COMPARATIVE ANALYSIS OF RANDOM FOREST AND ADABOOST LEARNING MODELS FOR THE CLASSIFICATION OF ATTACKS IN INTERNET OF THINGS

  • Usman Adedayo Adeniyi AIR FORCE INSTITUTE OF TECHNOLOGY KADUNA, KADUNA STATE
  • Maruf Olasunkanmi Alimi
  • Akinyemi Moruff Oyelakin
  • Samaila Musa Abdullahi
Keywords: Internet of Things, Machine Learning, Attacks in IoT, Security, Classification

Abstract

Attacks are actions that attempt to break one of the following properties of the computer system: confidentiality, integrity, and availability. The immense increment in the amount of internet applications and the appearance of modern networks has created the need for improved security mechanisms. Internet of Things (IoT) is a system that uses the Internet to facilitate communication between sensors and devices. Several approaches have been used to build attacks detection system in the past. This study built two ensemble models for the classification of attacks using Random Forest and Adaboost algorithms respectively. Feature importance was used for selecting promising attributes from the IoT intrusion dataset. Thereafter, the results of the classification models were evaluated and compared. The models were evaluated based on when feature selection technique was applied and without respectively.  For Random Forest-based classification model with feature selection, 99.0% ,0.95,0.88,0.82, were obtained for accuracy, recall, f1-score, and precision respectively while without feature selection 69.0%,0.86,0.76,0.64 were obtained respectively. For Adaboost-based classification model with feature selection 99.0%.0.69,0.61,0.66 were obtained for accuracy, recall, f1-score and precision respectively. Without feature selection the Adaboost model recorded 58.0%,0.58,0.48,0.50 respectively. The results showed that both models achieved high rates with feature selection technique used, with Random Forest performing slightly better, both learning models showed promised performances in classifying attacks in IoT environments. This study concluded that the use of the chosen feature selection method helped improve the performances of the two ensembles in the classification of attacks in the IoT dataset.

References

Alhowaide A., Alsmadi, Tang J. (2021). Towards the design of reel-time autonomous internet of things network intrusion detection system, Cluster Computing, 1-14. doi.org/10.1007/s10586-021-03231-5

Alladi, T., Chamola, V., Sikdar, B., & Choo, K. K. R. (2020). Consumer internet of things Security vulnerability case studies and solutions. IEEE Consumer Electronics Magazine, 9(2), 17-25. DOI: 10.1109/MCE.2019.2953740 DOI: https://doi.org/10.1109/MCE.2019.2953740

Alsamiri, J., & Alsubhi, K. (2019). Internet of things cyber-attacks detection using machine learning. International Journal of Advanced Computer Science and Applications, Vol. 10, No. 12. DOI:10.14569/IJACSA.2019.0101280 DOI: https://doi.org/10.14569/IJACSA.2019.0101280

Alzahrani, M. Y., & Bamhdi, A. M. (2022). Hybrid deep-learning model to detect botnet attacks over internet of things environments. Soft Computing, 26(16), 7721-7735. doi.org/10.1007/s00500-022-06750-4 DOI: https://doi.org/10.1007/s00500-022-06750-4

Al-Zewairi, M., Almajali, S., & Ayyash, M. (2020). Unknown security attack detection using shallow and deep ANN classifiers. Electronics, 9(12). https://doi.org/10.3390/electronics9122006 DOI: https://doi.org/10.3390/electronics9122006

Classen, J., Gringoli, F., Hermann, M., & Hollick, M. (2022). Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation. In 2022 IEEE Symposium on Security and Privacy (SP) (pp. 1229-1245). IEEE. DOI: 10.1109/SP46214.2022.9833639 DOI: https://doi.org/10.1109/SP46214.2022.9833639

Churcher, A., Ullah, R., Ahmad, J., Ur Rehman, S., Masood, F., Gogate, M. & Buchanan, W. J. (2021). An experimental analysis of attack classification using machine learning in IoT networks. Sensors, 21(2), 446. https://doi.org/10.3390/s21020446 DOI: https://doi.org/10.3390/s21020446

