Towards An Efficient Internet of Things Intrusion Detection by Using Support Vector Machine

Authors

  • Rawan Abo Zidan PHD Program, Syrian Virtual University, Damascus, Syria. https://orcid.org/0000-0002-2620-2810
  • George Karraz Department of Artificial Intelligence and Natural Languages Processing, Faculty of Information Technology Engineering, Damascus University, Damascus, Syria.

DOI:

https://doi.org/10.21123/bsj.2024.11067

Keywords:

Gaussian Pyramid, GP Model, IDS, IoT, SVM.

Abstract

Intrusion Detection Systems (IDS) are crucial for safeguarding Internet of Things (IoT) networks against security threats. The integration of Support Vector Machine (SVM) with smart IDs has been a significant advancement in detecting anomalous activities. This research contributes to this field by implementing the Gaussian Pyramid (GP) algorithm, significantly reducing the processing amount and storage space required for large IoT network traffic datasets. This approach enables the GP model to classify thousands of data points in large-scale problems with high-dimensional input space. Notably, the GP model, with various kernel sizes, outperforms traditional nonlinear SVM and Artificial Neural Networks (ANN) in terms of efficiency and accuracy. For instance, with kernel sizes of 5, 7, and 9, the GP model demonstrated superior performance on the NSL-KDD dataset, achieving accuracy and AUC (Area Under the Curve) values higher than both nonlinear SVM and ANN. In kernel size 9, the GP model achieved the highest overall accuracy of 0.96% on the CIC-DDoS2019 dataset. The experimental results confirm that applying the GP model to IoT data traffic significantly reduces time complexity and enhances the performance of binary and multi class SVM, marking a substantial advancement in IoT intrusion detection.

References

John Dian F, Vahidnia R, Rahmati A. Wearables and the Internet of Things (IoT), applications, opportunities, and challenges: A Survey. IEEE Access. 2020; (8): 69200-69211. https://doi.org/10.1109/access.2020.2986329

Meghana S, Srinath R. A novel mechanism for clone attack detection in hybrid IoT. Int Res J Eng Technol. 2019; 7(5):264-268.

Abdulhadi HM, Aldeen YAAS, Yousif MA, Jaseem M Jalal, Madni SHH. Enhancing Smart Cities with IoT and Cloud Computing: A Study on Integrating Wireless Ad Hoc Networks for Efficient Communication. Baghdad Sci J. 2023; 20(6 Suppl): 2672-2672. https://doi.org/10.21123/bsj.2023.9277

Awajan A. A novel deep learning-based intrusion detection system for IOT networks. Computers. 2023; 12(2): 34-51. https://doi.org/10.3390/computers12020034

Charbuty B, Abdulazeez A. Classification based on decision tree algorithm for machine learning. J Appl Sci Technol Trends. 2021; 2(01): 20-28. https://doi.org/10.38094/jastt20165

Piccialli V, Sciandrone M. Nonlinear optimization and support vector machines. Ann Oper Res. 2022; 314(1): 15-47. https://doi.org/10.1007/s10288-018-0378-2

Prakruthi ST, Muralidharan A, Dhanalakshmi B, Dubey A. A Survey on the Various UAV Landing Sign Detection Techniques. 2018; 6(3):1417-1420.

Tavara S. Parallel computing of support vector machines: a survey. ACM Comput Surv. 2019; (6): 1-38. https://doi.org/10.1145/3280989

Lou C, Xie X. Multi-view universum support vector machines with insensitive pinball loss. Expert Syst Appl. 2024; 248: 123480. https://doi.org/10.1016/j.eswa.2024.123480

Jiang K, Wang W, Wang A, Wu H. Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access. 2020; 8: 32464-32476. https://doi.org/10.1109/access.2020.2973730

Su T, Sun H, Zhu J, Wang S, Li Y. BAT: Deep learning methods on network intrusion detection using NSL-KDD dataset. IEEE Access. 2020. https://doi.org/10.1109/access.2020.2972627

Fu Y, Du Y, Cao Z, Li Q, Xiang W. A deep learning model for network intrusion detection with imbalanced data. Electronics. 2022; 11(6): 898-900. https://doi.org/10.3390/electronics11060898

Wisanwanichthan T, Thammawichai M. A double-layered hybrid approach for network intrusion detection system using combined naive bayes and SVM. IEEE Access. 2021; 9: 138432-138450. https://doi.org/10.1109/access.2021.3118573

Al-Qatf M, Lasheng Y, Al-Habib M, Al-Sabahi K. Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access. 2018; 8: 194269-194288. https://doi.org/10.1109/access.2018.2869577

Alamri HA, Thayananthan V. Bandwidth control mechanism and extreme gradient boosting algorithm for protecting software-defined networks against DDoS attacks. IEEE Access. 2020. https://doi.org/10.1109/access.2020.3033942

Boonchai J, Kitchat K, Nonsiri S. The classification of DDoS attacks using deep learning techniques. In: 2022 7th International Conference on Business and Industrial Research (ICBIR); 2022. https://doi.org/10.1109/icbir54589.2022.9786394

Salih AA, Abdulrazaq MB. Cybernet Model: A New Deep Learning Model for Cyber DDoS Attacks Detection and Recognition. Comput Mater Contin. 2024; 78: 1275-1295. https://doi.org/10.32604/cmc.2023.046101

Song Y, Hyun S, Cheong YG. Analysis of autoencoders for network intrusion detection. 2021. https://doi.org/10.3390/s21134294

Kurani A, Doshi P, Vakharia A, Shah M. A comprehensive comparative study of artificial neural network (ANN) and support vector machines (SVM) on stock forecasting. Ann Data Sci. 2023; 10(1): 183-208. https://doi.org/10.1007/s40745-021-00344-x

Huang J, Lu J, Ling CX. Comparing naive Bayes, decision trees, and SVM with AUC and accuracy. In: Third IEEE International Conference on Data Mining; 2023. https://doi.org/10.1109/icdm.2003.1250975

Salim KG, Al-alak SMK, Jawad MJ. Improved image security in Internet of Things (IoT) using multiple key AES. Baghdad Sci J. 2021; 18(2): 0417-0417. https://doi.org/10.21123/bsj.2021.18.2.0417

NSL-KDD dataset. Canadian Institute for Cybersecurity.

DDoS evaluation dataset (CIC-DDoS2019) dataset. Canadian Institute for Cybersecurity.

Goutte C, Zhu X. Advances in Artificial Intelligence: 33rd Canadian Conference on Artificial Intelligence; 2020. https://doi.org/10.1007/978-3-030-47358-7

Abo Zidan R, Karraz G. Gaussian Pyramid for Nonlinear Support Vector Machine. Appl Comput Intell Soft Comput. 2022; 2022(1): 5255346. https://doi.org/10.1155/2022/5255346

Downloads

Issue

Section

article

How to Cite

1.
Towards An Efficient Internet of Things Intrusion Detection by Using Support Vector Machine. Baghdad Sci.J [Internet]. [cited 2024 Dec. 23];22(7). Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/11067