Optimalisasi Seleksi Fitur Untuk Deteksi Serangan Pada IoT Menggunakan Classifier Subset Evaluator

Authors

  • Kurniabudi Kurniabudi Universitas Dinamika Bangsa, Jambi
  • Abdul Harris Universitas Dinamika Bangsa, Jambi
  • Elvira Rosanda Universitas Dinamika Bangsa, Jambi

DOI:

https://doi.org/10.30865/jurikom.v9i4.4618

Keywords:

Anomaly Detection, Feature Selection, High Dimensional Data, High Class Imbalance, J48, Random Forest

Abstract

The Internet of Things (IoT) enables a wide variety of intelligent devices to connect and interact. The rapid development of technology and protocols as well as the growth of networks, makes IoT a security risk. The increasing number of interconnected intelligent electronic equipment has an impact on the complexity of the network and the increase in the volume of network traffic resulting in high-dimensional data. The feature selection technique has been proven to reduce very large (high-dimensional) network traffic data in the Intrusion Detection System (IDS). The feature selection technique is also faced with the problem of imbalanced data. In real network traffic data tends to be imbalanced, where attack traffic is less than normal data. IoT as a complex network produces a large number of features. However, not all features are relevant for identifying normal traffic and attacks. The right feature selection technique is needed to produce optimal features. In this study, a wrapper-based feature selection technique is proposed using a subset evaluator classifier with the J48 algorithm. The dataset used is CICIDS-2017 MachineLearningCSV version. Of the 78 features analyzed using the proposed method, 15 features were generated as optimal features. Optimal features are used for anomaly detection using the Random Forest algorithm. The experimental results show that attack detection with optimal features produces an average accuracy of 99.87% on training and testing data.

Author Biography

Kurniabudi Kurniabudi, Universitas Dinamika Bangsa, Jambi

Googla Scholar ID: TFUx_KUAAAAJ
SINTA ID: 207138
SCOPUS ID: 56979365500

References

H. Mustapha and A. M. Alghamdi, “DDoS attacks on the internet of things and their prevention methods,†Proceedings of the 2nd International Conference on Future Networks and Distributed Systems - ICFNDS ’18, pp. 1–5, 2018, doi: 10.1145/3231053.3231057.

M. Ammar, G. Russello, and B. Crispo, “Internet of Things: A survey on the security of IoT frameworks,†Journal of Information Security and Applications, vol. 38, pp. 8–27, 2018, doi: 10.1016/j.jisa.2017.11.002.

U. Javaid, A. K. Siang, M. N. Aman, and B. Sikdar, “Mitigating loT Device based DDoS Attacks using Blockchain,†Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems - CryBlock’18, pp. 71–76, 2018, doi: 10.1145/3211933.3211946.

A. I. Madbouly and T. M. Barakat, “Enhanced relevant feature selection model for intrusion detection systems,†International Journal of Intelligent Engineering Informatics, vol. 4, no. 1, p. 21, 2016, doi: 10.1504/ijiei.2016.074499.

J. Cai, J. Luo, S. Wang, and S. Yang, “Feature selection in machine learning: A new perspective,†Neurocomputing, vol. 300, pp. 70–79, 2018, doi: 10.1016/j.neucom.2017.11.077.

M. S. Pervez and D. M. Farid, “Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs,†SKIMA 2014 - 8th International Conference on Software, Knowledge, Information Management and Applications, 2014, doi: 10.1109/SKIMA.2014.7083539.

S. H. Kang and K. J. Kim, “A feature selection approach to find optimal feature subsets for the network intrusion detection system,†Cluster Computing, vol. 19, no. 1, pp. 325–333, 2016, doi: 10.1007/s10586-015-0527-8.

