Figures
Abstract
Internet of things (IoT) facilitates a variety of heterogeneous devices to be enabled with network connectivity via various network architectures to gather and exchange real-time information. On the other hand, the rise of IoT creates Distributed Denial of Services (DDoS) like security threats. The recent advancement of Software Defined-Internet of Things (SDIoT) architecture can provide better security solutions compared to the conventional networking approaches. Moreover, limited computing resources and heterogeneous network protocols are major challenges in the SDIoT ecosystem. Given these circumstances, it is essential to design a low-cost DDoS attack classifier. The current study aims to employ an improved feature selection (FS) technique which determines the most relevant features that can improve the detection rate and reduce the training time. At first, to overcome the data imbalance problem, Edited Nearest Neighbor-based Synthetic Minority Oversampling (SMOTE-ENN) was exploited. The study proposes SFMI, an FS method that combines Sequential Feature Selection (SFE) and Mutual Information (MI) techniques. The top k common features were extracted from the nominated features based on SFE and MI. Further, Principal component analysis (PCA) is employed to address multicollinearity issues in the dataset. Comprehensive experiments have been conducted on two benchmark datasets such as the KDDCup99, CIC IoT-2023 datasets. For classification purposes, Decision Tree, K-Nearest Neighbor, Gaussian Naive Bayes, Random Forest (RF), and Multilayer Perceptron classifiers were employed. The experimental results quantitatively demonstrate that the proposed SMOTE-ENN+SFMI+PCA with RF classifier achieves 99.97% accuracy and 99.39% precision with 10 features.
Citation: Behera A, Sagar Sahoo K, Kumara Mishra T, Nayyar A, Bilal M (2024) Enhancing DDoS detection in SDIoT through effective feature selection with SMOTE-ENN. PLoS ONE 19(10): e0309682. https://doi.org/10.1371/journal.pone.0309682
Editor: Suja A. Alex, St Xavier’s Catholic College of Engineering, INDIA
Received: February 29, 2024; Accepted: August 2, 2024; Published: October 17, 2024
Copyright: © 2024 Behera et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Data Availability: No data has been used in this study.
Funding: The author(s) received no specific funding for this work.
Competing interests: The authors have declared that no competing interests exist.
1 Introduction
The Internet of Things (IoT) infrastructure is constantly expanding, and already has billions of physically connected gadgets [1, 2]. Due to the heterogeneity characteristics of the devices, they have severe security flaws. As a consequence, the prevalence of the IoT has greatly increased the number of cyber attacks globally [3]. IoT networks have several characteristics, including scalability, availability, efficiency, and reliability. As the size of the network grows, the above-mentioned constraint should be maintained. Software-defined networks (SDN) increase the flexibility and adaptability of networks. IoT networking is an architecture that efficiently abstracts numerous network layers [4, 5]. By enabling businesses and service providers to react quickly to shifting business requirements, SDN aims to enhance network control. IoT network with the supervision of SDN called SDIoT, assists in resource management and keep of network functionalities without compromising network performance [6].
Cyber attacks have recently targeted several IoT networks; for instance, on October 21, 2016, a DDoS attack utilizing Mirai’s Botnet impacted Dyn Server, a corporation that manages a large portion of the Internet DNS infrastructure in America [7]. Major websites like Amazon, Netflix, Spotify, PayPal, and Twitter in the US and Europe are affected by these attacks. This attack was discovered by cybersecurity researchers at Trend Micro and was affecting 122,069 IP cameras across the globe [8]. Recent cyber attacks on IoT networks have caused significant device damage, which served as the motivation for our study. To protect from sophisticated cyberattacks, it is on the top of the priority to quickly deploy intelligent solutions in IoT-based applications. Therefore, SDIoT-like new approaches need to be acknowledged for the DDoS attacks problems.
In the SDIoT, all IoT-enabled devices including smart watches, smartphones, smart hospitals, and smart vehicles constantly generate a large volume of data from the end users. All these heterogeneous services must be supported within a common architecture. According to the International Telecommunication Union Telecommunication Standardization Sector (ITU-2015) [9], the architecture of an IoT system should be organized into three layers: a) a sensing layer, containing all essential protocols for implementing data sensing units in IoT applications; b) a network layer, responsible for supporting all communication technologies; and c) an application layer, incorporating application support services, data service APIs, etc.
Fig 1 demonstrates an SDIoT scenario which has been inspired by work presented in [10], where authors introduced an energy-aware architecture utilizing a decentralized approach with blockchain and SDIoT scenarios to address various issues faced by smart society.
As demonstrated in the figure, a communication network is formed by all switches, and they act as the forwarding plane of the SDN network. This plane is responsible for forwarding the data from the IoT devices. The SDIoT controller manages each base station and is responsible for maintaining the security of the entire communication network. Most of the anomaly detection solutions for SDN have used machine learning (ML) and knowledge-based techniques to identify the attack [9–11]. The success of the ML classifiers sincerely depends on how accurately the anomaly traffic is detected [12]. In a real-time network, selecting key features from the data is important to make the classifier more sophisticated and effective for the identification of malicious attacks. To effectively reduce the amount of data, feature selection techniques can be employed in data pre-processing [13, 14].
The feature selections are of three categories such as filter method, wrapper method, and embedded method [15]. Here, the authors have implemented the wrapper methods. This method can remove noise data, and redundant and less important features from the dataset. Improved feature selection mechanism enhances both execution speed and accuracy [16]. As a result, the developer can construct effective models to detect DDoS attacks in real-time networks with fewer computational resources and prediction latency. Like feature selection, various feature reduction techniques such as principal component analysis (PCA), Linear Discriminant Analysis (LDA), and multidimensional scaling can be used for data preprocessing. These methods transform the original features into a new set of features [17].
