Intrusion Detection in IoT Networks Using Extra Trees, Random Forests, and Hybrid Optimization Algorithms

Xiaonan Chen

Abstract


The Internet of Things (IoT) is essentially the physical objects that communicate over the internet with the purpose of remote measurement and control. In the area of IoT network security, it is crucial that all types of attacks on these networks are correctly recognized and that intelligent intrusion detection is done with high accuracy and at high speed. Thus, a model has been proposed in this paper to identify the intrusion of the IoT network with the help of optimized Machine Learning (ML) models. The core classifiers used here are Extra Trees (EXT) and Random Forest (RF). In the effort of enhancing the correctness of prediction, 6 various optimization algorithms, such as Grey Wolf Optimizer (GWO), Hunger Games Search (HGS), Moth-Flame Optimization (MFO), Satin Bowerbird Optimization (SBO), Slime Mould Algorithm (SMA), and Whale Optimization Algorithm (WOA), were employed for the hyperparameter (HPs) tuning of the main classifiers. The authors performed their evaluation tests on the CICIoT2023 dataset that contains over 1.19 million labeled network traffic records with 47 features and 33 different attack types. These were captured in a smart home-like IoT topology of 105 devices. The performance criteria were Accuracy, Precision, Recall, and F1-score. The EXT-MFO hybrid model from the proposed set registered the highest performance by an accuracy of 90.72% and an F1-score of 0.905. These results exceeded those of other EXT-based and RF-based variants. Finally, the accuracy of different models was also checked by performing a case study on the dataset that contains 10 cyberattacks in an IoT topology with 105 devices. The results indicated that the EXT-MFO hybrid model outperformed other models in terms of F1-score values and, therefore, was more accurate. The findings reveal that the most suitable optimizers for energy optimization of EXT and RF classifiers are the MFO and SMA algorithms, respectively. The findings also suggested that, generally, the models on the EXT classifier complemented by different optimizers are the ones that use more time for HP optimization. The results show that the EXT-MFO model outperforms all other State-of-the-Art (SOTA) optimization algorithms in the Internet of Things (IoT) Intrusion Detection (ID). Therefore, the EXT-MFO hybrid model, which is based on the research results, is put forward to find out the attempted attacks aimed at the IoT network.


Full Text:

PDF

References


R. A. R. A. Mouha, “Internet of things (IoT),” Journal of Data Analysis and Information Processing, 9(02):77, 2021. DOI:10.4236/ait.2022.123004

L. Khalid and L. Khalid, “Internet of Things (IoT),” Software Architecture for Business, 107–127, 2020. https://doi.org/10.1007/978-3-030-13632-1

F. A. Balouch, K. M. Wafa, and A. Ahmad, “Internet of things (iot), its application area and combination with gps,” Galaxy International Interdisciplinary Research Journal, 10(1):725–734, 2022. Doi: 10.3390/s22155738

M. Lombardi, F. Pascale, and D. Santaniello, “Internet of things: A general overview between architectures, protocols and applications,” Information, 12(2):87, 2021. https://doi.org/10.3390/info12020087

Y. Shah and S. Sengupta, “A survey on Classification of Cyber-attacks on IoT and IIoT devices,” in 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), IEEE, 2020, 406–413. DOI:10.1109/UEMCON51285.2020.9298138

Y. Bin Zikria, R. Ali, M. K. Afzal, and S. W. Kim, “Next-generation internet of things (iot): Opportunities, challenges, and solutions,” Sensors, 21(4): 1174, 2021. https://doi.org/10.3390/s21041174

A. A. Laghari, K. Wu, R. A. Laghari, M. Ali, and A. A. Khan, “A review and state of art of Internet of Things (IoT),” Archives of Computational Methods in Engineering, 1–19, 2021. https://doi.org/10.1007/s11831-021-09622-6

I. Lee, “Internet of Things (IoT) cybersecurity: Literature review and IoT cyber risk management,” Future Internet, 12(9): 157, 2020. https://doi.org/10.3390/fi12090157