Z. Groff and S. Schwartz, “Data Preprocessing and Feature Selection For an Intrusion Detection System Dataset,†Proceedings of the 34th Annual Conference of The Pennsylvania Association of Computer and Information Science Educators, pp. 103–110, 2019, [Online]. Available: http://granite.sru.edu/~pacise/proceedings/pacise-proceedings-2019.pdf

H. Liu, M. Zhou, and Q. Liu, “An embedded feature selection method for imbalanced data classification,†IEEE/CAA Journal of Automatica Sinica, vol. 6, no. 3, pp. 703–715, 2019, doi: 10.1109/JAS.2019.1911447.

P. R. K. Varma, V. V. Kumari, and S. S. Kumar, A Survey of Feature Selection Techniques in Intrusion Detection System: A Soft Computing Perspective, vol. 710. Springer Singapore, 2018. doi: 10.1007/978-981-10-7871-2.

S. Rodda and U. S. R. Erothi, “Class imbalance problem in the Network Intrusion Detection Systems,†International Conference on Electrical, Electronics, and Optimization Techniques, ICEEOT 2016, pp. 2685–2688, 2016, doi: 10.1109/ICEEOT.2016.7755181.

B. Yan, G. Han, M. Sun, and S. Ye, “A novel region adaptive SMOTE algorithm for intrusion detection on imbalanced problem,†2017 3rd IEEE International Conference on Computer and Communications, ICCC 2017, vol. 2018-Janua, pp. 1281–1286, 2018, doi: 10.1109/CompComm.2017.8322749.

A. Yulianto, P. Sukarno, and N. A. Suwastika, “Improving AdaBoost-based Intrusion Detection System (IDS) Performance on CIC IDS 2017 Dataset,†Journal of Physics: Conference Series, vol. 1192, no. 1, 2019, doi: 10.1088/1742-6596/1192/1/012018.

Kurniabudi, D. Stiawan, Darmawijoyo, M. Y. Bin Bin Idris, A. M. Bamhdi, and R. Budiarto, “CICIDS-2017 Dataset Feature Analysis with Information Gain for Anomaly Detection,†IEEE Access, vol. 8, pp. 132911–132921, 2020, doi: 10.1109/ACCESS.2020.3009843.

I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “Toward generating a new intrusion detection dataset and intrusion traffic characterization,†ICISSP 2018 - Proceedings of the 4th International Conference on Information Systems Security and Privacy, vol. 2018-Janua, no. Cic, pp. 108–116, 2018, doi: 10.5220/0006639801080116.

J. Jabez, S. Gowri, S. Vigneshwari, J. A. Mayan, and S. Srinivasulu, “Anomaly Detection by Using CFS Subset and Neural Network with WEKA Tools,†Information and Communication Technology for Intelligent Systems, Proceedings of ICTIS 2018, vol. 2, pp. 675–682, 2019.

R. Panigrahi and S. Borah, “A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems,†International Journal of Engineering and Technology(UAE), vol. 7, no. 3.24 Special Issue 24, pp. 479–482, 2018.

S. Ustebay, Z. Turgut, and M. A. Aydin, “Intrusion Detection System with Recursive Feature Elimination by Using Random Forest and Deep Learning Classifier,†International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism, IBIGDELFT 2018 - Proceedings, pp. 71–76, 2019, doi: 10.1109/IBIGDELFT.2018.8625318.

B. Dhruba K and K. Jugal K, Network Anomaly Detection A Machine Learning Perspective. 2014.

R. Goel, A. Sardana, and R. C. Joshi, “Parallel Misuse and Anomaly Detection Model,†vol. 14, no. 4, pp. 211–222, 2012.

D. Summeet and D. Xian, Data Mining and Machine Learning in Cybersecurity. CRC Press, 2011.

Additional Files

Published

2022-08-30

How to Cite

Kurniabudi, K., Harris, A., & Rosanda, E. (2022). Optimalisasi Seleksi Fitur Untuk Deteksi Serangan Pada IoT Menggunakan Classifier Subset Evaluator. JURNAL RISET KOMPUTER (JURIKOM), 9(4), 885–893. https://doi.org/10.30865/jurikom.v9i4.4618