This study suggests the following contributions, taking into account the necessity for advanced DDoS classification with low latency capability in an SDIoT network environment. The major contribution of this work can be summarized as follows:
- This work aims to develop a lightweight multi-class DDoS attack solution using improved FS selection techniques and ML algorithms. The feature selection method is employed to improve the intrusion detection rate and reduce the training time.
- To overcome the imbalance nature and over-sampling bias in the dataset, SMOTE- Edited Nearest Neighbor (ENN) is being utilized.
- The balanced data is used as an input for the wrapper-based FS technique and filter-based FS technique separately. The study proposes SFMI that combines the advantages of both SFE and Mutual Information techniques. Top k common features were extracted from the nominated features based on SFE and MI. Further, PCA is employed to address multi-collinearity and redundancy issues.
- For classification purposes, five different classifiers such as Decision Tree, K-Nearest Neighbour, Gaussian Naive Bayes, Random Forest, and Multilayer Perceptron are employed.
- The performance evaluation was conducted on benchmark datasets such as: KDDCup99 and the recently released CIC IoT-2023 dataset. A multiclass comparison and computational complexity analysis were made on the test dataset.
1.1 Background
Most of the anomaly detection solutions for SDN have used machine learning and knowledge-based techniques to identify the attack [18]. The success of the classifiers depends on how accurately they can predict the attack traffic. In a real-time network, timely measurements are the key factor. As a result, selecting prime features from the data is important to make the classifier more sophisticated and effective for the identification of attack traffic [12]. The SDN controller handles all application communication and networking equipment. Due to northbound interfaces, the controller will communicate with applications such as network monitoring, flow management, network management, firewall, load balancer services, and DDoS attack detection systems [19]. A southbound interface, such as the SDN OpenFlow protocol, enables the controller to communicate with particular network devices in the data plane [20, 21]. Using these southbound protocols, the controller can arrange the network devices and select the optimal network connectivity route for application traffic. In research, there are many datasets used for DDoS attack prediction, here the author used the KDDCup99 dataset for predicting DDoS attacks with SDIoT [22]. Various Machine Learning and Deep Learning based algorithms for predicting DDoS attacks were developed in the given context. The problem of an imbalanced dataset is not taken into consideration by many researchers, who instead concentrate on feature selection strategies and classification algorithms [23]. The accuracy of the classification algorithm is greatly affected by the issue of class imbalance. Additionally, a lot of attributes are needed for prediction when the data is unbalanced. This certainly makes the solution computationally complex, making it unusable in a real-world situation. This considerably increases the computing complexity of the solution, rendering it unsuitable for use in a real-world setting [24].
Furthermore, in order to decrease computing while maintaining reasonable accuracy, it is necessary to update the current feature selection techniques. Similarly, to this, improved classifier results are required to generate reliable outcomes. In summary, the prediction of attack traffic in a real network like SDIoT unified machine learning technique is needed. To add this data balancing, feature selection, and classification improvement need to be carried out systematically.
The rest of the paper is divided into five sections. Section 2 briefly discusses the pre-existing research work and briefly provides theoretical and mathematical explanations about DDoS and ML techniques. In section 3, the authors have discussed the proposed methodology, datasets and PCA, and various feature selection methods. Section 4 contains the result analysis and presents the evaluation. Section 5 concludes the paper with future scope.
2 Related work
In this section, we briefly discuss existing research about feature selection for DDoS attack detection in both SDN and IoT Networks.
Using various data sets and approaches, researchers have suggested multiple algorithms in order to predict DDoS attack Detection with networks. Razan et al. [23] proposed a multi-class combined performance metrics concerning class distribution to compare various multi-class and binary classifications. They used an auto encoder to assign the values to categorical data and PCA to reduce the dimensions. Aljawarnch et al. [25] proposed an anomaly based intrusion detection system through feature selection analysis hybrid feature selection method using correlation-based feature selection and information gain. They applied adaptive boosting using Naive Bayes as the weak classifier. Here correlation is done using greedy search and classifier on the reduced NSL-KDD dataset. In another work, Zong et al. [19] proposed the combination of matrix diversity and PCA for DDoS and feature reduction. They demonstrated a higher prediction accuracy than the traditional method. In this work, the authors used the KDDCup99 dataset. In [26] authors proposed a multi-objective optimization-based feature selection method for the detection of anomaly traffic in IoT. They have implemented the multi-objective evolutionary algorithm with an adapted jumping gene operator. They exploited an Extreme Learning machine (ELM) as the classifier for feature selection based on six critical objectives for an IoT network. The PCA was used to reduce the dimension of the dataset from a large number of features to a small number by Shengchu Zhao et al. [27]. For classification purposes authors used Softmax Regression and K-nearest neighbor algorithms. Softmax Regression achieves better accuracy using the KDDCup99 dataset. Panda et al. [28] suggested semi-naive Bayesian, Decision Tree-based, Chi-square automatic interaction identification. Next, a hybrid genetic algorithm and K-mean clustering were utilized, along with two dependency estimators. Deep Multi-Layer Perceptron and Convolutional-Neural Network based classifiers are two instances of deep learning techniques used [29]. Further in [30], two features selecting methods i.e. information gain and RF analysis are used by the authors. For improving accuracy, deep learning techniques and LSTM and Autoencoder were used to solve the issue of DDoS attacks in SDNs. In [31], the authors approached the feature selection method Extreme Gradient Boosting for determining the most relevant features with a hybrid Convolutional Neural Network and Long-Short Term Memory (CNN-LSTM) for DDoS attack classification. The proposed model applied on the CICIDS2019 dataset with improved accuracy. In a similar work, Abubakr et al. [32] used a wrapper method for feature selection using a binary-particle swarm optimization algorithm and the Decision Tree approach.
