A Comparison of Enhanced Ensemble Learning Techniques for Internet of Things Network Attack Detection

  • Edi Ismanto Universitas Muhammadiyah Riau, Pekanbaru, Indonesia
  • Januar Al Amien Universitas Muhammadiyah Riau, Pekanbaru, Indonesia
  • Vitriani Vitriani Universitas Muhammadiyah Riau, Pekanbaru, Indonesia
Keywords: Attack Detection, Ensemble Learning, Internet of Things Network

Abstract

Over the past few decades, the Internet of Things (IoT) has become increasingly significant due to its capacity to enable low-cost device and sensor communication. Implementation has opened up many new opportunities in terms of efficiency, productivity, convenience, and security. However, it has also brought about new privacy and data security challenges, interoperability, and network reliability. The research issue is that IoT devices are frequently open to attacks. Certain machine learning (ML) algorithms still struggle to handle imbalanced data and have weak generalization skills when compared to ensemble learning. The research aims to develop security for IoT networks based on enhanced ensemble learning by using Grid Search and Random Search techniques. The method used is the ensemble learning approach, which consists of Random Forest (RF), Adaptive Boosting (AdaBoost), Gradient Boosting Machine (GBM), and Extreme Gradient Boosting (XGBoost). This study uses the UNSW-NB15 IoT dataset. The study's findings demonstrate that XGBoost performs better than other methods at identifying IoT network attacks. By employing Grid Search and Random Search optimization, XGBoost achieves an accuracy rate of 98.56% in binary model measurements and 97.47% on multi-class data. The findings underscore the efficacy of XGBoost in bolstering security within IoT networks.

Downloads

Download data is not yet available.