A. E. Omolara, A. Alabdulatif, O. I. Abiodun, M. Alawida, A. Alabdulatif, and H. Arshad, “The internet of things security: A survey encompassing unexplored areas and new insights,” Comput Secur, 112, 102494, 2022. https://doi.org/10.1016/j.cose.2021.102494

O. I. Abiodun, E. O. Abiodun, M. Alawida, R. S. Alkhawaldeh, and H. Arshad, “A review on the security of the internet of things: Challenges and solutions,” Wirel Pers Commun, 119, 2603–2637, 2021. https://doi.org/10.1007/s11277-021-08348-9

O. Kayode, “‘Machine Learning Approaches to Improve Security and Performance Monitoring of IoT Devices,’,” The University of Texas at San Antonio, 2020. https://doi.org/10.1016/j.iotcps.2023.12.003

P. Shukla, C. R. Krishna, and N. V. Patil, “Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review,” J Supercomput, 80(7):9986–10043, 2024. https://doi.org/10.1007/s11227-023-05843-7

Y. K. Saheed, A. I. Abiodun, S. Misra, M. K. Holone, and R. Colomo-Palacios, “A machine learning-based intrusion detection for detecting internet of things network attacks,” Alexandria Engineering Journal, 61(12): 9395–9409, 2022. https://doi.org/10.1016/j.aej.2022.02.063

O. Vermesan et al., “Internet of things strategic research and innovation agenda,” in Internet of things, River Publishers, 2022, 7–151. DOI:10.1201/9781003338659-2

S. Rizvi, R. Pipetti, N. McIntyre, J. Todd, and I. Williams, “Threat model for securing internet of things (IoT) network at device-level,” Internet of Things, 11, 100240, 2020. https://doi.org/10.1016/j.iot.2020.100240

A. K. Sahu, S. Sharma, M. Tanveer, and R. Raja, “Internet of Things attack detection using hybrid Deep Learning Model,” Comput Commun, 176, 146–154, 2021. https://doi.org/10.1016/j.comcom.2021.05.024

M. R. Islam and K. M. Aktheruzzaman, “An analysis of cybersecurity attacks against internet of things and security solutions,” Journal of Computer and Communications, 8(04): 11, 2020. DOI:10.4236/jcc.2020.84002

M. Aqeel, F. Ali, M. W. Iqbal, T. A. Rana, M. Arif, and M. R. Auwul, “A review of security and privacy concerns in the internet of things (IoT),” J Sens, 2022(1):5724168, 2022. https://doi.org/10.1155/2022/5724168

M. Shafiq, Z. Gu, O. Cheikhrouhou, W. Alhakami, and H. Hamam, “The Rise of ‘Internet of Things’: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks,” Wirel Commun Mob Comput, 2022(1): 8669348, 2022. https://doi.org/10.1155/2022/8669348

G. P. Singh and P. K. Bangotra, “Internet of Things (IoT): vulnerability, attacks, and security,” in Wireless Sensor Networks and the Internet of Things, Apple Academic Press, 2021, 247–262. https://doi.org/10.1016/j.jiixd.2023.12.001

M. Wazzan, D. Algazzawi, O. Bamasaq, A. Albeshri, and L. Cheng, “Internet of Things botnet detection approaches: Analysis and recommendations for future research,” Applied Sciences, 11(12): 5713, 2021. https://doi.org/10.3390/app11125713

Y.-W. Chen, J.-P. Sheu, Y.-C. Kuo, and N. Van Cuong, “Design and implementation of IoT DDoS attacks detection system based on machine learning,” in 2020 European Conference on Networks and Communications (EuCNC), IEEE, 2020, 122–127. DOI:10.1109/EuCNC48522.2020.9200909

F. Hussain, S. G. Abbas, M. Husnain, U. U. Fayyaz, F. Shahzad, and G. A. Shah, “IoT DoS and DDoS attack detection using ResNet,” in 2020 IEEE 23rd International Multitopic Conference (INMIC), IEEE, 2020, 1–6. DOI:10.1109/INMIC50486.2020.9318216

