Welcome to Francis Academic Press

Academic Journal of Computing & Information Science, 2024, 7(3); doi: 10.25236/AJCIS.2024.070301.

Feature Interaction Based Feature Selection Algorithm for In-trusion Detection

Author(s)

Yimeng Wang, Zongpu Jia, Xiaoyan Pang, Shan Zhao

Corresponding Author:
Shan Zhao
Affiliation(s)

School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo, Henan, 454000, China

Abstract

Fog computing facilitates the placement of data at the network’s edge for processing, which effectively reduces energy consumption and enhances efficiency. However, the limited resources inherent in fog computing render it vulnerable to extensive volumes of high-dimensional anomalous traffic. This study proposes a novel feature selection algorithm called filtered interaction maximum relevance minimum redundancy, which incorporates feature interaction to enable effective intrusion detection in fog computing. Through feature selection, the algorithm downscales the high-dimensional data captured in the fog nodes to reduce redundant features. The experimental results show that the parsimonious feature set obtained using the algorithm in this paper improves the classification accuracy while reducing the execution time compared to the original dataset.

Keywords

Feature Selection; Fog Computing; Intrusion Detection; Feature Interaction; Machine Learning

Cite This Paper

Yimeng Wang, Zongpu Jia, Xiaoyan Pang, Shan Zhao. Feature Interaction Based Feature Selection Algorithm for In-trusion Detection. Academic Journal of Computing & Information Science (2024), Vol. 7, Issue 3: 1-12. https://doi.org/10.25236/AJCIS.2024.070301.

References

[1] ALANI M M. IoTProtect: A Machine-Learning Based IoT Intrusion Detection System [Z]. 2022 6th International Conference on Cryptography, Security and Privacy (CSP). 2022: 61-5.10.1109/csp 55486. 2022.00020

[2] ASULBA B A, SCHUMACHER N, SOUTO P F, et al. Impact of Training Set Size on Resource Usage of Machine Learning Models for IoT Network Intrusion Detection [Z]. 2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT). 2023: 330-7.10.1109/DCOSS-IoT58021.2023.00061

[3] SHEN S, HUANG L, ZHOU H, et al. Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks [J]. IEEE Internet of Things Journal, 2018, 5(2): 1043-54.

[4] CHISHAKWE S, MOYO N, NDLOVU B M, et al. Intrusion Detection System for IoT environments using Machine Learning Techniques [Z]. 2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT). 2022: 1-7.10.1109/zcict55726.2022.10045992

[5] DESHMUKH M S, BHALADHARE P R. Intrusion Detection System (DBN-IDS) for IoT using Optimization Enabled Deep Belief Neural Network [Z]. 2021 5th International Conference on Information Systems and Computer Networks (ISCON). 2021: 1-4.10.1109/iscon52037.2021.9702505

[6] FERRAG M A, SHU L, FRIHA O, et al. Cyber Security Intrusion Detection for Agriculture 4.0: Machine Learning-Based Solutions, Datasets, and Future Directions [J]. IEEE/CAA Journal of Automatica Sinica, 2022, 9(3): 407-36.

[7] FU G, LI B, YANG Y, et al. A Multi-Distance Ensemble and Feature Clustering Based Feature Selection Approach for Network Intrusion Detection [Z]. 2022 International Symposium on Sensing and Instrumentation in 5G and IoT Era (ISSI). 2022: 160-4.10.1109/issi55442.2022.9963155

[8] GE Y, LI J, TIAN Y. Internet of Things Intrusion Detection System Based on D-GRU [Z]. 2022 4th International Conference on Applied Machine Learning (ICAML). 2022: 1-6.10.1109/icaml57167. 2022.00066

[9] HATTARKI R, HOUJI S, DHAGE M. Real Time Intrusion Detection System For IoT Networks [Z]. 2021 6th International Conference for Convergence in Technology (I2CT). 2021: 1-5.10. 1109/i2ct51068.2021.9417815

[10] IKHWAN S, PURWANTO P, ROCHIM A F. Comparison Analysis of Intrusion Detection using Deep Learning in IoT Networks [Z]. 2023 11th International Conference on Information and Communication Technology (ICoICT). 2023: 339-44.10.1109/ICoICT58202.2023.10262603

[11] PRISCILLA C V, PRABHA D P. A two-phase feature selection technique using mutual information and XGB-RFE for credit card fraud detection [J]. International Journal of Advanced Technology and Engineering Exploration, 2021, 8(85).

[12] PASHAEI E, PASHAEI E. Hybrid binary arithmetic optimization algorithm with simulated annealing for feature selection in high-dimensional biomedical data [J]. The Journal of Supercomputing, 2022, 78(13): 15598-637.

