9 - MLIDS_Revolutionizing_of_IoT_based_Digital_Security_Mechanism_with_Machine_Learning_Assisted_Intrusion_Detection_System
9 - MLIDS_Revolutionizing_of_IoT_based_Digital_Security_Mechanism_with_Machine_Learning_Assisted_Intrusion_Detection_System
Abstract—It is becoming more critical to detect intrusions on electronic means [1]. The ease with which these devices can
these devices due to the exponential growth of the Internet of be monitored and controlled from afar has spurred fast
Things (IoT) and the accompanying explosion in the number of innovation in the development of numerous new applications
IoT devices. In order to create intrusion detection systems that across many fields, including smart home technology,
really work, researchers are utilizing machine learning wearable technology, health monitoring, energy management,
methods. Machine Learning Assisted Intrusion Detection connected industrial as well as manufacturing sensors and
System (MLIDS) is a new intrusion detection system that we equipment, and many more. Handling device security and
provide in this study. It efficiently identifies network unusual
protecting data from threats is the main problem in IoT
traffic. A cross-validation test using the traditional learning
systems. Cyber assaults are defined as "the deliberate and
model XGBoost allows for a transparent evaluation of the
suggested algorithm's performance. Next, the preprocessed data
malicious use of cyberspace to compromise the computer
is categorized using the suggested MLIDS and XGBoost systems, networks, or personal information of another person
methods. To get the best detection performance, the model's or entity" [2]. Due to device and protocol heterogeneity,
hyperparameters are tuned using optimization logic. The device resource restrictions, and direct internet exposure,
evolution of cybercrime has necessitated massive advancements protecting IoT devices against attacks is challenging.
in intrusion detection system (IDS) technology. In order to gain Smart cities, smart houses, smart automobiles, as well as
access to our computers' private data, hackers nowadays deploy
intelligent industrial systems are just a few of the forthcoming
a wide variety of techniques. To protect against these threats,
applications that are expected to propel the internet of things
there are a plethora of intrusion detection algorithms. There are
growing worries over the secure communication and protection to 50 billion by 2020. Malicious actors may take advantage of
of digital information due to the exponential expansion and this expansion, which poses a significant threat to the
usage of the internet. To gain useful information, hackers availability, privacy, and integrity of data [3]. Data and
nowadays deploy a wide variety of techniques. Those various privacy protection are also important aspects of cyber-
assaults may be detected with the use of several intrusion security, which aims to prevent illegal access to systems and
detection algorithms, methods, and approaches. The networks. Many new applications are being created that rely
overarching goal of this paper is to present a comprehensive on linked devices; therefore there has been a growing
analysis of intrusion detection systems, including but not limited emphasis on Internet of Things security in recent years. Smart
to: different types of intrusion identification techniques, types of homes, smart farms, healthcare, and many more have all been
events, a number of approaches, and tools, future research revolutionized by the fast expansion of the Internet of Things.
requirements, difficulties and, subsequently the development of The function of Internet of Things devices in people's daily
an IDS device for research purposes that can detect and prevent lives is vital. Nevertheless, these gadgets are vulnerable to a
intrusions. range of security threats due to their wide internet access [4]
[11]. Internet of Things devices, for instance, is vulnerable to
Keywords—MLIDS, Internet of Things, IoT, Digital Security, a plethora of network threats since they share data via the
Machine Learning, Intrusion Detection System, IDS, XGBoost, internet. Threats to linked devices have become more pressing
Data Security, Server Protection
as the Internet of Things (IoT) gained traction. Numerous
I. INTRODUCTION threats, including denial of service, eavesdropping, as well as
privilege escalation, can target IoT devices. Consequently,
The term "Internet of Things" refers to a system of safeguarding IoT devices in these types of assaults is taking
interconnected computer networks that allows everyday on more significance. The dispersed nature of IoT devices also
objects to exchange data and instructions with one another via makes them ideal targets for hackers. Additionally, the system
is vulnerable to cyber attacks such as web injection, which Accurately identifying intrusions is getting more
might cause the disclosure of sensitive information or data challenging due to the rising sophistication of cyber-attacks
manipulation [5]. This is because the real-time [7]. If the attacks are not prevented, the authority of security
communication of the many devices in the system relies on services, including data availability, integrity, and
wireless networks, which are susceptible to eavesdropping. confidentiality, might be compromised. When it comes to
The Internet of Things needs more robust intrusion detection computer security, there are a lot of different intrusion
systems [12]. detection technologies out there. Two main categories are
intrusion detection systems based on signatures as well as
Various applications have made extensive use of IoT intrusion detection systems based on anomalies (AIDS). An
devices and networks in recent years. When it comes to exhaustive analysis of significant recent publications,
protecting an organization's computer network, intrusion taxonomy of modern IDS, and a review of the datasets
detection systems is a common tool. An intrusion detection frequently utilized for evaluation purposes are all included in
system (IDS) is a viable and effective method for detecting this survey study [7]. Also covered are the methods attackers
assaults and guaranteeing network security by protecting employ to evade detection and the research challenges that lie
against malicious hackers. When unanticipated events occur ahead in the fight against these methods, with the ultimate goal
on a local or global scale, that compromises the availability, of making computer systems more resistant to attacks [7].
