Designing A Novel Cyber Resilient System for Smart Home Utilizing Recursive Feature Elimination
Keywords:
IoT Intrusion Datasets, Feature Reduction, Light Gradient Boosting Machine (LGBM).Abstract
The proliferation of Internet of Things (IoT) devices in smart homes has introduced significant security challenges, making advanced intrusion detection systems (IDS) essential for itigating potential threats. In this study, proposed a comprehensive framework for designing and implementing an IDS specifically tailored for IoT-enabled smart homes. The approach integrates LightGBM (LGBM) for attack detection and employs feature reduction techniques to enhance model performance and efficiency. This paper evaluated IDS using both IoT datasets and tested three feature reduction methods: Recursive Feature Elimination (RFE), Principal Component Analysis (PCA), and Linear Discriminant Analysis (LDA). The results show that RFE provided the best balance of detection accuracy and computational efficiency. The model effectively identified Mirai and Gafgyt attacks, achieving high accuracy rates of 99% on the datasets. Compared to previous systems, model demonstrated superior performance with reduced computational overhead, enhancing both detection accuracy and operational efficiency. Privacy and security considerations were carefully addressed throughout the design process to ensure user data protection and compliance with relevant regulations. Future work will focus on expanding the model’s capability to detect a broader range of attacks, improving scalability, and integrating advanced IoT technologies to further refine the IDS framework.
Downloads
References
Y. Zhou, G. Cheng, S. Jiang, and M. Dai, ‘‘Building an efficient intrusion detection system based on feature selection and ensemble classier, Comput. Netw., vol. 174, Jun. 2020, Art. no. 107247.
Verma and V. Ranga, ‘‘Machine learning based intrusion detection systems for IoT applications,’’ Wireless Pers. Commun., vol. 111, no. 4, pp. 2287–2310, Apr. 2020.
P. Hadem, D. K. Saikia, and S. Moulik, ‘‘An SDN-based intrusion detection system using SVM with selective logging for IP traceback,’’ Comput. Netw., vol. 191, May 2021, Art. no. 108015.
P. Kumar, G. P. Gupta, and R. Tripathi, ‘‘Toward design of an intelligent cyber attack detection system using hybrid feature reduced approach for IoT networks,’’ Arabian J. Sci. Eng., vol. 46, no. 4, pp. 3749–3778, Apr. 2021.K.
D. Devprasad, S. Ramanujam, and S. B. Rajendran, ‘‘Context adaptive ensemble classication mechanism with multi-criteria decision making for network intrusion detection,’’ Concurrency Comput., Pract. Exper., vol. 34, no. 21, pp. 1–12, Jun. 2022.
N. Gupta, V. Jindal, and P. Bedi, ‘‘CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in networkbased intrusion detection systems,’’ Comput. Secur., vol. 112, Jan. 2022, Art. no. 102499
S. H. Twe, Y. M. Thant, and M. M. S. Thwin, ‘‘Botnets attack detection using machine learning approach for IoT environment,’’ J. Phys., Conf. Ser., vol. 1646, no. 1, pp. 1–8, 2020.
W. Xu and Y. Fan, ‘‘Intrusion detection systems based on logarithmic autoencoder and XGBoost,’’ Secur. Commun. Netw., vol. 2022, pp. 1–8, Apr. 2022
T.-T.-H. Le, Y. E. Oktian, and H. Kim, ‘XGBoost for imbalanced multiclass classifcation-based industrial Internet of Things intrusion detection systems,’ Sustainability, vol. 14, no. 14, pp. 8707, Jul. 2022
Awajan, ‘‘A novel deep learning-based intrusion detection system for IoT networks,’’ Computers, vol. 12, no. 2, pp. 34, Feb. 2023.
W. Xu and Y. Fan, ‘‘Intrusion detection systems based on logarithmic autoencoder and XGBoost,’’ Secur. Commun. Netw., vol. 2022, pp. 1–8, Apr. 2022.
T.-T.-H. Le, Y. E. Oktian, and H. Kim, ‘‘XGBoost for imbalanced multiclass classification-based industrial Internet of Things intrusion detection systems,’’ Sustainability, vol. 14, no. 14, pp. 8707, Jul. 2022.
M. Nakip and E. Gelenbe, ‘‘Online Self-Supervised Deep Learning for Intrusion Detection Systems,’’ IEEE Transactions on Information Forensics and Security, vol. 19, pp. 5668–5683, 2024.
J. Wu, H. Dai, K. B. Kent, J. Yen, C. Xu, and Y. Wang, ‘‘Open Set Dandelion Network for IoT Intrusion Detection,’’ arXiv preprint arXiv:2311.11249, 2023.
Yazdinejad, H. Haddadpajouh, A. Dehghantanha, R. M. Parizi, and G. Srivastava, ‘‘Cryptocurrency malware hunting: A deep Recurrent Neural Network approach,’’ Applied Soft Computing, vol. 96, Art. no. 106658, Nov. 2020.
P. Fröhlich, E. Gelenbe, J. Fiołka, J. Chęciński, and M. Nowak, ‘‘Smart SDN Management of Fog Services to Optimize QoS and Energy,’’ Sensors, vol. 21, no. 9, pp. 1–20, 2021.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.