Brao et al. explored variance indexing methods using a feature selection algorithm for intrusion detection [33]. They specified the KNN method to improve partial distance search and different types of classification for the significance implemented on the NSL-KDD dataset. An ensemble framework (EnFs) has been proposed by Das et al. [34]. The framework combines the outputs of seven important features using the majority voting technique and produces an optimal set of features on the NSL-KDD dataset. In [35] researchers combined the information gain, PCA with an ensemble classifier and SVM instance-based learning algorithms over ISCX2012, NSL-KDD, and Kyoto-2006 datasets. In a different context, Bawany et al. [16] employed SEAL, an SDN-based adaptive framework, for protecting smart city applications against DDoS attacks. Chen et al. [36] proposed a statistical-based trace-back scheme using the SDN architecture. They have analyzed the changes of network flow through the base station and multiple controllers. In [37], authors proposed a novel feature selection approach for the network intrusion detection system in a cloud environment. Authors in [38], suggested an ensemble based multi-feature selection method that combines the output of four filter methods to achieve an optimum selection using intrusion detection. In [39], authors suggested a FS method which is based on mutual information. In [40], authors proposed PCA as the FS and SVM as the classifier for their anomaly detection work. Lin et al. [41] prosed BFE for their work.
From the above literature survey, it can be observed that the DDoS detection using machine learning techniques has not been well explored in the SDIoT like modern network infrastructure. Usually, the anomaly datasets are imbalanced in nature and in this direction limited research has been carried out. To overcome the data imbalance, the framework suggests utilizing the SMOTE technique. So far, many research were conducted the experiments with binary classes out of 23 types of attacks. Due to the higher execution time, previous researchers were unable to cover all the classes. For this reason, the accuracy and detection rate vary. However, the current study attempts to include 11 types of attacks as four classes.
3 Materials and methods
The following section discuss about the dataset, feature selection, feature reduction, and various ML models used in this work.
3.1 Materials
The Subsequent section discusses the dataset, various data pre-processing techniques opted in the work.
3.1.1 Dataset.
There are multiple datasets used in research for the prediction of DDoS attacks. The authors used the KDDCup99 dataset for the prediction of DDoS attacks. The KDDCup99 dataset is widely used in IoT and SDN frameworks for DDoS attack detection using ML for training purposes because it is a well-known and well-established dataset in the field of network security [24]. The dataset provides a large set of labeled network traffic data that can be used to train machine learning algorithms to detect various types of network attacks, including DDoS attacks. Additionally, the use of this dataset helps to ensure that the resulting ML models are not overfitting to a specific dataset, and it mimics real-world network traffic data.
Additionally, we employed the CIC IoT-2023 dataset, a new and extensive resource that provides unique benefits and expands upon earlier datasets [42]. The latest dataset, released by the Canadian Institute for Cybersecurity, is created specifically for security analytics applications for real-time IoT operations. This dataset introduces a unique and comprehensive compilation of IoT attack data having 47 features including target value with 238687 instances, featuring 34 attack classes conducted in an IoT topology consisting of 105 devices.
3.1.2 Data pre-processing.
There are many methods are available for data pre-processing. For data pre-processing authors address the threes issues such as (i) Handling null values (ii) Standardization (iii) Handling categorical values. The detailed process is discussed below.
- Handling Null Values In the KDDCup99 and CIC-IoT2023 dataset few features contain null values. This issue is handled by dropping rows.
- Standardization In this study, feature scaling is accomplished using the standardization technique, in which the values are updated to the mean with a standard deviation of one unit. Thus, the required columns are updated using Eq 1.
(1) where μ is the mean of the feature values and σ is the standard deviation of the feature values. Standardization is helpful in cases where the data follows a Gaussian distribution for standardization of the data set, which is discussed in Eq 2.
(2)
- Handling Categorical values In the data set, four categorical variables are present such as protocols, service, flag, and label. For handling categorical values we used the label encoder technique. This data can be replaced with 1, 22, 9, and 3 respectively.
3.1.3 Class selection in both dataset.
We have categorized the different attacks to verify the effectiveness of the feature selection methods. Eleven out of 23 different types of attacks have been selected. These 11 types of attacks were divided into 4 different classes DOS, Probe, R2L, and Normal.
The CIC-IoT dataset has 34 classes and every attack carried out for this study has a unique set of features. We converted 34 classes into 7 classes i.e.; DDoS, DoS, Recon, Web-based, Brute Force, Spoofing, Mirai and Normal attack. Each category and categories are listed in Table 1.
Table 1 provides a thorough summary of several cyberattacks, divided into sections for Denial-of-Service (DoS), Distributed Denial-of-Service (DDoS), Vulnerability Scan, Brute Force, Spoofing, and Internet of Things Malware attacks. Attack methods including ACK Fragmentation, UDP Flood, Ping Sweep, OS Scan, Sql Injection, Dictionary Brute Force, Arp Spoofing, Mirai, and GREIP Flood are all included in each category.
3.2 Methods
Subsequent section discusses the ML methods, dimension reduction and feature selection methods employed in the work.
3.2.1 SMOTE.
SMOTE generates new artificial instances using information about the neighbors that surround each sample in the minority class [22, 43, 44]. SMOTE creates synthetic training cases for the minority class using linear interpolation [45] These synthetic training cases are constructed by randomly selecting a subset of the k-nearest neighbors for each instance in the minority class [46].
