Javascript must be enabled to continue!
Improving IoT IDS with Harmony Search Feature Selection and ADASYN on UNSW-NB15 and CIC- IoT23
View through CrossRef
Abstract
The proliferation of Internet of Things (IoT) devices and increasing frequency of cyber-attacks have resulted in significant security challenges. The Intrusion Detection System (IDS) is a crucial network component, as it helps to protect the system from different threats and vulnerabilities. Machine learning (ML) models have demonstrated great potential in detecting attacks on IoT systems, enhancing security through intelligent threat detection. However, the perfor- mance of ML classification models can be negatively influenced by the unbalanced class distributions found in real-world datasets. To identify various attack types and to enhance IDS, we propose ensembling the Harmony Search Algorithm for feature selection (RF-HSA) together with the Adaptive Synthetic Sampling (ADASYN) to overcome class imbalance. The ADASYN enhances class balancing by generating synthetic samples, focusing more on hard-to-learn instances near decision boundaries and this approach reduces bias, improves model generaliza- tion, and mitigates overfitting for imbalanced datasets. We employed prominent ML models such as Bagging, Gradient Boosting, LightGBM, and Random For- est to classify genuine traffic from intrusion traffic. Using the UNSW-NB15 and CIC-IoT23 datasets, the proposed classifier is evaluated against other distinct classifiers to offer a detailed IDS. Performance analysis is demonstrated using evaluation metrics such as recall, F1-score, accuracy, and precision, and the out- comes are compared with the existing baselines. Apart from evaluation metrics, the training and prediction times (sec) are computed with and without ADASYN for both datasets. The proposed approach achieves accuracy values of 96.92% for the UNSW-NB15 dataset and 99.94% for the CIC-IoT23 dataset and outperforms all evaluation measures compared to baseline models for multi-classification of the IDS. Based on empirical evidence, the proposed HSA-ADASYN approach effectively outperforms existing IDS in identifying and categorizing attacks.
Springer Science and Business Media LLC
Title: Improving IoT IDS with Harmony Search Feature Selection and ADASYN on UNSW-NB15 and CIC- IoT23
Description:
Abstract
The proliferation of Internet of Things (IoT) devices and increasing frequency of cyber-attacks have resulted in significant security challenges.
The Intrusion Detection System (IDS) is a crucial network component, as it helps to protect the system from different threats and vulnerabilities.
Machine learning (ML) models have demonstrated great potential in detecting attacks on IoT systems, enhancing security through intelligent threat detection.
However, the perfor- mance of ML classification models can be negatively influenced by the unbalanced class distributions found in real-world datasets.
To identify various attack types and to enhance IDS, we propose ensembling the Harmony Search Algorithm for feature selection (RF-HSA) together with the Adaptive Synthetic Sampling (ADASYN) to overcome class imbalance.
The ADASYN enhances class balancing by generating synthetic samples, focusing more on hard-to-learn instances near decision boundaries and this approach reduces bias, improves model generaliza- tion, and mitigates overfitting for imbalanced datasets.
We employed prominent ML models such as Bagging, Gradient Boosting, LightGBM, and Random For- est to classify genuine traffic from intrusion traffic.
Using the UNSW-NB15 and CIC-IoT23 datasets, the proposed classifier is evaluated against other distinct classifiers to offer a detailed IDS.
Performance analysis is demonstrated using evaluation metrics such as recall, F1-score, accuracy, and precision, and the out- comes are compared with the existing baselines.
Apart from evaluation metrics, the training and prediction times (sec) are computed with and without ADASYN for both datasets.
The proposed approach achieves accuracy values of 96.
92% for the UNSW-NB15 dataset and 99.
94% for the CIC-IoT23 dataset and outperforms all evaluation measures compared to baseline models for multi-classification of the IDS.
Based on empirical evidence, the proposed HSA-ADASYN approach effectively outperforms existing IDS in identifying and categorizing attacks.
Related Results
Network Intrusion Detection System based on Machine Learning algorithm using UNSW-NB15 Dataset
Network Intrusion Detection System based on Machine Learning algorithm using UNSW-NB15 Dataset
Network play important role in real life and cyber security has become a vital in reaearch.An intrusion detection system (IDS)which is important in Network Intrusion Detectyion Sy...
MIDS-GAN: Minority Intrusion Data Synthesizer GAN—An ACON Activated Conditional GAN for Minority Intrusion Detection
MIDS-GAN: Minority Intrusion Data Synthesizer GAN—An ACON Activated Conditional GAN for Minority Intrusion Detection
Intrusion Detection Systems (IDS) are vital to cybersecurity but suffer from severe class imbalance in benchmark datasets such as NSL-KDD and UNSW-NB15. Conventional oversampling m...
The Comprehensive Evaluation on the Integral Development of Volcanic Gas Reserves and CO2 Flooding in Jilin Oil Field
The Comprehensive Evaluation on the Integral Development of Volcanic Gas Reserves and CO2 Flooding in Jilin Oil Field
Abstract
Pilot-CO2 flooding in Jilin Oil Field has been got a first base in recent years in order to ensure CO2 coming from the development of volcanic gas reserv...
Mobile Agent (MA) Based Intrusion Detection Systems (IDS): A Systematic Review
Mobile Agent (MA) Based Intrusion Detection Systems (IDS): A Systematic Review
An Intrusion Detection System (IDS) identifies the attacks by analysing the events, considered undesirable from a security perspective, in systems and networks. It is necessary for...
Hungarian Vowel Harmony
Hungarian Vowel Harmony
Vowel harmony is the phonological requirement that vowels must agree in their specifications for some designated feature(s) (e.g., backness, roundness, height, tongue root) within ...
Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Smart manufacturing has been developed since the introduction of Industry 4.0. It consists of resource sharing and networking, predictive engineering, and material and data analyti...
The Community Interest Company
The Community Interest Company
The purpose of the paper is to investigate the success of the development of the Community Interest Company (CIC). The CIC corporate form was created in 2005, designed with an asse...