References

[1] B. Lal, S. Ravichandran, R. Kavin, N. Anil Kumar, D. Bordoloi, and R. Ganesh Kumar, “IOT-BASED cyber security identification model through machine learning technique,” Measurement: Sensors, vol. 27, no. December 2022, p. 100791, 2023, doi: 10.1016/j.measen.2023.100791.
[2] A. Alhowaide, I. Alsmadi, and J. Tang, “Ensemble Detection Model for IoT IDS,” Internet of Things (Netherlands), vol. 16, no. June 2021, p. 100435, 2021, doi: 10.1016/j.iot.2021.100435.
[3] R. A. Yunmar, “Hybrid Intrusion Detection System using Fuzzy Logic Inference Engine for SQL Injection Attack,” Kursor, vol. 9, no. 3, pp. 83–94, 2018, doi: 10.28961/kursor.v9i3.147.
[4] R. Lazzarini, H. Tianfield, and V. Charissis, “A stacking ensemble of deep learning models for IoT intrusion detection,” Knowledge-Based Systems, vol. 279, p. 110941, 2023, doi: 10.1016/j.knosys.2023.110941.
[5] J. B. Awotunde et al., “An Ensemble Tree-Based Model for Intrusion Detection in Industrial Internet of Things Networks,” Applied Sciences (Switzerland), vol. 13, no. 4, 2023, doi: 10.3390/app13042479.
[6] P. Bajaj, S. Mishra, and A. Paul, “Comparative Analysis of Stack-Ensemble-Based Intrusion Detection System for Single-Layer and Cross-layer DoS Attack Detection in IoT,” SN Computer Science, vol. 4, no. 5, 2023, doi: 10.1007/s42979-023-02105-4.
[7] P. Kumar, G. P. Gupta, and R. Tripathi, “An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks,” Computer Communications, vol. 166, no. October 2020, pp. 110–124, 2021, doi: 10.1016/j.comcom.2020.12.003.
[8] A. Arqane, O. Boutkhoum, H. Boukhriss, and A. EL Moutaouakkil, “Intrusion Detection System using Ensemble Learning Approaches: A Systematic Literature Review,” International journal of online and biomedical engineering, vol. 18, no. 13, pp. 160–175, 2022, doi: 10.3991/ijoe.v18i13.33519.
[9] K. Johnson Singh, D. Maisnam, and U. S. Chanu, “Intrusion Detection System with SVM and Ensemble Learning Algorithms,” SN Computer Science, vol. 4, no. 5, 2023, doi: 10.1007/s42979-023-01954-3.
[10] A. Parashar, K. S. Saggu, and A. Garg, “Machine learning based framework for network intrusion detection system using stacking ensemble technique,” Indian Journal of Engineering and Materials Sciences, vol. 29, no. 4, pp. 509–518, 2022, doi: 10.56042/ijems.v29i4.46838.
[11] S. A. Hussein, A. A. Mahmood, and E. O. Oraby, “Network Intrusion Detection System Using Ensemble Learning Approaches,” Webology, vol. 18, no. Special Issue, pp. 962–974, 2021, doi: 10.14704/WEB/V18SI05/WEB18274.
[12] S. Hariprasad and T. Deepa, “An Ensemble Intrusion Detection System based on Acute Feature Selection,” Multimedia Tools and Applications, pp. 8267–8280, 2023, doi: 10.1007/s11042-023-15788-x.
[13] Y. Zhou, G. Cheng, S. Jiang, and M. Dai, “Building an efficient intrusion detection system based on feature selection and ensemble classifier,” Computer Networks, vol. 174, no. March, 2020, doi: 10.1016/j.comnet.2020.107247.
[14] R. Bingu and S. Jothilakshmi, “Design of Intrusion Detection System using Ensemble Learning Technique in Cloud Computing Environment,” International Journal of Advanced Computer Science and Applications, vol. 14, no. 5, pp. 751–764, 2023, doi: 10.14569/IJACSA.2023.0140580.
[15] M. Nobakht, R. Javidan, and A. Pourebrahimi, “DEMD-IoT: a deep ensemble model for IoT malware detection using CNNs and network traffic,” Evolving Systems, vol. 14, no. 3, pp. 461–477, 2023, doi: 10.1007/s12530-022-09471-z.
[16] O. Abu Alghanam, W. Almobaideen, M. Saadeh, and O. Adwan, “An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning,” Expert Systems with Applications, vol. 213, no. PA, p. 118745, 2023, doi: 10.1016/j.eswa.2022.118745.
[17] S. Raut, A. Poojary, A. Naiknaware, S. Vairat, and S. R. Khonde, “Ensemble Based Intrusion Detection System for Multi attack Environment,” vol. 6, no. 11, pp. 687–690, 2020.
[18] R. Ahmad, I. Alsmadi, W. Alhamdani, and L. Tawalbeh, “A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks,” Journal of Information Security and Applications, vol. 67, p. 103196, 2022, doi: 10.1016/j.jisa.2022.103196.