However, we have explored Edited Nearest Neighbor with SMOTE (SMOTE-ENN). SMOTE-ENN combines the SMOTE oversampling technique with an undersampling technique called ENN. It separates the presence of any noisy or borderline samples from the dataset by considering their class label against their K-Nearest Neighbors (K-NN). In case the class labels do not equal, then the sample is considered as noisy and then both observation and its KNN are removed. SMOTE selects each minority sample as the root sample for synthesis of the new sample. Further ENN eliminates noisy samples whose most KNN samples are different from other classes which is illustrated in Fig 2. The step-by-step process of SMOTE-ENN is discussed in Algorithm 2.
3.2.2 Feature selection.
Feature selection is the process of selecting a subset of the original characteristics to reduce model complexity, improve computing performance, and reduce generalization error caused by noise provided by irrelevant features [20]. In this study, two feature selection methods have been examined. These methods can be used in the proposed framework’s feature engineering modules. First one is the sequential feature selection and the second one is backward feature elimination which comes under the wrapper method [15]. The wrapper approach is the primary focus of this paper. The wrapper techniques employ a search strategy to combine the space of potential feature subsets and rank them accordingly [47]. The wrapper technique is based on greedy search algorithms, which consider all feasible feature combinations and produce the best outcomes [34]. Feature selection techniques which include sequential feature selection (SFS), backward feature elimination (BFE), recursive feature selection, exhaustive feature selection, etc. are the most popular approach categories. In this paper, we have explored SFS and BFE methods.
- Sequential Feature Selection
The SFE technique is a family of greedy search techniques, that reduces an initial d-dimensional feature space to a k-dimensional feature subspace, where k<d. Finding the ideal subset of features in λ is the process referred to as feature selection. Thus, the problem can be expressed as, {Y(λ): λ ∈ 2k},
Whereis any subset of features,
is the set of feasible solution and Y(λ) is objective function used to measure of quality of λ. In this context, we search for a subset using SFS as an objective value.
- Backward Feature Elimination
Using a feature selection strategy, the traits that have no observable effect on the dependent variable or output prediction are eliminated [43]. As other features are added, the model grows increasingly complicated. Consequently, in order to get the best outcomes, it is essential to keep the model straightforward and to focus just on its most crucial components. This strategy is used to enhance the performance of the ML model by only including the features that have the greatest impact and eliminating the features that have the least impact. - Mutual Information
Mutual information measures the amount of information obtained about one variable through the observation of another variable. MI value zero indicates two variables are independent. In FS, mutual information is used to evaluate the relevance of each feature to the target variable. A high MI score indicates that a feature provides valuable information about the target variable. A low score suggests that the feature is less informative about the target variable and may be considered for removal, which is discussed in Eq 3. The MI between two features (x) and (y) can be calculated as follows:(3)
where, I(x, y) represents the MI between x and y. P(x′, y′) denotes the joint probability. P(x′) and P(y′) are the marginal probabilities.
3.2.3 Classification techniques.
- Decision Tree:
The selection of attributes for root nodes within every level is the most difficult task in a Decision Tree. There are two popular methods for selecting attributes [48]. In machine learning, the DT algorithm works with no attribute-based parameter technique. If there is a single attribute that really can simply segregate data and improve decision-making, it works well. The range of the root node poses a hurdle in this approach. When the root node is chosen carefully, the algorithm’s computational complexity is reduced, and it becomes extremely effective. - Random Forest It is a popular classifier for supervised learning. The key benefits are reduction of over-fitting, a shorter training period, and excellent accuracy.
- Gaussian Naïve Bayes:
In Gaussian Naïve Bayes (GNB) a special type of Naive Bayes classifier. It is specially used in dataset features that have continuous value, then features are assumed to be Gaussian distribution and we call another name the normal distribution [49]. - Multilayer Perceptron:
The multi-layer perceptron is an infinite sized directed acyclic graph. A decent generalization is the most widely used neural network architecture. The trained model can provide reliable output for the label and untested inputs. The early stopping criteria of the MLP classifier gives an approximation of the number of iterations that can be performed before the model becomes overfit [50]. - K-Nearest Neighbour: One of the most fundamental adaptive algorithms being used in supervised learning is the K-NN approach. In supervised learning, the training data is labeled and found unknown samples, the model forecasts it using a trained model [51]. KNN performs effectively on datasets with just many samples. It works well with numeric properties only. A distance metric is used to identify which of the K examples inside the training data are closest to the new input. Euclidean distance is the widely used distance measure for input variables with real values. The distance is measured using Eq 4.
(4)
- Principal Component Analysis (PCA):
It is an unsupervised learning algorithm used in machine learning for dimensionality reduction [40]. The goal of PCA is to find a new set of orthogonal axes known as “principal components” that capture the most variance in the data. PCA is a widely used method for exploratory data analysis, as it can help identify patterns and relationships in high-dimensional datasets. Additionally, by reducing the number of dimensions, PCA can also improve the performance of machine learning algorithms that require a lower number of features.
4 Proposed model
Fig 3 shows the high level design of ML based anomaly detection framework utilizing SD-IoT. The detection scheme primarily consists of three main components: IoT devices, SDN switches, and SDIoT controllers. The major modules are residing in the SDN controller. It includes a feature extraction module, learning with detection module, and a flow management module. By using the OpenFlow protocol, the controller separates policies into service-specific rules and pushes them into the flow tables of the SDN switches [52]. Then the packet is forwarded based on these rules in the flow table. There are different fields that are stored in the flow table against each flow entry. Whenever a new packet arrives, it is matched with the flow table rules, in case of a match the controller takes the necessary action stored in the action field and in turn updates the counters. In case of a mismatch, a new rule is supplied to the flow table.