[13] ZHOU H, WANG X, ZHU R. Feature selection based on mutual information with correlation coefficient [J]. Applied Intelligence, 2021, 52(5): 5457-74.

[14] QI Z, FEI J, WANG J, et al. An Intrusion Detection Feature Selection Method Based on Improved Mutual Information [Z]. 2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC). 2023: 1584-90.10.1109/itnec56291.2023.10082305

[15] WANG J, WEI J-M, YANG Z, et al. Feature Selection by Maximizing Independent Classification Information [J]. IEEE Transactions on Knowledge and Data Engineering, 2017, 29(4): 828-41.

[16] NGUYEN H T, FRANKE K, PETROVIC S. Towards a Generic Feature-Selection Measure for Intrusion Detection [Z]. 2010 20th International Conference on Pattern Recognition. 2010: 1529-32.10.1109/icpr. 2010.378

[17] WANG Y, YANG H, LIU H, et al. Scaled IoT Intrusion Detection Model based on Improved PSO Algorithm Optimization [Z]. 2023 5th International Conference on Electronic Engineering and Informatics (EEI). 2023: 340-4.10.1109/eei59236.2023.10212914

[18] MITTAL S, MISHRA A K, TRIPATHI V, et al. A Comparative Analysis of Supervised Machine Learning Models for Smart Intrusion Detection in IoT Network [Z]. 2023 3rd Asian Conference on Innovation in Technology (ASIANCON). 2023: 1-6.10.1109/asiancon58793.2023.10270377

[19] ANANTHI P, RAMYA T E, JANANI R. Ensemble based Intrusion Detection System for IoT Device [Z]. 2023 International Conference on Sustainable Computing and Smart Systems (ICSCSS). 2023: 1073-8.10.1109/icscss57650.2023.10169426

[20] TAVALLAEE M, BAGHERI E, LU W, et al. NSL-KDD dataset download site. https://www.unb. ca/cic/ datasets/nsl.html

[21] TAVALLAEE M, BAGHERI E, LU W, et al. A detailed analysis of the KDD CUP 99 data set; proceedings of the IEEE International Conference on Computational Intelligence for Security & Defense Applications, F, 2009 [C].

[22] AMIN Z, KABIR A. A Performance Analysis of Machine Learning Models for Attack Prediction using Different Feature Selection Techniques [Z]. 2022 IEEE/ACIS 7th International Conference on Big Data, Cloud Computing, and Data Science (BCD). 2022: 130-5.10.1109/bcd54882.2022.9900597

[23] ISMAIL M G, GHANY M A E, SALEM M A M. Enhanced Recursive Feature Elimination for IoT Intrusion Detection Systems [Z]. 2022 International Conference on Microelectronics (ICM). 2022: 193-6.10.1109/icm56065.2022.10005438

[24] LATHA R, BOMMI R M. Hybrid CatBoost Regression model based Intrusion Detection System in IoT-Enabled Networks [Z]. 2023 9th International Conference on Electrical Energy Systems (ICEES). 2023: 264-9.10.1109/icees57979.2023.10110148

[25] SHARAFALDIN I, LASHKARI A, GHORBANI A. CIC-IDS-2017 dataset download site. https://www. unb. ca/cic/datasets/ids-2017.html

[26] SHARAFALDIN I, LASHKARI A H, GHORBANI A A. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization; proceedings of the International Conference on Information Systems Security & Privacy, F, 2018 [C].

[27] MAJHI B, PRASTAVANA. An Improved Intrusion Dectection System using BoT-IoT Dataset [Z]. 2022 IEEE 11th International Conference on Communication Systems and Network Technologies (CSNT). 2022: 488-92.10.1109/csnt54456.2022.9787639

[28] NAVEED M, USMAN S M, SATTI M I, et al. Intrusion Detection in Smart IoT Devices for People with Disabilities [Z]. 2022 IEEE International Smart Cities Conference (ISC2). 2022: 1-5.10.1109/isc255366.2022.9921991

[29] SINGH S, FERNANDES S V, PADMANABHA V, et al. MCIDS-Multi Classifier Intrusion Detection system for IoT Cyber Attack using Deep Learning algorithm [Z]. 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV). 2021: 354-60.10.1109/icicv50876.2021.9388579

[30] YANG X, LIU Q. Intrusion Detection Technology of Natural Resource Information System in The Internet of Things Environment [Z]. 2023 International Conference on Mechatronics, IoT and Industrial Informatics (ICMIII). 2023: 403-6.10.1109/icmiii58949.2023.00084

[31] WADATE A J, DESHPANDE S P. Edge-Based Intrusion Detection using Machine Learning Over the IoT Network [Z]. 2023 11th International Conference on Emerging Trends in Engineering & Technology - Signal and Information Processing (ICETET - SIP). 2023: 1-6.10.1109/icetet-sip58143.2023. 10151535