SlideShare a Scribd company logo
2
Most read
3
Most read
An Efficient Spam Detection Technique For IOT Devices Using Machine
Learning
Abstract:
The Internet of Things (IoT) is a group of millions of devices having sensors and actuators linked
over wired or wireless channel for data transmission. IoT has grown rapidly over the past decade
with more than 25 billion devices expected to be connected by 2020. The volume of data
released from these devices will increase many-fold in the years to come. In addition to an
increased volume, the IoT devices produces a large amount of data with a number of different
modalities having varying data quality defined by its speed in terms of time and position
dependency. In such an environment, machine learning (ML) algorithms can play an important
role in ensuring security and authorization based on biotechnology, anomalous detection to
improve the usability, and security of IoT systems. On the other hand, attackers often view
learning algorithms to exploit the vulnerabilities in smart IoT-based systems. Motivated from
these, in this article, we propose the security of the IoT devices by detecting spam using ML. To
achieve this objective, Spam Detection in IoT using Machine Learning framework is proposed.
In this framework, five ML models are evaluated using various metrics with a large collection of
inputs features sets. Each model computes a spam score by considering the refined input
features. This score depicts the trustworthiness of IoT device under various parameters. REFIT
Smart Home data set is used for the validation of proposed technique. The results obtained
proves the effectiveness of the proposed scheme in comparison to the other existing schemes.
Existing System:
The safety measures of IoT devices depends upon the size and type of organization in which it is
imposed. The behavior of users forces the security gateways to cooperate. In other words, we can
say that the location, nature, application of IoT devices decides the security measures. For
instance, the smart IoT security cameras in the smart organization can capture the different
parameters for analysis and intelligent decision making. The maximum care to be taken is with
web based devices as maximum number of IoT devices are web dependent. It is common at the
workplace that the IoT devices installed in an organization can be used to implement security
and privacy features efficiently. For example, wearable devices collect and send user’s health
data to a connected smartphone should prevent leakage of information to ensure privacy. It has
been found in the market that 25-30% of working employees connect their personal IoT devices
with the organizational network. The expanding nature of IoT attracts both the audience, i.e., the
users and the attackers.
However, with the emergence of ML in various attacks scenarios, IoT devices choose a
defensive strategy and decide the key parameters in the security protocols for trade-off between
security, privacy and computation. This job is challenging as it is usually difficult for an IoT
system with limited resources to estimate the current network and timely attack status.
Proposed System:
1) The proposed scheme of spam detection is validated using five different machine learning
models.
2) An algorithm is proposed to compute the spamicity score of each model which is then used for
detection and intelligent decision making.
3) Based upon the spamicity score computed in previous step, the reliability of IoT devices is
analyzed using different evaluation metrics.
1) Feature Engineering: The machine learning algorithms works accurately with the
appropriate instances and their attributes. We all know that the instances are the real data
world value, gathered from the real world smart objects deployed across the globe.
Feature extraction and feature selection are the core of feature engineering process.
Feature reduction: This methods is used to reduce the dimension of data. In other words,
feature reduction is the procedure to reduce the complexity of features. This technique
reduces the issues like, over-fitting, large memory requirement, computation power. There
are various feature extraction techniques. Among these, principal component analysis (PCA)
is the most popular . But, the method used in this proposal is PCA along with following IoT
parameters.
– Analysis time: The dataset used in the experiments, contains the data recorded for the span
of eighteen months. For better results and accuracy, we have considered the data of one
month. Considering the fact, the climate is the important parameter for the working of IoT
device, the month with maximum variations has been taken into the consideration
– Web based appliances: Only those appliances are included, which stay connected with web
for their working. The data collection includes the appliances: Television, Set top box, DVD
player/recorder, HiFi, Electric heater, Fridge, Dishwasher, Toaster, Coffee maker, Kettle,
Freezer, Washing machine, Tumble dryer, Electric heater, DAB radio, Desktop PC, PC
monitor, Printer, Router, Electric heater, Electric heater, Shredder, Freezer, Lamp, Alarm
radio, Lava lamp, CD player, Television, Video player, Set top box, Hub (network). Feature
selection: It is the process of computing the most important subset of features. It works by
computing the importance of each feature [16].
Entropy based filter is used as a feature selection technique in this proposal. – Entropy-based
filter: This algorithm uses the correlation among the discrete attributes with continuous
attributes to find out the weights of discrete attributes .
There are three functions using this entropy based filter namely, information.gain, gain.ratio,
symmetrical.uncertainty. The syntax for these functions are:
information.gain(formula, data, unit)
gain.ratio(formula, data, unit)
symmetrical.uncertainty(formula, data, unit)
The arguments used in the function definition are described here.
a) formula: It is the description of the working behind the algorithm.
b) data: It is the set of training data with the defined attributes for which the selection is to be
made.
c) unit: It is the unit which is used for entropy computing. By default it takes the value “log”.