The actions starting from pre-processing to classifier selection in the controller are segregated into five stages. The various steps used in this model are depicted in Fig 4. In the first stage prepossessing of the dataset is carried out. In this study, the KDDCup99 and CIC-IoT 2023 dataset were employed. This dataset needs to be balanced in the second phase since it consists of unbalanced classes. The feature selection technique was applied in the third phase to determine the reduced features and important features. The balanced data is used as an input for the wrapper-based SFS technique and filter based Mutual Information technique separately. The FS process called SFMI combines the advantages of both SFE and MI techniques. In SFMI each input feature is added to the final selected features set based on maximizing mutual information between selected inputs and target value. Here, MI helps to measure the goodness of the feature. On the other hand, SFE iteratively build the best performing feature subset for the predictive model. Further the top k common features were extracted from the nominated features based on SFE and MI.
Algorithm 1 summarizes the proposed approach.
Algorithm 1 Proposed Anomaly Detection Model
1: Read the data set ND with features x1, x2, …, x42
2: Detect the attack traffic
3: Initialize Data ← ND
4: Pre-processing of the data set involves categorical value, Standardization, and Null values.
5: Balancing the data set using SMOTE-ENN ←
6: FS1 ← Nominated feature set based on SFS
7: FS2 ← Nominated feature set based on MI
8: Top k (feature new) ← FS1 ∩ FS2
9: Apply PCA on a dataset with featurenew
10: for i = 1 to 2 do
11: ← split(featurei, 70%, first)
12: ← split(featurei, 30%, last)
13: end for
14: Train the data with DT, RF, MLP, GNB, K-NN
15: Set the best model
16: Test the data with the best model.
17: Predict the test data
18: if (Class Label == Normal) then
19: forward the packets
20: else
21: Attack class classified and start to drop
22: all the subsequent requests from the source
23: end if
24: End
Algorithm 2 Edited Nearest Neighbor-based SMOTE
1: Input: Dataset, Minority class m′, nearest neighbour k
2: Output: Balanced Dataset
3: Begin
4: select random data from m′
5: Calculate x = dist(m′, k)
6: Multiply y = x × r where r ∈ rand (0, 1)
7: add y to m′
8: Repeat step 5-7 until the required number of minority class is achieved. ▹ End of SMOTE
9: set k, find K-nearest neighbor of the observation (c) and return the majority class cm. ▹ Start of ENN
10: if c ≠ cm then
11: observation and its K nearest neighbor are removed.
12: end if
13: Repeat step 10 and 11 until the desired proportion of each class is fulfilled.
14: End
In the third phase PCA is used to address the issues related to multicollinearity, over fitting, and dimension reduction. The fourth phase uses machine learning models for training and the fifth stage is for testing and selecting the optimal model. Algorithm 1 summarizes the proposed detection model, and the SMOTE-ENN process is discussed in Algorithm 2.
5 Experimentation analysis
5.1 Simulation setup
In this paper, all experiments were performed over a machine having given configurations such as CPU Intel Core i7, 512 GHz,8 GB RAM. Python 3.9 Anaconda and Jupyter Notebook IDE are used as other additional packages. For the experiment purpose, we consider the Mininet version 2.1.0 framework and POX controller. POX can control hundreds of OpenFlow-enabled base station nodes with a flexible programming network control interface for the end-users. As opposed to NS3 and Opnet, the Mininet can easily create a virtual SDN environment with several end hosts, switches, and controllers on the Linux kernel. A tree topology has been considered which consists of 8 switches, 63 hosts, and a controller. For experimentation purposes, the hosts are treated as IoT devices that communicate with each other through edge devices through OpenFlow switches. We considered a similar test bed used in [35]. Among the IoT devices randomly one is considered as an attacker and another one is the victim.
The Table 2 presents the 15 features selected using Sequential Feature Selection (SFS) for both the KDDCup99 and CIC-IoT23 datasets. The MI score is used to evaluate the importance of each feature. Then we took 10 common features for both datasets respectively. For both the datasets, most important features were selected. These results suggest that the most important features for distinguishing between normal and anomalous traffic in both datasets are related to the network traffic itself, such as the number of bytes transferred, the number of connections, and the error rate. Additionally, the features related to the source and destination hosts are also important, such as the number of connections to the same host and the error rate for connections to the same host. These findings have implications for the development of intrusion detection systems (IDSs). By focusing on the most important features, IDSs can more effectively detect anomalous traffic and reduce false alarms.
5.2 Performance measures and parameter settings
The performance of the detection model is measured using the metrics which is listed in Table 3. The confusion matrix is a function of True Positive (TP), True Negative (TN), False Positive (FP), and False Negative(FN).
Table 4 provides information on the parameter settings for the used ML approaches. Each row indicates a different model, while the columns provide the parameters and values for each model. For example, the RF model employs a ‘gini’ criterion, has a maximum depth of 10, a random state of 42, and uses 10-fold cross-validation.
5.3 Results and analysis
The problem of class imbalance has a significant impact on the classification algorithm’s accuracy. This massively increases the computational complexity of the DDoS solutions, making it inappropriate for usage in a real-world situation [36]. Both binary and multiclass classification can be used on the KDDCup99 and CIC-IoT23 dataset, however, we have considered multiclass classification.