Charbuty, B., & Abdulazeez, A. (2021). Classification based on decision tree algorithm for machine learning. Journal of Applied Science and Technology Trends, 2(01), 20-28. doi.org/10.38094/jastt20165 DOI: https://doi.org/10.38094/jastt20165

de Souza, C. A., Westphall, C. B., Machado, R. B., Loffi, L., Westphall, C. M., & Geronimo, G. A. (2022). Intrusion detection and prevention in fog based IoT environments: A systematic literature review. Computer Networks, 109154. DOI: https://doi.org/10.1016/j.comnet.2022.109154

Deogirikar, J., & Vidhate, A. (2017). Security attacks in IoT: A survey. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) (pp. 32-37). IEEE. DOI: https://doi.org/10.1109/I-SMAC.2017.8058363

Dissanayake, M. B. (2021). Feature Engineering for Cyber-attack detection in Internet of Things. International Journal of Wireless and Microwave Technologies, 11(6), 46-54. DOI: https://doi.org/10.5815/ijwmt.2021.06.05

Fatai A. and Safiriyu I. E. (2012) Application of artificial intelligence in network intrusion detection. World applied programming, 158-166 ISSN: 2222-2510.

Guerrero-Sanchez, A. E., Rivas-Araiza, E. A., Gonzalez-Cordoba, J. L., Toledano-Ayala, M., & Takacs, A. (2020). Blockchain mechanism and symmetric encryption in a wireless sensor network. Sensors, 20(10), 2798. DOI: https://doi.org/10.3390/s20102798

Haji, S. H., & Ameen, S. Y. (2021). Attack and anomaly detection in iot networks using machine learning techniques: A review. Asian journal of research in computer science, 9(2), 30-46. DOI: https://doi.org/10.9734/ajrcos/2021/v9i230218

Ibitoye, O., Shafiq, O., & Matrawy, A. (2019). Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks. IEEE global communications conference (GLOBECOM) (pp. 1-6). IEEE. DOI: https://doi.org/10.1109/GLOBECOM38437.2019.9014337

Ignacio P.R and Maria M R (2008) evaluation of current is intrusion detection system. International journal LITH-ISY-EX—08/4160---SE.

Jimoh, R. G., Oyelakin, A. M., Olatinwo, I. S., Obiwusi, K. Y., Muhammad-Thani, S., Ogundele, T. S. & Ayepeku, O. F. (2022). Experimental evaluation of ensemble learning-based models for twitter spam classification. Information Technology for Education and Development (ITED) (pp. 1-8). IEEE. DOI: https://doi.org/10.1109/ITED56637.2022.10051587

Kwon, S., Park, S., Cho, H., Park, Y., Kim, D., & Yim, K. (2021). Towards 5G-based IoT security analysis against Vo5G eavesdropping. Computing, 103, 425-447. DOI: https://doi.org/10.1007/s00607-020-00855-0

Kaliyar, P., Jaballah, W. B., Conti, M., & Lal, C. (2020). LiDL: localization with early detection of sybil and wormhole attacks in IoT networks. Computers & Security, 94, 101849. DOI: https://doi.org/10.1016/j.cose.2020.101849

Lekhraj M.M and Monika B.G (2014) An Effectual and Secure Approach for the Detection and Efficient Searching of Network Intrusion Detection System (NIDS). International Journal of Computer Applications (0975 – 8887) Volume 108 – No 15, DOI: https://doi.org/10.5120/18990-0442

Mishra, S., & Tyagi, A. K. (2022). The role of machine learning techniques in internet of things-based cloud applications. Artificial intelligence-based internet of things systems, 105-135. DOI: https://doi.org/10.1007/978-3-030-87059-1_4

Mosavi, A., Sajedi Hosseini, F., Choubin, B., Goodarzi, M., Dineva, A. A., & Rafiei Sardooi, E. (2021). Ensemble boosting and bagging based machine learning models for groundwater potential prediction. Water Resources Management, 35, 23-37. DOI: https://doi.org/10.1007/s11269-020-02704-3

Meng, Li, W., W., & Au, M. H. (2020). Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments. Journal of Network and Computer Applications, 161, 102631. DOI: https://doi.org/10.1016/j.jnca.2020.102631

Oyelakin, A. M. (2021). An Investigation into the Performances of Supervised Learning Algorithms in Different Phishing Datasets. Pakistan Journal of Engineering, Technology & Science, 9(2).

