Towards An Efficient Internet of Things Intrusion Detection by Using Support Vector Machine
DOI:
https://doi.org/10.21123/bsj.2024.11067Keywords:
Gaussian Pyramid, GP Model, IDS, IoT, SVM.Abstract
Intrusion Detection Systems (IDS) are crucial for safeguarding Internet of Things (IoT) networks against security threats. The integration of Support Vector Machine (SVM) with smart IDs has been a significant advancement in detecting anomalous activities. This research contributes to this field by implementing the Gaussian Pyramid (GP) algorithm, significantly reducing the processing amount and storage space required for large IoT network traffic datasets. This approach enables the GP model to classify thousands of data points in large-scale problems with high-dimensional input space. Notably, the GP model, with various kernel sizes, outperforms traditional nonlinear SVM and Artificial Neural Networks (ANN) in terms of efficiency and accuracy. For instance, with kernel sizes of 5, 7, and 9, the GP model demonstrated superior performance on the NSL-KDD dataset, achieving accuracy and AUC (Area Under the Curve) values higher than both nonlinear SVM and ANN. In kernel size 9, the GP model achieved the highest overall accuracy of 0.96% on the CIC-DDoS2019 dataset. The experimental results confirm that applying the GP model to IoT data traffic significantly reduces time complexity and enhances the performance of binary and multi class SVM, marking a substantial advancement in IoT intrusion detection.
Received 29/02/2024
Revised 06/07/2024
Accepted 08/07/2024
Published Online First 20/12/2024
References
John Dian F, Vahidnia R, Rahmati A. Wearables and the Internet of Things (IoT), applications, opportunities, and challenges: A Survey. IEEE Access. 2020; (8): 69200-69211. https://doi.org/10.1109/access.2020.2986329
Meghana S, Srinath R. A novel mechanism for clone attack detection in hybrid IoT. Int Res J Eng Technol. 2019; 7(5):264-268.
Abdulhadi HM, Aldeen YAAS, Yousif MA, Jaseem M Jalal, Madni SHH. Enhancing Smart Cities with IoT and Cloud Computing: A Study on Integrating Wireless Ad Hoc Networks for Efficient Communication. Baghdad Sci J. 2023; 20(6 Suppl): 2672-2672. https://doi.org/10.21123/bsj.2023.9277
Awajan A. A novel deep learning-based intrusion detection system for IOT networks. Computers. 2023; 12(2): 34-51. https://doi.org/10.3390/computers12020034
Charbuty B, Abdulazeez A. Classification based on decision tree algorithm for machine learning. J Appl Sci Technol Trends. 2021; 2(01): 20-28. https://doi.org/10.38094/jastt20165
Piccialli V, Sciandrone M. Nonlinear optimization and support vector machines. Ann Oper Res. 2022; 314(1): 15-47. https://doi.org/10.1007/s10288-018-0378-2
Prakruthi ST, Muralidharan A, Dhanalakshmi B, Dubey A. A Survey on the Various UAV Landing Sign Detection Techniques. 2018; 6(3):1417-1420.
Tavara S. Parallel computing of support vector machines: a survey. ACM Comput Surv. 2019; (6): 1-38. https://doi.org/10.1145/3280989
Lou C, Xie X. Multi-view universum support vector machines with insensitive pinball loss. Expert Syst Appl. 2024; 248: 123480. https://doi.org/10.1016/j.eswa.2024.123480
Jiang K, Wang W, Wang A, Wu H. Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access. 2020; 8: 32464-32476. https://doi.org/10.1109/access.2020.2973730
Su T, Sun H, Zhu J, Wang S, Li Y. BAT: Deep learning methods on network intrusion detection using NSL-KDD dataset. IEEE Access. 2020. https://doi.org/10.1109/access.2020.2972627
Fu Y, Du Y, Cao Z, Li Q, Xiang W. A deep learning model for network intrusion detection with imbalanced data. Electronics. 2022; 11(6): 898-900. https://doi.org/10.3390/electronics11060898
Wisanwanichthan T, Thammawichai M. A double-layered hybrid approach for network intrusion detection system using combined naive bayes and SVM. IEEE Access. 2021; 9: 138432-138450. https://doi.org/10.1109/access.2021.3118573
Al-Qatf M, Lasheng Y, Al-Habib M, Al-Sabahi K. Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access. 2018; 8: 194269-194288. https://doi.org/10.1109/access.2018.2869577
Alamri HA, Thayananthan V. Bandwidth control mechanism and extreme gradient boosting algorithm for protecting software-defined networks against DDoS attacks. IEEE Access. 2020. https://doi.org/10.1109/access.2020.3033942
Boonchai J, Kitchat K, Nonsiri S. The classification of DDoS attacks using deep learning techniques. In: 2022 7th International Conference on Business and Industrial Research (ICBIR); 2022. https://doi.org/10.1109/icbir54589.2022.9786394
Salih AA, Abdulrazaq MB. Cybernet Model: A New Deep Learning Model for Cyber DDoS Attacks Detection and Recognition. Comput Mater Contin. 2024; 78: 1275-1295. https://doi.org/10.32604/cmc.2023.046101
Song Y, Hyun S, Cheong YG. Analysis of autoencoders for network intrusion detection. 2021. https://doi.org/10.3390/s21134294
Kurani A, Doshi P, Vakharia A, Shah M. A comprehensive comparative study of artificial neural network (ANN) and support vector machines (SVM) on stock forecasting. Ann Data Sci. 2023; 10(1): 183-208. https://doi.org/10.1007/s40745-021-00344-x
Huang J, Lu J, Ling CX. Comparing naive Bayes, decision trees, and SVM with AUC and accuracy. In: Third IEEE International Conference on Data Mining; 2023. https://doi.org/10.1109/icdm.2003.1250975
Salim KG, Al-alak SMK, Jawad MJ. Improved image security in Internet of Things (IoT) using multiple key AES. Baghdad Sci J. 2021; 18(2): 0417-0417. https://doi.org/10.21123/bsj.2021.18.2.0417
NSL-KDD dataset. Canadian Institute for Cybersecurity.
DDoS evaluation dataset (CIC-DDoS2019) dataset. Canadian Institute for Cybersecurity.
Goutte C, Zhu X. Advances in Artificial Intelligence: 33rd Canadian Conference on Artificial Intelligence; 2020. https://doi.org/10.1007/978-3-030-47358-7
Abo Zidan R, Karraz G. Gaussian Pyramid for Nonlinear Support Vector Machine. Appl Comput Intell Soft Comput. 2022; 2022(1): 5255346. https://doi.org/10.1155/2022/5255346
Downloads
Issue
Section
License
Copyright (c) 2024 Rawan Abo Zidan, George Karraz
This work is licensed under a Creative Commons Attribution 4.0 International License.