S. Evmorfos, G. Vlachodimitropoulos, N. Bakalos, and E. Gelenbe, “Neural network architectures for the detection of SYN flood attacks in IoT systems,” in Proceedings of the 13th ACM International Conference on PErvasive Technologies Related to Assistive Environments, 2020, 1–4. https://doi.org/10.1145/3389189.3398000

M. Roopak, G. Y. Tian, and J. Chambers, “An intrusion detection system against DDoS attacks in IoT networks,” in 2020 10th annual computing and communication workshop and conference (CCWC), IEEE, 2020, 562–567. DOI:10.1109/CCWC47524.2020.9031206

A. Dushimimana, T. Tao, R. Kindong, and A. Nishyirimbere, “Bi-directional recurrent neural network for intrusion detection system (IDS) in the internet of things (IoT),” Int. J. Adv. Eng. Res. Sci, 7, 524–539, 2020.Doi: 10.22161/ijaers.73.68

M. Almiani, A. AbuGhazleh, Y. Jararweh, and A. Razaque, “DDoS detection in 5G-enabled IoT networks using deep Kalman backpropagation neural network,” International Journal of Machine Learning and Cybernetics, 12(11):3337–3349, 2021. https://doi.org/10.1007/s13042-021-01323-7

F. F. Setiadi, M. W. A. Kesiman, and K. Y. E. Aryanto, “Detection of dos attacks using naive bayes method based on internet of things (iot),” in Journal of Physics: Conference Series, IOP Publishing, 2021, 012013. DOI:10.1088/1742-6596/1810/1/012013

A. Churcher et al., “An experimental analysis of attack classification using machine learning in IoT networks,” Sensors, 21(2):446, 2021. https://doi.org/10.3390/s21020446

S. Chesney, K. Roy, and S. Khorsandroo, “Machine learning algorithms for preventing IoT cybersecurity attacks,” in Intelligent Systems and Applications: Proceedings of the 2020 Intelligent Systems Conference (IntelliSys) Volume 3, Springer, 2021, 679–686. https://doi.org/10.1007/978-3-030-55190-2_53

P. Singh Samom and A. Taggu, “Distributed denial of service (DDoS) attacks detection: A machine learning approach,” in Applied Soft Computing and Communication Networks: Proceedings of ACN 2020, Springer, 2021, 75–87. https://doi.org/10.1007/978-981-33-6173-7_6

A. Izadi, N. Zarei, M. R. Nikoo, M. Al-Wardy, and F. Yazdandoost, “Exploring the potential of deep learning for streamflow forecasting: A comparative study with hydrological models for seasonal and perennial rivers,” Expert Syst Appl, 252, 124139, 2024. https://doi.org/10.1016/j.eswa.2024.124139

H. Khajavi and A. Rastgoo, “Predicting the carbon dioxide emission caused by road transport using a Random Forest (RF) model combined by Meta-Heuristic Algorithms,” Sustain Cities Soc, 93, 104503, 2023. https://doi.org/10.1016/j.scs.2023.104503

M. Ghadiri, A. A. Rassafi, and B. Mirbaha, “The effects of traffic zoning with regular geometric shapes on the precision of trip production models,” J Transp Geogr, 78, 150–159, 2019. https://doi.org/10.1016/j.jtrangeo.2019.05.018

S. Narkhede, “Understanding auc-roc curve,” Towards data science, 26(1): 220–227, 2018.

DOI:10.4103/tjem.tjem_182_23

H. Khajavi and A. Rastgoo, “Improving the prediction of heating energy consumed at residential buildings using a combination of support vector regression and meta-heuristic algorithms,” Energy, 272, 127069, 2023. https://doi.org/10.1016/j.energy.2023.127069

