Designing A Novel Cyber Resilient System for Smart Home Utilizing Recursive Feature Elimination

Authors

  • Deva Rugved, C. Madhusudhana Rao, Chinthala Bharath Raj, N.Tanushri

Keywords:

IoT Intrusion Datasets, Feature Reduction, Light Gradient Boosting Machine (LGBM).

Abstract

The proliferation of Internet of Things (IoT) devices in smart homes has introduced significant security challenges, making advanced intrusion detection systems (IDS) essential for itigating potential threats. In this study, proposed a comprehensive framework for designing and implementing an IDS specifically tailored for IoT-enabled smart homes. The approach integrates LightGBM (LGBM) for attack detection and employs feature reduction techniques to enhance model performance and efficiency. This paper evaluated IDS using both IoT datasets and tested three feature reduction methods: Recursive Feature Elimination (RFE), Principal Component Analysis (PCA), and Linear Discriminant Analysis (LDA). The results show that RFE provided the best balance of detection accuracy and computational efficiency. The model effectively identified Mirai and Gafgyt attacks, achieving high accuracy rates of 99% on the datasets. Compared to previous systems, model demonstrated superior performance with reduced computational overhead, enhancing both detection accuracy and operational efficiency. Privacy and security considerations were carefully addressed throughout the design process to ensure user data protection and compliance with relevant regulations. Future work will focus on expanding the model’s capability to detect a broader range of attacks, improving scalability, and integrating advanced IoT technologies to further refine the IDS framework.

Downloads

Download data is not yet available.

References

Y. Zhou, G. Cheng, S. Jiang, and M. Dai, ‘‘Building an efficient intrusion detection system based on feature selection and ensemble classier, Comput. Netw., vol. 174, Jun. 2020, Art. no. 107247.

Verma and V. Ranga, ‘‘Machine learning based intrusion detection systems for IoT applications,’’ Wireless Pers. Commun., vol. 111, no. 4, pp. 2287–2310, Apr. 2020.

P. Hadem, D. K. Saikia, and S. Moulik, ‘‘An SDN-based intrusion detection system using SVM with selective logging for IP traceback,’’ Comput. Netw., vol. 191, May 2021, Art. no. 108015.

P. Kumar, G. P. Gupta, and R. Tripathi, ‘‘Toward design of an intelligent cyber attack detection system using hybrid feature reduced approach for IoT networks,’’ Arabian J. Sci. Eng., vol. 46, no. 4, pp. 3749–3778, Apr. 2021.K.

D. Devprasad, S. Ramanujam, and S. B. Rajendran, ‘‘Context adaptive ensemble classication mechanism with multi-criteria decision making for network intrusion detection,’’ Concurrency Comput., Pract. Exper., vol. 34, no. 21, pp. 1–12, Jun. 2022.

N. Gupta, V. Jindal, and P. Bedi, ‘‘CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in networkbased intrusion detection systems,’’ Comput. Secur., vol. 112, Jan. 2022, Art. no. 102499

S. H. Twe, Y. M. Thant, and M. M. S. Thwin, ‘‘Botnets attack detection using machine learning approach for IoT environment,’’ J. Phys., Conf. Ser., vol. 1646, no. 1, pp. 1–8, 2020.

W. Xu and Y. Fan, ‘‘Intrusion detection systems based on logarithmic autoencoder and XGBoost,’’ Secur. Commun. Netw., vol. 2022, pp. 1–8, Apr. 2022

T.-T.-H. Le, Y. E. Oktian, and H. Kim, ‘XGBoost for imbalanced multiclass classifcation-based industrial Internet of Things intrusion detection systems,’ Sustainability, vol. 14, no. 14, pp. 8707, Jul. 2022

Awajan, ‘‘A novel deep learning-based intrusion detection system for IoT networks,’’ Computers, vol. 12, no. 2, pp. 34, Feb. 2023.

W. Xu and Y. Fan, ‘‘Intrusion detection systems based on logarithmic autoencoder and XGBoost,’’ Secur. Commun. Netw., vol. 2022, pp. 1–8, Apr. 2022.

T.-T.-H. Le, Y. E. Oktian, and H. Kim, ‘‘XGBoost for imbalanced multiclass classification-based industrial Internet of Things intrusion detection systems,’’ Sustainability, vol. 14, no. 14, pp. 8707, Jul. 2022.

M. Nakip and E. Gelenbe, ‘‘Online Self-Supervised Deep Learning for Intrusion Detection Systems,’’ IEEE Transactions on Information Forensics and Security, vol. 19, pp. 5668–5683, 2024.

J. Wu, H. Dai, K. B. Kent, J. Yen, C. Xu, and Y. Wang, ‘‘Open Set Dandelion Network for IoT Intrusion Detection,’’ arXiv preprint arXiv:2311.11249, 2023.

Yazdinejad, H. Haddadpajouh, A. Dehghantanha, R. M. Parizi, and G. Srivastava, ‘‘Cryptocurrency malware hunting: A deep Recurrent Neural Network approach,’’ Applied Soft Computing, vol. 96, Art. no. 106658, Nov. 2020.

P. Fröhlich, E. Gelenbe, J. Fiołka, J. Chęciński, and M. Nowak, ‘‘Smart SDN Management of Fog Services to Optimize QoS and Energy,’’ Sensors, vol. 21, no. 9, pp. 1–20, 2021.

Downloads

Published

12.06.2024

How to Cite

Deva Rugved. (2024). Designing A Novel Cyber Resilient System for Smart Home Utilizing Recursive Feature Elimination. International Journal of Intelligent Systems and Applications in Engineering, 12(4), 5175–5181. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/7312

Issue

Section

Research Article