condition Using Sensor Data. Meas. Sens. 2023, 29, 100846. [Google Scholar] [CrossRef]
- Hnamte, V.; Hussain, J. DCNNBiLSTM: An Efficient Hybrid Deep Learning-Based Intrusion Detection System. Telemat. Inform. Rep. 2023, 10, 100053. [Google Scholar] [CrossRef]
- Singh, A.; Amutha, J.; Nagar, J.; Sharma, S.; Lee, C.C. AutoML-ID: Automated Machine Learning Model for Intrusion Detection Using Wireless Sensor Network. Sci. Rep. 2022, 12, 9074. [Google Scholar] [CrossRef]
- Karthika, J.; Loganathan, S.; Vanathi, M. A Hybrid Machine Learning Based Feature Selection Technique for Attack Detection in NIDS. J. Phys. Conf. Ser. 2022, 2335, 012033. [Google Scholar] [CrossRef]
- Hidayat, I.; Ali, M.Z.; Arshad, A. Machine Learning-Based Intrusion Detection System: An Experimental Comparison. J. Comput. Cogn. Eng. 2022, 2, 88–97. [Google Scholar] [CrossRef]
- Patil, D.R.; Pattewar, T.M. Majority Voting and Feature Selection Based Network Intrusion Detection System. EAI Endorsed Trans. Scalable Inf. Syst. 2022, 22, e173780. [Google Scholar] [CrossRef]
- Balobaid, A.S.; Ahamed, S.B.; Shamsudheen, S.; Balamurugan, S. Neural Network Clustering and Swarm Intelligence-Based Routing Protocol for Wireless Sensor Networks: A Machine Learning Perspective. Comput. Intell. Neurosci. 2023, 2023, 4758852. [Google Scholar] [CrossRef]
- Zang, M.; Yan, Y. Machine Learning-Based Intrusion Detection System for Big Data Analytics in VANET. In Proceedings of the IEEE 93rd Vehicular Technology Conference 2021, Helsinki, Finland, 25–28 April 2021. [Google Scholar] [CrossRef]
- Khan, M.A.; Jan, M.A.; Alam, M.M.; Khalid, A.; Ahmad, M.; Manzoor, S.; Rodrigues, J.J.P.C.; Rodrigues, O. A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT. Sensors 2021, 21, 7016. [Google Scholar] [CrossRef]
- Alruhaily, N.M.; Ibrahim, D.M. A Multi-Layer Machine Learning-Based Intrusion Detection System for Wireless Sensor Networks. Sensors 2021, 12, 281–288. [Google Scholar] [CrossRef]
- Lansky, J.; Dobias, P.; Sahula, V.; Kremen, P. Deep Learning-Based Intrusion Detection Systems: A Systematic Review. IEEE Access 2021, 9, 101574–101599. [Google Scholar] [CrossRef]
- Zhang, T.; Han, D.; Marino, M.D.; Wang, L.; Li, K.C. An Evolutionary-Based Approach for Low-Complexity Intrusion Detection in Wireless Sensor Networks. Wirel. Pers. Commun. 2021, 126, 2019–2042. [Google Scholar] [CrossRef]
- Idrissi, I.; Azizi, M.; Moussaoui, O. A Lightweight Optimized Deep Learning-Based Host-Intrusion Detection System Deployed on the Edge for IoT. Int. J. Comput. Digit. Syst. 2022, 11, 209–216. [Google Scholar] [CrossRef]
- Pan, J.S.; Fan, F.; Chu, S.C.; Zhao, H.Q.; Liu, G.Y. A Lightweight Intelligent Intrusion Detection Model for Wireless Sensor Networks. Secur. Commun. Netw. 2021, 2021, 5540895. [Google Scholar] [CrossRef]