A. Rastgoo and H. Khajavi, “A novel study on forecasting the airfoil self-noise, using a hybrid model based on the combination of CatBoost and Arithmetic Optimization Algorithm,” Expert Syst Appl, 229, 120576, 2023. https://doi.org/10.1016/j.eswa.2023.120576

S. Gupta, G. Arango-Argoty, L. Zhang, A. Pruden, and P. Vikesland, “Identification of discriminatory antibiotic resistance genes among environmental resistomes using extremely randomized tree algorithm,” Microbiome, 7, 1–15, 2019. https://doi.org/10.1186/s40168-019-0735-1

E. Eslami, A. K. Salman, Y. Choi, A. Sayeed, and Y. Lops, “A data ensemble approach for real-time air quality forecasting using extremely randomized trees and deep neural networks,” Neural Comput Appl, 32, 7563–7579, 2020. https://doi.org/10.1007/s00521-019-04287-6

A. Sharaff and H. Gupta, “Extra-tree classifier with metaheuristics approach for email classification,” in Advances in Computer Communication and Computational Sciences: Proceedings of IC4S 2018, Springer, 2019, 189–197. https://doi.org/10.1007/978-981-13-6861-5_17

U. Saeed, S. U. Jan, Y.-D. Lee, and I. Koo, “Fault diagnosis based on extremely randomized trees in wireless sensor networks,” Reliab Eng Syst Saf, 205, 107284, 2021. https://doi.org/10.1016/j.ress.2020.107284

Ö. Akar and O. Güngör, “Rastgele orman algoritması kullanılarak çok bantlı görüntülerin sınıflandırılması,” Jeodezi ve Jeoinformasyon Dergisi, (106):139–146, 2012. https://doi.org/10.9733/jgg.241212.1t

A. Sarica, A. Cerasa, and A. Quattrone, “Random Forest algorithm for the classification of neuroimaging data in Alzheimer’s disease: a systematic review,” Front Aging Neurosci, 9. 329, 2017. https://doi.org/10.3389/fnagi.2017.00329

M. Schonlau and R. Y. Zou, “The random forest algorithm for statistical learning,” Stata J, 20(1):3–29, 2020. https://doi.org/10.1177/1536867X209096

K. VijiyaKumar, B. Lavanya, I. Nirmala, and S. S. Caroline, “Random Forest algorithm for the prediction of diabetes,” in 2019 IEEE international conference on system, computation, automation and networking (ICSCAN), IEEE, 20191–5. DOI:10.1109/ICSCAN.2019.8878802

E. K. Sahin, “Comparative analysis of gradient boosting algorithms for landslide susceptibility mapping,” Geocarto Int, 37(9);2441–2465, 2022. https://doi.org/10.1080/10106049.2020.1831623

Y. Wan, M. Mao, L. Zhou, Q. Zhang, X. Xi, and C. Zheng, “A novel nature-inspired maximum power point tracking (MPPT) controller based on SSA-GWO algorithm for partially shaded photovoltaic systems,” Electronics (Basel), 8(6): 680, 2019. https://doi.org/10.3390/electronics8060680

Y. Yang, H. Chen, A. A. Heidari, and A. H. Gandomi, “Hunger games search: Visions, conception, implementation, deep analysis, perspectives, and towards performance shifts,” Expert Syst Appl, 177, 114864, 2021. https://doi.org/10.1016/j.eswa.2021.114864

H. Nguyen and X.-N. Bui, “A novel hunger games search optimization-based artificial neural network for predicting ground vibration intensity induced by mine blasting,” Natural Resources Research, 30(5):3865–3880, 2021. https://doi.org/10.1007/s11053-021-09903-8

W. S. AbuShanab, M. Abd Elaziz, E. I. Ghandourah, E. B. Moustafa, and A. H. Elsheikh, “A new fine-tuned random vector functional link model using Hunger games search optimizer for modeling friction stir welding process of polymeric materials,” journal of materials research and technology, 141482–1493, 2021. https://doi.org/10.1016/j.jmrt.2021.07.031

