Abstract

An influx of smart spaces that are now connected to the IoT network has increased new forms of cyber threats; thus, a need for more effective IDS to deal with these complex cyber threats. Traditional security measures cannot solve the modern problem of protecting IoT devices as they are a complex and homogeneously distributed network. Advancements and development of Artificial intelligent (AI) and machine learning technologies have provided new hope to make more reliable IDS. Our study presents Particle Swarm Optimization integrated Light-Weight Gradient Boosting Machine, abbreviated as LGBM-PSO in which, the PSO algorithm is applied for hyper parameters optimization in the model training. Based on the ensemble methodology, a new model for network intrusion detection is proposed in this study to improve the accuracy of the technique proposed. As for the current study project, the “DS2OS” dataset was employed to execute the suggested task. All of the data obtained from the traces of the smart devices placed in a smart home environment are incorporated in this dataset. The IDS model comprises several stages, one of which comprises data preprocessing that entails data cleaning, normalization, and encoding of network traffic data. Feature selection and dimensionality reduction are used which leads to the optimization of the dataset in this case. The core of the model comprises four classifiers: The compared models are Decision Tree (DT), LGBM-PSO, Light Gradient Boost Machine (LGBM), and Extreme Gradient Boost (XGB). Each of these classifiers can be combined with a majority voting ensemble method to increase the reliability of the predictions. The suggested model's accuracy that is LGBM-PSO is the highest with a value of 99.89%. The corresponding figures for the training data are 99.79%. Stand on the testing data proving the efficiency and stability of the algorithm. The use of the ensemble approach is superior especially when using a complex model like LGBM-PSO in the field of intrusion detection. As a result, high accuracy, optimized time, and effective threat identification ensure that it is a useful tool in strengthening security in the different applications.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.