- Almomani, I.; Alenezi, M. Efficient Denial of Service Attacks Detection in Wireless Sensor Networks. J. Inf. Sci. Eng. 2018, 34, 977–1000. [Google Scholar] [CrossRef]
- Vinayakumar, R.; Alazab, M.; Soman, K.P.; Poornachandran, P.; Al-Nemrat, A.; Venkatraman, S. Deep Learning Approach for Intelligent Intrusion Detection System. IEEE Access 2019, 7, 41525–41550. [Google Scholar] [CrossRef]
- Le, T.T.H.; Park, T.; Cho, D.; Kim, H. An Effective Classification for DoS Attacks in Wireless Sensor Networks. In Proceedings of the 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN), Prague, Czech Republic, 3–6 July 2018; pp. 689–692. [Google Scholar] [CrossRef]
- Salmi, S.; Oughdir, L. Performance Evaluation of Deep Learning Techniques for DoS Attacks Detection in Wireless Sensor Network. J. Big Data 2023, 10, 17. [Google Scholar] [CrossRef]
- Nguyen, T.M.; Hanh Hong-Phuv, V.; Yoo, M. Enhancing Intrusion Detection in Wireless Sensor Networks Using a GSWO-CatBoost Approach. Sensors 2024, 24, 3339. [Google Scholar] [CrossRef]
- Mirsky, Y.; Doitshman, T.; Elovici, Y.; Shabtai, A. Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. In Proceedings of the Network and Distributed Systems Security (NDSS)Symposium 2018, San Diego, CA, USA, 18–21 February 2018. [Google Scholar] [CrossRef]
- Mohammad Hashemi, J.; Eric, K. Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems. In Proceedings of the 2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Leganes, Spain, 10–12 November 2020; pp. 1–7. [Google Scholar] [CrossRef]
- Bovenzi, G.; Aceto, G.; Ciuonzo, D.; Montieri, A.; Persico, V.; Pescape, A. Network anomaly detection methods in IoT environments via deep learning: A Fair comparison of performance and robustness. Comput. Secur. 2023, 128, 103167. [Google Scholar] [CrossRef]
- Deshpande, S.; Gujarathi, J.; Chandre, P.; Nerkar, P. A Comparative Analysis of Machine Deep Learning Algorithms for Intrusion Detection in WSN. Stud. Syst. Decis. Control 2021, 341, 173–193. [Google Scholar] [CrossRef]
- Wazirali, R.; Ahmad, R. Machine Learning Approaches to Detect DoS and Their Effect on WSNs Lifetime. Comput. Mater. Contin. 2022, 70, 4921–4946. [Google Scholar] [CrossRef]
- Premkumar, M.; Sundararajan, T.V.P. DLDM: Deep Learning-Based Defense Mechanism for Denial of Service Attacks in Wireless Sensor Networks. Microprocess. Microsyst. 2020, 79, 103278. [Google Scholar] [CrossRef]
Year | Author Names | Model Used | Dataset | Accuracy | Computational Efficiency | Energy Efficiency |
---|---|---|---|---|---|---|
2024 | Karthikeyan, M.; Manimegalai, D.; Raja Gopal, K. [5] | FA with ML | Not mentioned | 95% | High (Complex Optimization) | Moderate |
2023 | Gautami, A.; Shanthini, J.; Karthik, S. [3] | QNNN | Not mentioned | 91% | Medium | High |
2023 | Aljebreen, M.; Ahmed, M.; Ahmad, M. [4] | BCO | IoT-WSN | 93.5% | High | Low |
2023 | Azar, A.T.; Shehab, E.; Mattar, A.M. [6] | DL-HIDS | Satellite Networks | 98% | High | Low |