[19] W. Yao, L. Hu, Y. Hou, and X. Li, “A Lightweight Intelligent Network Intrusion Detection System Using One-Class Autoencoder and Ensemble Learning for IoT,” Sensors, vol. 23, no. 8, pp. 1–25, 2023, doi: 10.3390/s23084141.
[20] J. Yang, Y. Sheng, and J. Wang, “A GBDT-paralleled quadratic ensemble learning for intrusion detection system,” IEEE Access, vol. 8, pp. 175467–175482, 2020, doi: 10.1109/ACCESS.2020.3026044.
[21] J. Jiang et al., “A dynamic ensemble algorithm for anomaly detection in IoT imbalanced data streams,” Computer Communications, vol. 194, no. April, pp. 250–257, 2022, doi: 10.1016/j.comcom.2022.07.034.
[22] D. Tiwari, B. S. Bhati, B. Nagpal, S. Sankhwar, and F. Al-Turjman, “An enhanced intelligent model: To protect marine IoT sensor environment using ensemble machine learning approach,” Ocean Engineering, vol. 242, no. November, p. 110180, 2021, doi: 10.1016/j.oceaneng.2021.110180.
[23] V. Agate, F. M. D’Anna, A. De Paola, P. Ferraro, G. Lo Re, and M. Morana, “A Behavior-Based Intrusion Detection System Using Ensemble Learning Techniques,” CEUR Workshop Proceedings, vol. 3260, pp. 207–218, 2022.
[24] A. Abbas, M. A. Khan, S. Latif, M. Ajaz, A. A. Shah, and J. Ahmad, “A New Ensemble-Based Intrusion Detection System for Internet of Things,” Arabian Journal for Science and Engineering, vol. 47, no. 2, pp. 1805–1819, 2022, doi: 10.1007/s13369-021-06086-5.
[25] N. Thockchom, M. M. Singh, and U. Nandi, “A novel ensemble learning-based model for network intrusion detection,” Complex and Intelligent Systems, vol. 9, no. 5, pp. 5693–5714, 2023, doi: 10.1007/s40747-023-01013-7.
[26] A. Arshad et al., “A novel ensemble method for enhancing Internet of Things device security against botnet attacks,” Decision Analytics Journal, vol. 8, no. June, p. 100307, 2023, doi: 10.1016/j.dajour.2023.100307.
[27] H. Rajadurai and U. D. Gandhi, “A stacked ensemble learning model for intrusion detection in wireless network,” Neural Computing and Applications, vol. 34, no. 18, pp. 15387–15395, 2022, doi: 10.1007/s00521-020-04986-5.
[28] Y. Cao, Z. Wang, H. Ding, J. Zhang, and B. Li, “An intrusion detection system based on stacked ensemble learning for IoT network,” Computers and Electrical Engineering, vol. 110, no. March 2023, p. 108836, 2023, doi: 10.1016/j.compeleceng.2023.108836.
[29] A. M. Mahfouz, A. Abuhussein, F. S. Alsubaei, and S. G. Shiva, “Toward A Holistic, Efficient, Stacking Ensemble Intrusion Detection System using a Real Cloud-based Dataset,” International Journal of Advanced Computer Science and Applications, vol. 13, no. 9, pp. 950–962, 2022, doi: 10.14569/IJACSA.2022.01309110.
[30] M. A. Hossain and M. S. Islam, “Ensuring network security with a robust intrusion detection system using ensemble-based machine learning,” Array, vol. 19, no. June, p. 100306, 2023, doi: 10.1016/j.array.2023.100306.
[31] Y. Alotaibi and M. Ilyas, “Ensemble-Learning Framework for Intrusion Detection to Enhance Internet of Things’ Devices Security,” Sensors, vol. 23, no. 12, 2023, doi: 10.3390/s23125568.
[32] O. O. Olasehinde, “A Stacked Ensemble Intrusion Detection Approach for the Protection of Information System,” International Journal for Information Security Research, vol. 10, no. 1, pp. 910–923, 2020, doi: 10.20533/ijisr.2042.4639.2020.0105.
[33] D. Srivastav and P. Srivastava, “A two-tier hybrid ensemble learning pipeline for intrusion detection systems in IoT networks,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, no. 4, pp. 3913–3927, 2023, doi: 10.1007/s12652-022-04461-0.
[34] D. N. Mhawi and S. H. Hashim, “Proposed Hybrid Ensemble Learning Algorithms for an Efficient Intrusion Detection System,” Iraqi Journal of Computer, Communication, Control and System Engineering, vol. 22, no. 2, pp. 73–84, 2022, doi: 10.33103/uot.ijccce.22.2.7.
[35] C. Iwendi, S. Khan, J. H. Anajemba, M. Mittal, M. Alenezi, and M. Alazab, “The use of ensemble models for multiple class and binary class classification for improving intrusion detection systems,” Sensors (Switzerland), vol. 20, no. 9, pp. 1–37, 2020, doi: 10.3390/s20092559.
[36] R. Golchha, A. Joshi, and G. P. Gupta, “Voting-based Ensemble Learning approach for Cyber Attacks Detection in Industrial Internet of Things,” Procedia Computer Science, vol. 218, pp. 1752–1759, 2022, doi: 10.1016/j.procs.2023.01.153.