confidentiality, or integrity of a network, we say that there has
been an incursion. The packets that make up the network Both the size of networks and the data associated with
traffic include header fields that provide information about them have grown exponentially due to the fast development
them. The goal of anomaly detection can be defined by of the internet and other communication technologies.
features associated with such events. An intrusion detection Consequently, network security is facing difficulty in properly
system is designed to enhance CIA by detecting and detecting breaches due to the proliferation of innovative
preventing both active and passive network intruder behaviors assaults [8]. In addition, it is impossible to disregard the
that are considered suspicious. The following are the steps that existence of the intruders who intend to conduct a variety of
need to be followed in order to construct the system: assaults within the network. One such tool is an intrusion
detection system, which checks network traffic for signs of
(i) Construct a test bed to mimic an Internet of Things (IoT) intrusion and takes other precautions to keep the network
environment; secure, private, and accessible at all times. Increasing
(ii) Create adversarial systems to launch attacks; detection accuracy while minimizing false alarm rates and
(iii) Record network traffic and extract characteristics for identifying novel intrusions are still issues for IDS, despite the
both usual and attack situations; and huge efforts of the researchers [8]. One possible method to
(iv) Create machine learning techniques to identify and efficiently identify breaches throughout the network is the
categorize network assaults. deployment of intrusion detection systems based on machine
learning as well as deep learning. After defining intrusion
II. RELATED STUDY detection systems (IDS), this article presents taxonomy built
Cyber security has emerged as a critical field of study due around the most prominent ML and DL methods used to create
to the pervasive nature of networks in contemporary society NIDSS systems. By analyzing the benefits and drawbacks of
[6]. Network software and hardware health may be tracked by the suggested solutions, this article offers a thorough overview
an intrusion detection system, a crucial tool for cyber defense. of the most current NIDS-based publications. After that, we
Problems in detecting new assaults, lowering the false alarm give the most up-to-date information on ML and DL-based
rate, and improving detection accuracy persist in current IDSs, NIDS, including the latest trends, developments, and trends in
despite decades of progress. Many academics have methodology, evaluation metrics, as well as dataset selection.
concentrated on creating IDSs that leverage machine learning We highlighted many research obstacles and recommended
techniques to address the aforementioned issues [6]. Machine future research scope for developing ML as well as DL-based
learning algorithms can accurately and automatically NIDS [8] by using the inadequacies of the presented
distinguish between typical and out-of-the-ordinary data. The approaches.
high generalizability of machine learning algorithms further
Cyber security has emerged as a critical field of study due
increases their potential to identify previously unseen threats.
to the pervasive nature of networks in contemporary society.
A subfield of machine learning, deep learning has recently
An integral part of cyber defense is the intrusion detection
attracted a lot of attention from researchers due to its
system (IDS), which keeps tabs on the health of all the
outstanding performance. For the purpose of categorizing and
network's software and hardware [9]. Problems in detecting
summarizing IDS literature based on machine learning and
new assaults, lowering the false alarm rate, and improving
deep learning, this survey suggests a taxonomy that uses data
detection accuracy persist in current IDSs, despite decades of
items as the primary dimension. Cyber security academics
progress. A lot of people have been working on intrusion
might benefit from this categorization system, in our opinion.
detection systems that employ machine learning to address the
The idea and classification of IDSs are initially defined in the
issues listed above. The key distinctions between typical and
survey. Then, we provide the machine learning techniques that
out-of-the-ordinary data may be accurately and automatically
are often employed in intrusion detection systems, metrics,
discovered using machine learning techniques [9]. The high
and benchmark datasets. After that, we use the suggested
generalizability of machine learning algorithms further
taxonomic system and the representative literature as a
increases their potential to identify previously unseen threats.
starting point, and then we show how to use ML and DL to fix
A sub-field of machine learning, deep learning has recently
important IDS problems. Finally, by looking at recent
attracted a lot of attention from researchers due to its
representative research, we may talk about the difficulties and
outstanding performance. For the purpose of categorizing and
potential future advances [6].
summarizing IDS literature based on machine learning and
deep learning, this survey suggests a taxonomy that uses data
278
Authorized licensed use limited to: VIT University. Downloaded on October 26,2024 at 14:14:33 UTC from IEEE Xplore. Restrictions apply.
2024 International Conference on Automation and Computation (AUTOCOM)
279
Authorized licensed use limited to: VIT University. Downloaded on October 26,2024 at 14:14:33 UTC from IEEE Xplore. Restrictions apply.
2024 International Conference on Automation and Computation (AUTOCOM)
280
Authorized licensed use limited to: VIT University. Downloaded on October 26,2024 at 14:14:33 UTC from IEEE Xplore. Restrictions apply.
2024 International Conference on Automation and Computation (AUTOCOM)
In order to compare the two models' performance, the 4. 125 87.64 96.47
suggested MLIDS is verified with the more traditional 5. 150 88.32 96.49
XGBoost approach; the resulting precision ratio is shown in 6. 175 89.17 96.57
Figure 4. The same is represented in the following table, 7. 200 88.33 96.64
Table-2 in descriptive manner.