More Related Content

What's hot (20)

PDF
IRJET- Proximity Detection Warning System using Ray Casting
IRJET Journal
 
PDF
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET Journal
 
PPTX
A review of machine learning based anomaly detection
Mohamed Elfadly
 
PDF
False positive reduction by combining svm and knn algo
eSAT Journals
 
PDF
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
Dr. Amrita .
 
PDF
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
ijwmn
 
PDF
Evaluation of network intrusion detection using markov chain
IJCI JOURNAL
 
PDF
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET Journal
 
PPTX
Anomaly Detection for Security
Cody Rioux
 
PDF
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
IJNSA Journal
 
PDF
Icacci presentation-cnn intrusion
vinaykumar R
 
PDF
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
Radita Apriana
 
PDF
Machine Learning Algorithms Applied to System Security: A Systematic Review
Associate Professor in VSB Coimbatore
 
PPTX
Databse Intrusion Detection Using Data Mining Approach
Suraj Chauhan
 
PDF
Thesis presentation
Aboul Ella Hassanien
 
PDF
Secure intrusion detection and countermeasure selection in virtual system usi...
eSAT Publishing House
 
PPTX
Internet of Things
Mphasis
 
PDF
Optimized Intrusion Detection System using Deep Learning Algorithm
ijtsrd
 
PDF
IRJET - Securing Computers from Remote Access Trojans using Deep Learning...
IRJET Journal
 
PDF
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET Journal
 
IRJET- Proximity Detection Warning System using Ray Casting
IRJET Journal
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET Journal
 
A review of machine learning based anomaly detection
Mohamed Elfadly
 
False positive reduction by combining svm and knn algo
eSAT Journals
 
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
Dr. Amrita .
 
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
ijwmn
 
Evaluation of network intrusion detection using markov chain
IJCI JOURNAL
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET Journal
 
Anomaly Detection for Security
Cody Rioux
 
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
IJNSA Journal
 
Icacci presentation-cnn intrusion
vinaykumar R
 
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
Radita Apriana
 
Machine Learning Algorithms Applied to System Security: A Systematic Review
Associate Professor in VSB Coimbatore
 
Databse Intrusion Detection Using Data Mining Approach
Suraj Chauhan
 
Thesis presentation
Aboul Ella Hassanien
 
Secure intrusion detection and countermeasure selection in virtual system usi...
eSAT Publishing House
 
Internet of Things
Mphasis
 
Optimized Intrusion Detection System using Deep Learning Algorithm
ijtsrd
 
IRJET - Securing Computers from Remote Access Trojans using Deep Learning...
IRJET Journal
 
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET Journal
 

Similar to An effecient spam detection technique for io t devices using machine learning (20)

PDF
Automated diagnosis of attacks in internet of things using machine learning a...
journalBEEI
 
PDF
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET Journal
 
PDF
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET Journal
 
PDF
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
IJCNCJournal
 
PDF
Novel authentication framework for securing communication in internet-of-things
IJECEIAES
 
PDF
Deep learning algorithms for intrusion detection systems in internet of thin...
IJECEIAES
 
PDF
Using Machine Learning to Build a Classification Model for IoT Networks to De...
IJCNCJournal
 
PDF
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
IRJET Journal
 
PDF
KurtPortelliMastersDissertation
Kurt Portelli
 
PDF
Intrusion detection systems for internet of thing based big data: a review
International Journal of Reconfigurable and Embedded Systems
 
PDF
Securing the internet of things frontier: a deep learning ensemble for cyber-...
IAESIJAI
 
PDF
AreWePreparedForIoT
Sameer Rathoud
 
PDF
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
ijcsit
 
PDF
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
AIRCC Publishing Corporation
 
PDF
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
 
PDF
Improving the performance of IoT devices that use Wi-Fi
International Journal of Reconfigurable and Embedded Systems
 
PDF
list of references.pdf
Sami Siddiqui
 
PDF
Analysis of Energy Management Scheme in Smart City: A Review
ijtsrd
 
DOCX
list of references.docx
Sami Siddiqui
 
PDF
June 2021 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
Automated diagnosis of attacks in internet of things using machine learning a...
journalBEEI
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET Journal
 
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET Journal
 
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
IJCNCJournal
 
Novel authentication framework for securing communication in internet-of-things
IJECEIAES
 
Deep learning algorithms for intrusion detection systems in internet of thin...
IJECEIAES
 
Using Machine Learning to Build a Classification Model for IoT Networks to De...
IJCNCJournal
 
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
IRJET Journal
 
KurtPortelliMastersDissertation
Kurt Portelli
 
Intrusion detection systems for internet of thing based big data: a review
International Journal of Reconfigurable and Embedded Systems
 