2023 | Alhasan, R.A.; Hamza, E.K. [7] | CNN with Dimensionality Reduction | WSN Dataset | 97% | High | Moderate |
2023 | Abbas, Q.; Hina, S. [8] | Hybrid Ensemble Model | Secure Systems | 92% | Medium | High |
2023 | Darla, S.; Naveena, C. [9] | Optimized DL | Blockchain Sensor Systems | 94% | High | Moderate |
2023 | Murugesh, C.; Murugan, S. [10] | MSO | Not mentioned | 95% | High | Moderate |
2023 | Yang, Y.; Gu, Y.; Yan, Y. [11] | ML for Rare-Class Attacks | Not mentioned | 90% | Moderate | High |
2023 | Awajan, A. [12] | Deep learning IDS for IoT | IoT Networks | 92% | High | Moderate |
2023 | Mandala, V.; Senthilnathan, T. [13] | BPNN | Sensor Data | 96% | High | Moderate |
2023 | Hnamte, V.; Hussain, J. [14] | DCNNBiLSTM | WSN | 97% | High | Moderate |
2023 | Balobaid, A.S.; Ahamed, S.B. [19] | NN Clustering | WSN | 94% | Moderate | High |
2023 | Salmi, S.; Oughdir, L. [30] | DL Techniques for DoS Detection | WSN | 92% | High | Moderate |
2022 | Singh, A.; Amutha, J. [15] | AutoML-ID | WSN Dataset | 94% | High | Moderate |
2022 | Karthika, J.; Loganathan, S. [16] | Hybrid ML Feature Selection | NIDS | 91% | Medium | High |
2022 | Patil, D.R.; Pattewar, T.M. [18] | Majority Voting and Feature Selection | Not mentioned | 89% | Medium | High |
2022 | Idrissi, I.; Azizi, M. [25] | Optimized DL-based IDS | Edge IoT | 93% | Medium | High |
2021 | Zang, M.; Yan, Y. [20] | ML for Big Data Analytics | VANET | 95% | High | Moderate |
2021 | Khan, M.A.; Jan, M.A. [21] | DL-IDS | MQTT-Enabled IoT | 96% | High | Moderate |
2021 | Alruhaily, N.M.; Ibrahim, D.M. [22] | Multi-Layer ML IDS | WSN | 93% | Moderate | High |
2021 | Pan, J.S.; Fan, F. [26] | Lightweight IDS | WSN | 94% | Moderate | High |
2024 | Abinayaa, S.S. et al. | LOA-Cb-C | WSN-DS | 99.66% | Low (Optimized) | High |
Normal | Blackhole | Grayhole | Flooding | TDMA | Total | |
---|---|---|---|---|---|---|
No. of testing samples (20%) | 67,979 | 2030 | 2943 | 618 | 1363 | 74,933 |
No. of training samples (80%) | 272,087 | 8019 | 11653 | 2694 | 5275 | 299,728 |
% of proportion | 90.77 | 2.68 | 3.9 | 0.88 | 1.77 | 374,661 |
Parameter | Input Values |
---|---|
Defining search space for hyper parameters | |
iterations | range (100, 1000, 100) |
depth | range (4, 11) |
learning rate | [0.01, 0.05, 0.1, 0.5] |
optimizer | lyrebirdOptimizer(param_space) |
best_params | optimizer.optimize(X_train, y_train) |
model= | Catboost-Classifier(best_params) |
Class | TP Rate | FP Rate | Precision | Recall | F1_Measure | ROC |
---|---|---|---|---|---|---|
Normal | 0.99 | 0.02 | 0.99 | 0.99 | 0.99 | 1.00 |
Flooding | 0.97 | 0.00 | 0.94 | 0.97 | 0.96 | 0.99 |
TDMA | 0.93 | 0.00 | 1.00 | 0.93 | 0.96 | 0.95 |
Grayhole | 0.97 | 0.00 | 0.98 | 0.97 | 0.98 | 1.00 |
Blackhole | 0.99 | 0.00 | 0.98 | 0.99 | 0.98 | 1.00 |
Weighted Average | 0.99 | 0.01 | 0.99 | 0.99 | 0.99 | 0.99 |