8. 225 88.17 96.72
The following figures Fig.5 and Fig.6 shows the F1-Score V. CONCLUSION
as well as Recall ratios of the suggested MLIDS compared to
An introduction to intrusion detection systems, including
the standard XGBoost method, which was used for cross-
their uses and why they are necessary, is the primary goal of
validation. The same is represented in the following tables,
this article. Finding various types of intrusion detection
Table-3 and Table-4 in descriptive manner.
systems (IDS) and detecting in an internet of things (IoT)
TABLE III. F1-SCORE
context is the whole focus of this article. Today, intrusion
detection systems (IDS) are crucial for the security of both
S.No. Epochs XGBoost (%) MLIDS (%) businesses and their network users. The suggested model,
1. 50 89.67 95.84 MLIDS, specifies security preventative actions. The lifespan
2. 75 89.79 95.67
provides a visual representation of the stages and how they
3. 100 90.34 95.92
4. 125 90.71 95.89
evolved. More obstacles remain to be surmounted. Anomaly
5. 150 91.05 95.93 detection and abuse detection strategies are demonstrated in
6. 175 91.41 95.97 particular, and additional approaches can be utilized.
7. 200 91.78 96.01 Improving classification-based IDS with selective feedback
8. 225 92.15 96.05 techniques and comparing many prominent data mining
algorithms used to IDS are two areas that will be further
researched.
REFERENCES
[1] Anish Halimaa A. and K. Sundarakantham, "Machine Learning Based
Intrusion Detection System", 3rd International Conference on Trends
in Electronics and Informatics, DOI: 10.1109/ICOEI.2019.8862784,
2019.
[2] Lirim Ashiku and Cihan Dagli, "Network Intrusion Detection System
using Deep Learning", Procedia Computer Science,
https://doi.org/10.1016/j.procs.2021.05.025, 2021.
[3] T.J. Nagalakshmi, et al, Machine learning models to detect the
blackhole attack in wireless adhoc network, Materials Today:
Proceedings, Volume 47, Part 1,2021,Pages 235-239,ISSN 2214-
7853,https://doi.org/10.1016/j.matpr.2021.04.129.
[4] Emad E. Abdallah, Wafa’ Eleisah, et al., "Intrusion Detection Systems
using Supervised Machine Learning Techniques: A survey", Procedia
Computer Science, https://doi.org/10.1016/j.procs.2022.03.029, 2022.
[5] A. G, et al "An Intelligent LoRa based Women Protection and Safety
Fig. 5. F1-Score Enhancement using Internet of Things," (I-SMAC), Dharan, Nepal,
2022, pp. 43-48, doi: 10.1109/I-SMAC55078.2022.9987425.
TABLE IV. RECALL [6] Hongyu Liu and Bo Lang, "Machine Learning and Deep Learning
Methods for Intrusion Detection Systems: A Survey", Appl. Sci.,
S.No. Epochs XGBoost (%) MLIDS (%)
https://doi.org/10.3390/app9204396, 2019.
1. 50 89.27 96.27 [7] Ansam Khraisat, Iqbal Gondal, et al., "Survey of intrusion detection
2. 75 89.36 96.14 systems: techniques, datasets and challenges", Cybersecur,
3. 100 89.52 96.31 https://doi.org/10.1186/s42400-019-0038-7, 2019.
281
Authorized licensed use limited to: VIT University. Downloaded on October 26,2024 at 14:14:33 UTC from IEEE Xplore. Restrictions apply.
2024 International Conference on Automation and Computation (AUTOCOM)
[8] Zeeshan Ahmad, Adnan Shahid Khan, et al., "Network intrusion [11] Abhijit D. Jadhav and Vidyullatha Pellakuri, "Intrusion Detection
detection system: A systematic study of machine learning and deep System Using Machine Learning Techniques for Increasing Accuracy
learning approaches", Emerging Telecommunications Technologies, and Distributed & Parallel Approach for Increasing Efficiency", 5th
https://doi.org/10.1002/ett.4150, 2020. International Conference On Computing, Communication, Control
[9] Hongyu Liu and Bo Lang, "Machine Learning and Deep Learning And Automation, DOI: 10.1109/ICCUBEA47591.2019.9128620,
Methods for Intrusion Detection Systems: A Survey", Applied 2019.
Sciences, DOI:10.3390/app9204396, 2019. [12] Musaab Riyadh and Dina Riadh Alshibani, "Intrusion detection system
[10] Jiadong Ren, Jiawei Guo, et al., "Building an Effective Intrusion based on machine learning techniques", Indonesian Journal of
Detection System by Using Hybrid Data Optimization Based on Electrical Engineering and Computer Science,
Machine Learning Algorithms", Security and Communication DOI:10.11591/ijeecs.v23.i2.pp953-961, 2021.
Networks, https://doi.org/10.1155/2019/7130868, 2019.
282
Authorized licensed use limited to: VIT University. Downloaded on October 26,2024 at 14:14:33 UTC from IEEE Xplore. Restrictions apply.