Oyelakin, A., & Jimoh, R. G. (2020). Towards Building an Improved Botnet Detection Model in Highly Imbalance Botnet Dataset-A Methodological Framework. Volume, 3(03), 2020

Paricherla, M., Babu, S., Phasinam, K., Pallathadka, H., Zamani, A. S., Narayan, V., ... & Mohammed, H. S. (2022). Towards Development of Machine Learning Framework for Enhancing Security in Internet of Things. Security and Communication Networks. DOI: https://doi.org/10.1155/2022/4477507

Saheed, Y. K., Abiodun, A. I., Misra, S., Holone, M. K., & Colomo-Palacios, R. (2022). A machine learning-based intrusion detection for detecting internet of things network attacks. Alexandria Engineering Journal, 61(12), 9395-9409. DOI: https://doi.org/10.1016/j.aej.2022.02.063

Saheed, Y. K., Baba, U. A., Orje-Ishegh, T., & Longe, O. B. (2022). An Efficient Machine Learning and Deep Belief Network Models for Wireless Intrusion Detection System. Research Square https://doi.org/10.21203/rs.3.rs-2110380/v1 DOI: https://doi.org/10.21203/rs.3.rs-2110380/v1

Sivasankari, N., & Kamalakkannan, S. (2022). Detection and prevention of man-in-the-middle attack in iot network using regression modeling. Advances in Engineering Software, 169, 103126. DOI: https://doi.org/10.1016/j.advengsoft.2022.103126

Sahu, A. K., Sharma, S., Tanveer, M., & Raja, R. (2021). Internet of Things attack detection using hybrid Deep Learning Model. Computer Communications, 176, 146-154. DOI: https://doi.org/10.1016/j.comcom.2021.05.024

Shaikh, F., Bou-Harb, E., Crichigno, J., & Ghani, N. (2018, June). A machine learning model for classifying unsolicited IoT devices by observing network telescopes. International Wireless Communications & Mobile Computing Conference (IWCMC) (pp. 938-943). IEEE. DOI: https://doi.org/10.1109/IWCMC.2018.8450404

Sicato, J. C. S., Singh, S. K., Rathore, S., & Park, J. H. (2020). A comprehensive analyses of intrusion detection system for IoT environment. Journal of Information Processing Systems, 16(4), 975-990.

Shah, Y., & Sengupta, S. (2020). A survey on Classification of Cyber-attacks on IoT and IIoT devices. In 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) (pp. 0406-0413). IEEE. DOI: https://doi.org/10.1109/UEMCON51285.2020.9298138

Stiawan, D., Idris, M. Y. B., Defit, S., Triana, Y. S., & Budiarto, R. (2022). Improvement of attack detection performance on the internet of things with PSO-search and random forest. Journal of Computational Science, 64, 101833. DOI: https://doi.org/10.1016/j.jocs.2022.101833

Schonlau, M., & Zou, R. Y. (2020). The random forest algorithm for statistical learning. The Stata Journal, 20(1), 3-29. DOI: https://doi.org/10.1177/1536867X20909688

Tasnim, A., Hossain, N., Parvin, N., Tabassum, S., Rahman, R., & Hossain, M. I. (2022, March). Experimental Analysis of Classification for Different Internet of Things (IoT) Network Attacks Using Machine Learning and Deep learning. International Conference on Decision Aid Sciences and Applications (DASA) (pp. 406-410). IEEE.

Tasnim, A., Hossain, N., Tabassum, S., & Parvin, N. (2022). Classification and Explanation of Different Internet of Things (IoT) Network Attacks Using Machine Learning, Deep Learning And XAI DOI: https://doi.org/10.1109/DASA54658.2022.9765108

Zagrouba, R., & Alhajri, R. (2021). Machine learning based attacks detection and countermeasures in IoT. International Journal of Communication Networks and Information Security, 13(2), 158-167. DOI: https://doi.org/10.17762/ijcnis.v13i2.4943

Published
2024-06-30
How to Cite
AdeniyiU. A., AlimiM. O., OyelakinA. M., & AbdullahiS. M. (2024). COMPARATIVE ANALYSIS OF RANDOM FOREST AND ADABOOST LEARNING MODELS FOR THE CLASSIFICATION OF ATTACKS IN INTERNET OF THINGS. FUDMA JOURNAL OF SCIENCES, 8(3), 356 - 361. https://doi.org/10.33003/fjs-2024-0803-2448