5.3.1 Class imbalance analysis.
When ML models train over imbalanced datasets, the models can often suffer from biased learning and poor performance due to the mismatch between the class distribution and the distribution of the training data. This is because the majority class can dominate the learning process and the model can ignore the minority class, leading to poor prediction performance for minority class samples. To overcome such issues classical SMOTE technique is usually used which generates synthetic samples for the minority/majority class in order to balance the class distribution. SMOTE has the tendency to create synthetic samples that are very close to the existing minority class samples. This can lead to over-sampling bias in the resulting balanced dataset. SMOTE-ENN solves this problem by removing samples that are considered noisy or redundant after oversampling with SMOTE. In Table 5 discusses both datasets comparisons on 11 and 7 classes (out of 23 and out of 33) classes after over sampling. After applying SMOTE, we can observe that the classes are equal. However, after applying SMOTE-ENN, it removes a few synthetic samples which will help to reduce the complexity of the model. Hence, in this work, we have considered the SMOTE-ENN technique for balancing the dataset.
The approximate proportions of attack classes in the KDD dataset has been changed significantly after using SMOTE and SMOTE-ENN. The proportion of different classes (DoS, Normal, Probe and R2L attacks) in the original dataset are in the ratio 79.30: 19.66: 0.83: 0.21. Similarly, the proportion of different classes in CICIoT dataset (DDoS, DoS, Recon, Web-Based, Brute Force attacks, Spoofing and Mirai) in the original are in the ratio 74.55: 17.71: 0.80: 0.06, 0.03: 1.09: 5.76. After using SMOTE and SMOTE-ENN, all classes were adjusted to have approximately equal proportions.
Further, we have shown the malicious attack detection accuracy results obtained when tested with the benchmark dataset with the proposed model. Later we show the results of various network performance evaluation metrics with SMOTE-ENN techniques. Feature selection and reduction techniques are analyzed using ML models with and without SMOTE technique. The accuracy of the models with SMOTE provides promising results but the recall of the minority class is less, i.e. the model is more dependent on the majority class. After applying SMOTE-ENN the dataset split into training and testing with the ratio of 70: 30. Different classification methods are also employed, including DT, RF, MLP, GNB, and K-NN. This methods are used to recognize and learn about DDoS attacks.
5.3.2 Impact of features on model performance.
The balance between the simplicity of the model and accuracy was achieved in our experimental analysis by properly choosing 10 features. Choosing 15 or more features increased the accuracy, but at the same time added computing overhead and redundancy. The goal of selecting 10 features was to create a model that is accurate, comprehensible, and broadly applicable. By utilizing only 10 features, the model sacrifices only a minimal fraction of accuracy, and such marginal compromise is acceptable for resource constraint IoT enabled smart application. Fig 5a and 5b shows the Whisker plot drawn against the number of features and the accuracy using the RF classifier. It presents the minimum and maximum accuracy obtained for an increasing number of features. Features have been selected using combined SFMI and model trained with RF classifier. It can be observed that the accuracy value of the model is an acceptable range when the number of features is more than ten.
(a) CIC-IoT-2023 dataset, (b) NSL KDD99 dataset.
In the both datasets there are 42 and 47 features, including the target value present in the KDDCup99 and CIC-IoT datasets respectively.Therefore, we evaluate the model with top 20, 15, and 10 sets of features out of 42 and 47 features. The selected features are listed in Table 6.
5.3.3 Analysis of proposed SFMI feature selection.
The common features selected by SFMI are likely to be the most informative for the model, as they have been validated by two different selection criteria. This method helps in achieving a well-performing and generalizable model.
For a comparison purpose, first we employed SFMI with and without SMOTE-ENN for both datasets in Tables 7 and 8. Accordingly, precision, recall, F1-score, and accuracy were calculated. SFMI with SMOTE-ENN has been evaluated on five different models. Among these methods, the RF obtained better accuracy i.e. 98.09% (without SMOTE-ENN) and 99.79% (with SMOTE-ENN) and GNB attained the lowest accuracy of 93.42% (without SMOTE-ENN) and 92.12% (with SMOTE-ENN) respectively with 10 features in KDD99 dataset. In the CIC-IoT 2023 dataset, the RF obtained better accuracy i.e. 99.45% (without SMOTE-ENN) and 99.95% (with SMOTE-ENN) and GNB attained the lowest accuracy with 10 features. From the tables, it can be noted that adding extra features has minimal effect on the overall accuracy. Except for GNB, all ML models perform better in the classification task. The results indicate the common features between the two methods having a higher level of consistency.
The experimental analysis of BFE with SMOTE are detailed in Table 9. Like the previous scenario, in this experiment BFE with five different classifiers were examined. We found that SFMI performs slightly better than BFE in many cases. In few scenarios BFE outperforms the proposed method. For instance, with different feature sets, the GNB shows better performance using BFE. While with 10 features, DT and RF show comparatively better results with the proposed feature selection method.
5.3.4 PCA analysis after SFMI.
The dataset contains numerous features and multidimensional classes. PCA is utilized to locate the dataset’s most important attributes and makes the dataset simple. In the further experiment PCA is being utilized with SMOTE-ENN, and it is observed that it attains better results in terms of recall and F1- score. For instance, the precision and recall values of GNB were 86% and 89%, respectively without PCA with 15 features selected using SFMI (Table 10). A similar observation for MLP and K-NN. After applying PCA a better outcome was observed for GNB, KNN and MLP models. Based on the results and analysis, it can be noticed that SMOTE-ENN+SFMI with PCA performed well on all models. After comparison of all performance results, SMOTE-ENN+SFMI with PCA on the Random Forest classifier yields promising results in predicting attack traffic for all sets of features. Hence for oversampling the dataset SMOTE-ENN is being utilized, SFMI as the feature selection technique and DT is selected as the network classifier.
The overall detection effect of each classical models on the dataset is shown in the Table 11. It is observed that the accuracy of the proposed model is roughly 1.5% superior than other models.
The benefits of the suggested model (SFMI+PCA) are listed below.