[37] R. Gangula, M. M. Vutukuru, and M. Ranjeeth Kumar, “Intrusion Attack Detection Using Firefly Optimization Algorithm and Ensemble Classification Model,” Wireless Personal Communications, vol. 132, no. 3, pp. 1899–1916, 2023, doi: 10.1007/s11277-023-10687-8.
[38] Q. Abbas, S. Hina, H. Sajjad, K. S. Zaidi, and R. Akbar, “Optimization of predictive performance of intrusion detection system using hybrid ensemble model for secure systems,” PeerJ Computer Science, vol. 9, 2023, doi: 10.7717/peerj-cs.1552.
[39] M. H. L. Louk and B. A. Tama, “Dual-IDS: A bagging-based gradient boosting decision tree model for network anomaly intrusion detection system,” Expert Systems with Applications, vol. 213, no. PB, p. 119030, 2023, doi: 10.1016/j.eswa.2022.119030.
[40] M. M. Otoom, K. N. A. Sattar, and M. Al Sadig, “Ensemble Model for Network Intrusion Detection System Based on Bagging Using J48,” Advances in Science and Technology Research Journal, vol. 17, no. 2, pp. 322–329, 2023, doi: 10.12913/22998624/161820.
[41] D. Mishra, B. Naik, J. Nayak, A. Souri, P. B. Dash, and S. Vimal, “Light gradient boosting machine with optimized hyperparameters for identification of malicious access in IoT network,” Digital Communications and Networks, vol. 9, no. 1, pp. 125–137, 2023, doi: 10.1016/j.dcan.2022.10.004.
[42] Q. A. Al-Haija and M. Al-Dala’ien, “ELBA-IoT: An Ensemble Learning Model for Botnet Attack Detection in IoT Networks,” Journal of Sensor and Actuator Networks, vol. 11, no. 1, 2022, doi: 10.3390/jsan11010018.
[43] H. C. Lin, P. Wang, K. M. Chao, W. H. Lin, and Z. Y. Yang, “Ensemble learning for threat classification in network intrusion detection on a security monitoring system for renewable energy,” Applied Sciences (Switzerland), vol. 11, no. 23. 2021, doi: 10.3390/app112311283.
[44] A. G. Sooai, S. D. B. Mau, Y. C. H. Siki, D. J. Manehat, S. C. Sianturi, and A. H. Mondolang, “Optimizing Lantana Classification: High-Accuracy Model Utilizing Feature Extraction,” Jurnal Ilmiah Kursor, vol. 12, no. 2, pp. 49–58, 2023, doi: 10.21107/kursor.v12i2.347.
[45] H. Alibrahim and S. A. Ludwig, “Hyperparameter Optimization: Comparing Genetic Algorithm against Grid Search and Bayesian Optimization,” IEEE Congress on Evolutionary Computation, CEC 2023, pp. 1–9, 2021.
[46] Y. Sun, S. Ding, Z. Zhang, and W. Jia, “An improved grid search algorithm to optimize SVR for prediction,” Soft Computing, vol. 25, no. 7, pp. 5633–5644, 2021, doi: 10.1007/s00500-020-05560-w.
[47] A. Allawala, K. Rutherford, and P. Wadhwa, “Rotated Grid Search for Hyperparameter Optimization,” International Journal of Machine Learning and Computing, vol. 12, no. 5, 2022, doi: 10.18178/ijmlc.2022.12.5.1110.
[48] L. Villalobos-Arias, C. Quesada-López, J. Guevara-Coto, A. Martínez, and M. Jenkins, “Evaluating hyper-parameter tuning using random search in support vector machines for software effort estimation,” PROMISE 2020 - Proceedings of the 16th ACM International Conference on Predictive Models and Data Analytics in Software Engineering, Co-located with ESEC/FSE 2020, pp. 31–40, 2020, doi: 10.1145/3416508.3417121.
[49] H. Mohammadi, M. Soltanolkotabi, and M. R. Jovanović, “Learning the model-free linear quadratic regulator via random search,” Proceedings of Machine Learning Research, vol. 120, no. 2, pp. 531–539, 2020.
[50] T. Sandev, V. Domazetoski, A. Iomin, and L. Kocarev, “Diffusion–advection equations on a comb: Resetting and random search,” Mathematics, vol. 9, no. 3, pp. 1–24, 2021, doi: 10.3390/math9030221.
[51] U. AlHaddad, A. Basuhail, M. Khemakhem, F. E. Eassa, and K. Jambi, “Ensemble Model Based on Hybrid Deep Learning for Intrusion Detection in Smart Grid Networks,” Sensors, vol. 23, no. 17, 2023, doi: 10.3390/s23177464.
Published
2024-06-18
How to Cite
Ismanto, E., Al Amien, J., & Vitriani, V. (2024). A Comparison of Enhanced Ensemble Learning Techniques for Internet of Things Network Attack Detection. MATRIK : Jurnal Manajemen, Teknik Informatika Dan Rekayasa Komputer, 23(3), 541-554. https://doi.org/https://doi.org/10.30812/matrik.v23i3.3885