Securing the internet of things frontier: a deep learning ensemble for cyber-...
IAESIJAI
 
AreWePreparedForIoT
Sameer Rathoud
 
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
ijcsit
 
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
AIRCC Publishing Corporation
 
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
 
Improving the performance of IoT devices that use Wi-Fi
International Journal of Reconfigurable and Embedded Systems
 
list of references.pdf
Sami Siddiqui
 
Analysis of Energy Management Scheme in Smart City: A Review
ijtsrd
 
list of references.docx
Sami Siddiqui
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
Ad

More from Venkat Projects (20)

DOCX
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
Venkat Projects
 
DOCX
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
Venkat Projects
 
DOCX
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
Venkat Projects
 
DOCX
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
Venkat Projects
 
DOCX
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
Venkat Projects
 
DOCX
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Venkat Projects
 
DOCX
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
Venkat Projects
 
DOCX
WATERMARKING IMAGES
Venkat Projects
 
DOCX
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
Venkat Projects
 
DOCX
Application and evaluation of a K-Medoidsbased shape clustering method for an...
Venkat Projects
 
DOCX
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
Venkat Projects
 
DOCX
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
Venkat Projects
 
DOCX
2022 PYTHON MAJOR PROJECTS LIST.docx
Venkat Projects
 
DOCX
2022 PYTHON PROJECTS LIST.docx
Venkat Projects
 
DOCX
2021 PYTHON PROJECTS LIST.docx
Venkat Projects
 
DOCX
2021 python projects list
Venkat Projects
 
DOCX
10.sentiment analysis of customer product reviews using machine learni
Venkat Projects
 
DOCX
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
Venkat Projects
 
DOCX
6.iris recognition using machine learning technique
Venkat Projects
 
DOCX
5.local community detection algorithm based on minimal cluster
Venkat Projects
 
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
Venkat Projects
 
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
Venkat Projects
 
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
Venkat Projects
 
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
Venkat Projects
 
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
Venkat Projects
 
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Venkat Projects
 
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
Venkat Projects
 
WATERMARKING IMAGES
Venkat Projects
 
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
Venkat Projects
 
Application and evaluation of a K-Medoidsbased shape clustering method for an...
Venkat Projects
 
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
Venkat Projects
 
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
Venkat Projects
 
2022 PYTHON MAJOR PROJECTS LIST.docx
Venkat Projects
 
2022 PYTHON PROJECTS LIST.docx
Venkat Projects
 
2021 PYTHON PROJECTS LIST.docx
Venkat Projects
 
2021 python projects list
Venkat Projects
 
10.sentiment analysis of customer product reviews using machine learni
Venkat Projects
 
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
Venkat Projects
 
6.iris recognition using machine learning technique
Venkat Projects
 
5.local community detection algorithm based on minimal cluster
Venkat Projects
 
Ad

Recently uploaded (20)

PDF
MOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEM
ijait
 
PDF
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
PDF
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
PPTX
site survey architecture student B.arch.
sri02032006
 
PDF
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
PPTX
EC3551-Transmission lines Demo class .pptx
Mahalakshmiprasannag
 
PPTX
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 
PPTX
Pharmaceuticals and fine chemicals.pptxx
jaypa242004
 
PPTX
Structural Functiona theory this important for the theorist
cagumaydanny26
 
PPTX
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
PPTX
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
PDF
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 
PDF
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
PPTX
Hashing Introduction , hash functions and techniques
sailajam21
 
PDF
Additional Information in midterm CPE024 (1).pdf
abolisojoy
 
PDF
ARC--BUILDING-UTILITIES-2-PART-2 (1).pdf
IzzyBaniquedBusto
 
PPTX
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
PDF
POWER PLANT ENGINEERING (R17A0326).pdf..
haneefachosa123
 
PDF
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
PDF
UNIT-4-FEEDBACK AMPLIFIERS AND OSCILLATORS (1).pdf
Sridhar191373
 
MOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEM
ijait
 
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
site survey architecture student B.arch.
sri02032006
 
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
EC3551-Transmission lines Demo class .pptx
Mahalakshmiprasannag
 
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 
Pharmaceuticals and fine chemicals.pptxx
jaypa242004
 
Structural Functiona theory this important for the theorist
cagumaydanny26
 
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
Hashing Introduction , hash functions and techniques
sailajam21
 
Additional Information in midterm CPE024 (1).pdf
abolisojoy
 
ARC--BUILDING-UTILITIES-2-PART-2 (1).pdf
IzzyBaniquedBusto
 
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
POWER PLANT ENGINEERING (R17A0326).pdf..
haneefachosa123
 
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
UNIT-4-FEEDBACK AMPLIFIERS AND OSCILLATORS (1).pdf
Sridhar191373
 

