Affiliation:
1. Applied College, Najran University, King Abdulaziz Street, Najran P.O. Box 1988, Saudi Arabia
2. National Advanced IPv6 (NAv6) Centre, Universiti Sains Malaysia, Gelugor 11800, Malaysia
Abstract
The significant surge in Internet of Things (IoT) devices presents substantial challenges to network security. Hackers are afforded a larger attack surface to exploit as more devices become interconnected. Furthermore, the sheer volume of data these devices generate can overwhelm conventional security systems, compromising their detection capabilities. To address these challenges posed by the increasing number of interconnected IoT devices and the data overload they generate, this paper presents an approach based on meta-learning principles to identify attacks within IoT networks. The proposed approach constructs a meta-learner model by stacking the predictions of three Deep-Learning (DL) models: RNN, LSTM, and CNN. Subsequently, the identification by the meta-learner relies on various methods, namely Logistic Regression (LR), Multilayer Perceptron (MLP), Support Vector Machine (SVM), and Extreme Gradient Boosting (XGBoost). To assess the effectiveness of this approach, extensive evaluations are conducted using the IoT dataset from 2020. The XGBoost model showcased outstanding performance, achieving the highest accuracy (98.75%), precision (98.30%), F1-measure (98.53%), and AUC-ROC (98.75%). On the other hand, the SVM model exhibited the highest recall (98.90%), representing a slight improvement of 0.14% over the performance achieved by XGBoost.
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference52 articles.
1. Bahashwan, A.A., Anbar, M., Abdullah, N., Al-Hadhrami, T., and Hanshi, S.M. (2021). Advances on Smart and Soft Computing, Springer.
2. Current research on Internet of Things (IoT) security: A survey;Noor;Comput. Netw.,2019
3. Inayat, U., Zia, M.F., Mahmood, S., Khalid, H.M., and Benbouzid, M. (2022). Learning-based methods for cyber attacks detection in IoT systems: A survey on methods, analysis, and future prospects. Electronics, 11.
4. Multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detection;Zhang;Future Gener. Comput. Syst.,2021
5. An adaptive ensemble machine learning model for intrusion detection;Gao;IEEE Access,2019
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献