IoT malicious traffic identification using wrapper-based feature selection mechanisms
Author | Shafiq, Muhammad |
Author | Tian, Zhihong |
Author | Bashir, Ali Kashif |
Author | Du, Xiaojiang |
Author | Guizani, Mohsen |
Available date | 2022-11-29T14:01:37Z |
Publication Date | 2020-07-01 |
Publication Name | Computers and Security |
Identifier | http://dx.doi.org/10.1016/j.cose.2020.101863 |
Citation | Shafiq, M., Tian, Z., Bashir, A. K., Du, X., & Guizani, M. (2020). IoT malicious traffic identification using wrapper-based feature selection mechanisms. Computers & Security, 94, 101863. |
ISSN | 01674048 |
Abstract | Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification in IoT risk management. However, due to inaccurate feature selection, ML techniques misclassify a number of malicious traffic in smart IoT network for secured smart applications. To address the problem, it is very important to select features set that carry enough information for accurate smart IoT anomaly and intrusion traffic identification. In this paper, we firstly applied bijective soft set for effective feature selection to select effective features, and then we proposed a novel CorrACC feature selection metric approach. Afterward, we designed and developed a new feature selection algorithm named Corracc based on CorrACC, which is based on wrapper technique to filter the features and select effective feature for a particular ML classifier by using ACC metric. For the evaluation our proposed approaches, we used four different ML classifiers on the BoT-IoT dataset. Experimental results obtained by our algorithms are promising and can achieve more than 95% accuracy. |
Sponsor | This work is supported by the National Key research and Development Plan (Grant no. 2018YFB0803504), the Guangdong Province Key Research and Development Plan (Grant no. 2019B010137004) and the National Natural Science Foundation of China under Grant no. 61871140, and Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme (2019). |
Language | en |
Publisher | Elsevier Ltd |
Subject | Attacks Classification Cybersecurity Feature selection Idntification Internet of things Machine learning |
Type | Article |
Volume Number | 94 |
Check access options
Files in this item
This item appears in the following Collection(s)
-
Computer Science & Engineering [2402 items ]