- The SFMI+PCA leads to a higher capability to detect DDoS attacks. For instance with 10 features GNB achieved 92.12% accuracy, whereas after PCA it achieved 96.44% in KDD-Cup dataset. In CIC-IoT dataset, DT attained 99.29% and 99.82% accuracy before and after PCA respectively.
- By finding the best relevant features and eliminating multicollinearity concerns, the SFMI+PCA model decreases the classifier’s computational complexity.
- Experiments reveal that the proposed FS with PCA achieves precision 99.39% with only ten features in CIC-IoT dataset whereas only SFMI achieved 99.30%.
5.3.5 Multiclass classification and analysis.
In Fig 6a and 6b the experimental results on the KDDCup99 test data illustrate that the proposed method has a comparatively high accuracy and precision value on all types of attack types. It has a significant advantage over other classical ML models with no feature selection mechanism. The model obtained the recall of 91.19%, 80.33%, 84.16%, and 45.37% on normal, probe, DoS, and R2L respectively. Using the proposed model, the recall value of R2L attack type was 45.56%, which was slightly higher than the classical RF model as illustrated in Fig 6c. In Fig 6d shows the statistical outcome of the F1-score metrics for the four class types in the test dataset. The model presented in this work obtained the highest F1-score of 85.16% for DoS attacks, 79.33% for Probe traffic. Compared with other classical methods, F1 results of all classes greatly improved as shown in Fig 6d.
(a) Accuracy, (b) Precision, (c) Recall, (d) F1-Score.
In Fig 7a and 7b the experimental results on the CIC-IoT test dataset. The model obtained the recall of 99.01%, 98.13%, 93.52%, 98.23%, 65.52%, 68.00%, and 77.09% on DDoS, DoS, Recon, Brute Force, Mirai, Web-based, and Spoofing respectively. Compared with the classical RF model, there is a significant improvement in precision score in all types of attacks in both datasets. Using the proposed model, the recall value of the attack type was slightly higher than the classical RF model as illustrated in Fig 7c. In Fig 7d shows the statistical outcome of the F1-score metrics for the seven class types in the test dataset. The F1 score focuses on the recall and precision value, which exhibit the efficacy of the proposed work. So, it is obvious that there is a major impact of dataset balancing on the overall performance of the model.
(a) Accuracy, (b) Precision, (c) Recall, (d) F1-Score.
5.3.6 Comparative analysis with other FS techniques.
It is important to observe the performance of the proposed FS approach against the standard feature selection methods. The impact of four FS methods, including our proposed approach, is visually depicted in Fig 8. To provide a comprehensive comparison, we evaluated well-established techniques such as BFE [41], SFS [15], MI [39], and PCA [40]. Fig 8a and 8b present line plots illustrating the performance of such FS techniques and their corresponding accuracies on two distinct datasets. Notably, the utilization of combined SFMI with a trained RF classifier demonstrated superior results in most of the cases. The introduced FS method significantly boosts the classifier’s performance and accuracy.
(a) KDD Cup99, (b) CIC-IoT 2023.
5.3.7 Computational complexity.
An evaluation on testing time has been made over the proposed method and compare it without FS method. Since the training phase has been made offline, however, we compare the time computation for all methods during the testing phase. The comparison of the execution time on test data has shown in Table 12. We observed that during the testing phase, the time consumption is significantly reduced with the proposed FS technique. For instance, the suggested model with feature selection achieves an average execution time of 5.34 seconds on the CIC-IoT2023 dataset, which is 35% faster than the original model (8.12 seconds) without feature selection. Comparatively, the suggested feature-selected model on the KDD-Cup99 dataset attains an average execution time of 9.21 seconds, which is 76% quicker than the initial feature-free model (38.46 seconds). These outcomes show how well the suggested feature selection technique works to increase the effectiveness of intrusion detection systems.
In another experiment, we tested the computational complexity of the SMOTE and SMOTE-ENN techniques. From Fig 9 it is observed that SMOTE-ENN takes less execution time than the simple SMOTE technique with 10 and 15 features. SMOTE-ENN not only generates samples but also removes noisy samples and borderline examples using ENN. This cleaning process might result in a more manageable dataset for subsequent processing steps, which could help to reduce overall computation time. The usage of the SMOTE-ENN technique has been proven that it can improve the detection rate in imbalanced training data. Moreover, important features of the KDD dataset have been effectively selected by using the SFS+PCA method. Hence the SMOTE-ENN with proposed feature selection technique and RF model can be useful in the context of SDIoT.
Fig 10 shows the testing time of PCA and without PCA for the CIC-IoT and KDD-Cup99 data sets. The SFMI+PCA model typically exhibits faster testing times than the SFMI model. The SFMI+PCA with DT model takes an average of 2.2 seconds to test on the CIC-IoT23 dataset, whereas the SFS+MI model takes an average of 0.9619 seconds. The SFMI+PCA model takes an average of 2.137 seconds to test on the KDD-Cup99 dataset, whereas the SFMI model takes an average of 1.242 seconds. This indicates a 72% increase in the SFMI model’s testing duration. The SFMI+PCA improves the model in terms of efficiency as well as accuracy. This is apparently due to PCA reducing the dimensionality of the data, which may reduce the computing time of the classification operation.
(a) KDD Cup99, (b) CIC-IoT 2023.
A comparative analysis of CPU and memory usage has been made in Fig 11 Judging from graph, it can be noticed that the models’ CPU and memory usage has been reduced marginally after FS. For instance, in CIC-IoT dataset, the RF model without FS has the memory usage at 9.66%, whereas after FS it was reduced to 7.01%. The GNB model with FS has the smallest CPU utilization of 11.31%, which was 12.11% before FS. These findings highlight the importance of feature selection on CPU and memory usage across models and datasets.