Class | Normal (a) | Flooding (b) | TDMA (c) | Grayhole (d) | Blackhole (e) |
---|---|---|---|---|---|
Normal (a) | 67,914 | 37 | 0 | 31 | 3 |
Flooding (b) | 16 | 663 | 0 | 0 | 0 |
TDMA (c) | 93 | 0 | 1249 | 1 | 0 |
Grayhole (d) | 33 | 0 | 0 | 2798 | 33 |
Blackhole (e) | 0 | 0 | 0 | 9 | 2052 |
Metrics | Output |
---|---|
Accuracy | 99.66 |
Error | 0.34 |
Kappa Statistic | 0.98 |
MAE (Mean Absolute Error) | 0.0025 |
RMSE (Root Mean Squared Error) | 0.034 |
Total number of instances | 74,932 |
Algorithm/Model | Performance Metrics | ||||
---|---|---|---|---|---|
Accuracy | Error | Precision | Recall | F1-Score | |
LOA-Cb-C (Proposed model) | 99.66 | 0.34 | 0.99 | 0.99 | 0.99 |
Gboost [36] | 99.60 | 0.40 | - | - | 0.98 |
MVFS [18] | 99.50 | 0.50 | 0.97 | 0.96 | 0.96 |
DLDM [37] | 99.20 | 0.80 | - | - | - |
CNN [30] | 98.79 | 1.21 | 0.94 | 0.92 | 0.93 |
SVM [35] | 98.72 | 1.28 | - | - | - |
RF [28] | 98.00 | 2.00 | 0.99 | 0.96 | 0.97 |
MLML [22] | 97.65 | 2.35 | 0.94 | 0.96 | 0.93 |
DNN [30] | 97.04 | 2.96 | 0.82 | 0.82 | 0.82 |
DT [28] | 97.00 | 3.00 | 0.94 | 0.95 | 0.95 |
CNN + RNN [30] | 96.86 | 3.14 | 0.85 | 0.85 | 0.82 |
RNN [30] | 96.48 | 3.52 | 0.85 | 0.69 | 0.75 |
NB [28] | 94.60 | 5.40 | 0.32 | 0.76 | 0.45 |
LR [28] | 93.40 | 6.60 | 0.88 | 0.77 | 0.82 |
NNC-PSOR [19] | 93.00 | 7.00 | 0.93 | 0.92 | 0.92 |
ANN [29] | 91.96 | 8.04 | 1.00 | 1.00 | 1.00 |
KNN [28] | 83.80 | 16.20 | 0.69 | 0.66 | 0.68 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Abinayaa, S.S.; Arumugam, P.; Mohan, D.B.; Rajendran, A.; Lashab, A.; Wei, B.; Guerrero, J.M. Securing the Edge: CatBoost Classifier Optimized by the Lyrebird Algorithm to Detect Denial of Service Attacks in Internet of Things-Based Wireless Sensor Networks. Future Internet 2024, 16, 381. https://doi.org/10.3390/fi16100381
Abinayaa SS, Arumugam P, Mohan DB, Rajendran A, Lashab A, Wei B, Guerrero JM. Securing the Edge: CatBoost Classifier Optimized by the Lyrebird Algorithm to Detect Denial of Service Attacks in Internet of Things-Based Wireless Sensor Networks. Future Internet. 2024; 16(10):381. https://doi.org/10.3390/fi16100381
Chicago/Turabian StyleAbinayaa, Sennanur Srinivasan, Prakash Arumugam, Divya Bhavani Mohan, Anand Rajendran, Abderezak Lashab, Baoze Wei, and Josep M. Guerrero. 2024. "Securing the Edge: CatBoost Classifier Optimized by the Lyrebird Algorithm to Detect Denial of Service Attacks in Internet of Things-Based Wireless Sensor Networks" Future Internet 16, no. 10: 381. https://doi.org/10.3390/fi16100381
APA StyleAbinayaa, S. S., Arumugam, P., Mohan, D. B., Rajendran, A., Lashab, A., Wei, B., & Guerrero, J. M. (2024). Securing the Edge: CatBoost Classifier Optimized by the Lyrebird Algorithm to Detect Denial of Service Attacks in Internet of Things-Based Wireless Sensor Networks. Future Internet, 16(10), 381. https://doi.org/10.3390/fi16100381