An effecient spam detection technique for io t devices using machine learning

  • 1. An Efficient Spam Detection Technique For IOT Devices Using Machine Learning Abstract: The Internet of Things (IoT) is a group of millions of devices having sensors and actuators linked over wired or wireless channel for data transmission. IoT has grown rapidly over the past decade with more than 25 billion devices expected to be connected by 2020. The volume of data released from these devices will increase many-fold in the years to come. In addition to an increased volume, the IoT devices produces a large amount of data with a number of different modalities having varying data quality defined by its speed in terms of time and position dependency. In such an environment, machine learning (ML) algorithms can play an important role in ensuring security and authorization based on biotechnology, anomalous detection to improve the usability, and security of IoT systems. On the other hand, attackers often view learning algorithms to exploit the vulnerabilities in smart IoT-based systems. Motivated from these, in this article, we propose the security of the IoT devices by detecting spam using ML. To achieve this objective, Spam Detection in IoT using Machine Learning framework is proposed. In this framework, five ML models are evaluated using various metrics with a large collection of inputs features sets. Each model computes a spam score by considering the refined input features. This score depicts the trustworthiness of IoT device under various parameters. REFIT Smart Home data set is used for the validation of proposed technique. The results obtained proves the effectiveness of the proposed scheme in comparison to the other existing schemes. Existing System: The safety measures of IoT devices depends upon the size and type of organization in which it is imposed. The behavior of users forces the security gateways to cooperate. In other words, we can say that the location, nature, application of IoT devices decides the security measures. For instance, the smart IoT security cameras in the smart organization can capture the different parameters for analysis and intelligent decision making. The maximum care to be taken is with web based devices as maximum number of IoT devices are web dependent. It is common at the workplace that the IoT devices installed in an organization can be used to implement security and privacy features efficiently. For example, wearable devices collect and send user’s health data to a connected smartphone should prevent leakage of information to ensure privacy. It has been found in the market that 25-30% of working employees connect their personal IoT devices with the organizational network. The expanding nature of IoT attracts both the audience, i.e., the users and the attackers. However, with the emergence of ML in various attacks scenarios, IoT devices choose a defensive strategy and decide the key parameters in the security protocols for trade-off between
  • 2. security, privacy and computation. This job is challenging as it is usually difficult for an IoT system with limited resources to estimate the current network and timely attack status. Proposed System: 1) The proposed scheme of spam detection is validated using five different machine learning models. 2) An algorithm is proposed to compute the spamicity score of each model which is then used for detection and intelligent decision making. 3) Based upon the spamicity score computed in previous step, the reliability of IoT devices is analyzed using different evaluation metrics. 1) Feature Engineering: The machine learning algorithms works accurately with the appropriate instances and their attributes. We all know that the instances are the real data world value, gathered from the real world smart objects deployed across the globe. Feature extraction and feature selection are the core of feature engineering process. Feature reduction: This methods is used to reduce the dimension of data. In other words, feature reduction is the procedure to reduce the complexity of features. This technique reduces the issues like, over-fitting, large memory requirement, computation power. There are various feature extraction techniques. Among these, principal component analysis (PCA) is the most popular . But, the method used in this proposal is PCA along with following IoT parameters. – Analysis time: The dataset used in the experiments, contains the data recorded for the span of eighteen months. For better results and accuracy, we have considered the data of one month. Considering the fact, the climate is the important parameter for the working of IoT device, the month with maximum variations has been taken into the consideration – Web based appliances: Only those appliances are included, which stay connected with web for their working. The data collection includes the appliances: Television, Set top box, DVD player/recorder, HiFi, Electric heater, Fridge, Dishwasher, Toaster, Coffee maker, Kettle, Freezer, Washing machine, Tumble dryer, Electric heater, DAB radio, Desktop PC, PC monitor, Printer, Router, Electric heater, Electric heater, Shredder, Freezer, Lamp, Alarm radio, Lava lamp, CD player, Television, Video player, Set top box, Hub (network). Feature selection: It is the process of computing the most important subset of features. It works by computing the importance of each feature [16].
  • 3. Entropy based filter is used as a feature selection technique in this proposal. – Entropy-based filter: This algorithm uses the correlation among the discrete attributes with continuous attributes to find out the weights of discrete attributes . There are three functions using this entropy based filter namely, information.gain, gain.ratio, symmetrical.uncertainty. The syntax for these functions are: information.gain(formula, data, unit) gain.ratio(formula, data, unit) symmetrical.uncertainty(formula, data, unit) The arguments used in the function definition are described here. a) formula: It is the description of the working behind the algorithm. b) data: It is the set of training data with the defined attributes for which the selection is to be made. c) unit: It is the unit which is used for entropy computing. By default it takes the value “log”.