Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

Using Feature Selection Enhancement to Evaluate Attack Detection in the Internet of Things Environment

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • معلومة اضافية
    • بيانات النشر:
      ODU Digital Commons
    • الموضوع:
      2024
    • Collection:
      Old Dominion University: ODU Digital Commons
    • نبذة مختصرة :
      The rapid evolution of technology has given rise to a connected world where billions of devices interact seamlessly, forming what is known as the Internet of Things (IoT). While the IoT offers incredible convenience and efficiency, it presents a significant challenge to cybersecurity and is characterized by various power, capacity, and computational process limitations. Machine learning techniques, particularly those encompassing supervised classification techniques, offer a systematic approach to training models using labeled datasets. These techniques enable intrusion detection systems (IDSs) to discern patterns indicative of potential attacks amidst the vast amounts of IoT data. Our investigation delves into various aspects of supervised classification, including feature selection, model training, and evaluation methodologies, to comprehensively evaluate their impact on attack detection effectiveness. The key features selected to improve IDS efficiency and reduce dataset size, thereby decreasing the time required for attack detection, are drawn from the extensive network dataset. This paper introduces an enhanced feature selection method designed to reduce the computational overhead on IoT resources while simultaneously strengthening intrusion detection capabilities within the IoT environment. The experimental results based on the InSDN dataset demonstrate that our proposed methodology achieves the highest accuracy with the fewest number of features and has a low computational cost. Specifically, we attain a 99.99% accuracy with 11 features and a computational time of 0.8599 s.
    • File Description:
      application/pdf
    • Relation:
      https://digitalcommons.odu.edu/ece_fac_pubs/453; https://digitalcommons.odu.edu/context/ece_fac_pubs/article/1462/viewcontent/Chen_2024_UsingFeatureSelectionEnhancementtoEvaluateAttackDetectionintheInternetOCR.pdf
    • الرقم المعرف:
      10.3390/electronics13091678
    • الدخول الالكتروني :
      https://digitalcommons.odu.edu/ece_fac_pubs/453
      https://doi.org/10.3390/electronics13091678
      https://digitalcommons.odu.edu/context/ece_fac_pubs/article/1462/viewcontent/Chen_2024_UsingFeatureSelectionEnhancementtoEvaluateAttackDetectionintheInternetOCR.pdf
    • Rights:
      © 2024 by the authors. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution 4.0 International (CC BY 4.0) License.
    • الرقم المعرف:
      edsbas.79D82207