Abstract

The most challenging research topic in the field of intrusion detection system (IDS) is anomaly detection. It is able to repeal any peculiar activities in the network by contrasting them with normal patterns. This paper proposes an efficient random forest (RF) model with particle swarm optimization (PSO)-based feature selection for IDS. The performance model is evaluated on a well-known benchmarking dataset, i.e. NSL-KDD in terms of accuracy, precision, recall, and false alarm rate(FAR) metrics. Furthermore, we evaluate the significance differencesbetween the proposed model and other classifiers, i.e. rotation forest (RoF)and deep neural network (DNN) using statistical significance test. Basedon the statistical tests, the proposed model significantly outperforms otherclassifiers involved in the experiment.

Highlights

  • The present escalation of Internet of Things (IoT) devices and services has changed our daily life dramatically

  • Many applications are built based on IoT technologies, i.e. smart cities, smart health care, smart home and vehicular networks [1]

  • Accuracy Number of Afterward, we show and discuss the average of performance results of all classifiers involved in our experiment, i.e. rotation forest (RoF) and deep neural network (DNN), and the proposed model (RF)

Read more

Summary

Introduction

The present escalation of Internet of Things (IoT) devices and services has changed our daily life dramatically. Many applications are built based on IoT technologies, i.e. smart cities, smart health care, smart home and vehicular networks [1]. Apart from these benefits, attackers may take this such opportunity to launch malevolent code or program to the network. According to [2], security is a key barrier of the implementation of IoT network and services. This is because IoT works with different standard and protocol forming a heterogeneous network. IoT devices prevalently produce a huge amount of data so it might become a big threat as malicious users can intercept the data while it is transmitted

Methods
Findings
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call