S. Mirjalili, “Moth-flame optimization algorithm: A novel nature-inspired heuristic paradigm,” Knowl Based Syst, 89228–249, 2015. https://doi.org/10.1016/j.knosys.2015.07.006

L. Yang, H. Nguyen, X.-N. Bui, T. Nguyen-Thoi, J. Zhou, and J. Huang, “Prediction of gas yield generated by energy recovery from municipal solid waste using deep neural network and moth-flame optimization algorithm,” J Clean Prod 311, 127672, 2021. https://doi.org/10.1016/j.jclepro.2021.127672

O. Bozorg-Haddad, Advanced optimization by nature-inspired algorithms, 720. Springer, 2018. https://doi.org/10.1007/978-981-10-5221-7

S. H. S. Moosavi and V. K. Bardsiri, “Satin bowerbird optimizer: A new optimization algorithm to optimize ANFIS for software development effort estimation,” Eng Appl Artif Intell, 60, 1–15, 2017. https://doi.org/10.1007/978-981-10-5221-7

S. Zhang, Y. Zhou, and Q. Luo, “A complex-valued encoding satin bowerbird optimization algorithm for global optimization,” Evolving Systems, 12, 191–205, 2021. https://doi.org/10.1007/s12530-019-09307-3

S. Li, H. Chen, M. Wang, A. A. Heidari, and S. Mirjalili, “Slime mould algorithm: A new method for stochastic optimization,” Future generation computer systems, 111, 300–323, 2020. https://doi.org/10.1016/j.future.2020.03.055

M. Abdel-Basset, R. Mohamed, R. K. Chakrabortty, M. J. Ryan, and S. Mirjalili, “An efficient binary slime mould algorithm integrated with a novel attacking-feeding strategy for feature selection,” Comput Ind Eng, 153, 107078, 2021. https://doi.org/10.1016/j.cie.2020.107078

E. H. Houssein, M. A. Mahdy, M. J. Blondin, D. Shebl, and W. M. Mohamed, “Hybrid slime mould algorithm with adaptive guided differential evolution algorithm for combinatorial and global optimization problems,” Expert Syst Appl, 174, 114689, 2021. https://doi.org/10.1016/j.eswa.2021.114689

Z. A. A. Alyasseri et al., “Recent advances of whale optimization algorithm, its versions and applications,” Handbook of Whale Optimization Algorithm, 9–31, 2024. https://doi.org/10.1016/B978-0-32-395365-8.00008-7

A. G. Hussien, A. E. Hassanien, E. H. Houssein, M. Amin, and A. T. Azar, “New binary whale optimization algorithm for discrete optimization problems,” Engineering Optimization, 52 (6):945–959, 2020.

https://doi.org/10.1080/0305215X.2019.1624740

N. Rana, M. S. A. Latiff, S. M. Abdulhamid, and H. Chiroma, “Whale optimization algorithm: a systematic review of contemporary applications, modifications and developments,” Neural Comput Appl, 32, 16245–16277, 2020. https://doi.org/10.1007/s00521-020-04849-z

Q.-V. Pham, S. Mirjalili, N. Kumar, M. Alazab, and W.-J. Hwang, “Whale optimization algorithm with applications to resource allocation in wireless networks,” IEEE Trans Veh Technol, 69 (4):4285–4297, 2020. DOI:10.1109/TVT.2020.2973294

E. C. P. Neto, S. Dadkhah, R. Ferreira, A. Zohourian, R. Lu, and A. A. Ghorbani, “CICIoT2023: A real-time dataset and benchmark for large-scale attacks in IoT environment,” Sensors, 23(13):5941, 2023. https://doi.org/10.3390/s23135941

Z.-M. Gao and J. Zhao, “An improved grey wolf optimization algorithm with variable weights,” Comput Intell Neurosci, 2019(1):2981282, 2019.

https://doi.org/10.1155/2019/2981282




DOI: https://doi.org/10.31449/inf.v49i18.7734

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.