(a) CPU Usage, (b) Memory Usage.
6 Conclusion and future work
The framework is divided into five primary phases, the first of which deals with the mean value replacement technique for addressing missing values standardization and normalization. In the second phase, the author proposed the Synthetic Minority Over-sampling Technique is used to correct the data imbalance problem. Then it combines two phases from SMOTE to SMOTE-ENN. In order to solve the issue of dataset noise, we employed the ENN approach to eliminate instances of either class. Feature selection is done in the third phase utilizing the feature significance technique to reduce the computational complexity of the model. We proposed SFMI that combines the advantages of both SFE and Mutual Information techniques. Top common features were extracted from the nominated features based on SFE and MI. Then, an improved prediction framework is modeled using a combination of Decision Tree, Random Forest, Multi-layer Perceptron, Gaussian Naive Bayes, and KNN. This framework is validated using the KDDCup99 and CIC-IoT23 dataset that shows better accuracy in RF model. Thus, the proposed framework combines pre-processing using SMOTE-ENN, feature selection using SFMI and PCA techniques for the recognition of malicious attacks. The proposed model can provide various benefits to IoT applications, such as effective resource utilization, reduced downtime, reduced economic loss, and resilience against evolving threats. In future, the adaptability of the proposed model can be improved on evolving attacks using ensemble models. Moreover, the model will be tested on different benchmark datasets for its validation and performance measurement. The relevant features from multiple datasets will be studied with impactful FS techniques.
References
- 1.
Singh C, Jain AK. A Comprehensive Survey on DDoS Attacks Detection & Mitigation in SDN-IoT Network. e-Prime-Advances in Electrical Engineering, Electronics and Energy. 2024; p. 100543.
- 2. Mishra S, Chakraborty S, Sahoo KS, Bilal M. Cogni-Sec: A secure cognitive enabled distributed reinforcement learning model for medical cyber–physical system. Internet of Things. 2023;24:100978.
- 3. Fadel MM, El-Ghamrawy SM, Ali-Eldin AM, Hassan MK, El-Desoky AI. The proposed hybrid deep learning intrusion prediction IoT (HDLIP-IoT) framework. PLoS One. 2022;17(7):e0271436. pmid:35905101
- 4. Salem FM, Youssef H, Ali I, Haggag A. A variable-trust threshold-based approach for DDOS attack mitigation in software-defined networks. Plos one. 2022;17(8):e0273681. pmid:36037194
- 5. Sahoo KS, Tiwary M, Luhach AK, Nayyar A, Choo KKR, Bilal M. Demand–supply-based economic model for resource provisioning in industrial IoT traffic. IEEE Internet of Things Journal. 2021;9(13):10529–10538.
- 6. Bahashwan AA, Anbar M, Manickam S, Issa G, Aladaileh MA, Alabsi BA, et al. HLD-DDoSDN: High and low-rates dataset-based DDoS attacks against SDN. Plos one. 2024;19(2):e0297548. pmid:38330004
- 7. Xu C, Lin H, Wu Y, Guo X, Lin W. An SDNFV-based DDoS defense technology for smart cities. IEEE Access. 2019;7:137856–137874.
- 8. Siddiqui S, Hameed S, Shah SA, Khan AK, Aneiba A. Smart contract-based security architecture for collaborative services in municipal smart cities. Journal of Systems Architecture. 2023;135:102802.
- 9.
Mukherjee BK, Pappu SI, Islam MJ, Acharjee UK. An SDN based distributed IoT network with NFV implementation for smart cities. In: Cyber Security and Computer Science: Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings 2. Springer; 2020. p. 539–552.
- 10. El Sayed MS, Le-Khac NA, Azer MA, Jurcut AD. A flow-based anomaly detection approach with feature selection method against ddos attacks in sdns. IEEE Transactions on Cognitive Communications and Networking. 2022;8(4):1862–1880.
- 11.
Ahmed ME, Kim H, Park M. Mitigating DNS query-based DDoS attacks with machine learning on software-defined networking. In: MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM). IEEE; 2017. p. 11–16.
- 12. Alhijawi B, Almajali S, Elgala H, Salameh HB, Ayyash M. A survey on DoS/DDoS mitigation techniques in SDNs: Classification, comparison, solutions, testing tools and datasets. Computers and Electrical Engineering. 2022;99:107706.
- 13. Sahoo KS, Puthal D. SDN-assisted DDoS defense framework for the internet of multimedia things. ACM Transactions on Multimedia Computing, Communica tions, and Applications (TOMM). 2020;16(3s):1–18.
- 14. Gharehchopogh FS, Abdollahzadeh B, Barshandeh S, Arasteh B. A multi-objective mutation-based dynamic Harris Hawks optimization for botnet detection in IoT. Internet of Things. 2023;24:100952.
- 15. Rodriguez-Galiano VF, Luque-Espinar JA, Chica-Olmo M, Mendes MP. Feature selection approaches for predictive modelling of groundwater nitrate pollution: An evaluation of filters, embedded and wrapper methods. Science of the total environment. 2018;624:661–672. pmid:29272835
- 16. Bawany NZ, Shamsi JA. SEAL: SDN based secure and agile framework for protecting smart city applications from DDoS attacks. Journal of Network and Computer Applications. 2019;145:102381.
- 17.
Amangele P, Reed MJ, Al-Naday M, Thomos N, Nowak M. Hierarchical machine learning for IoT anomaly detection in SDN. In: 2019 International Conference on Information Technologies (InfoTech). IEEE; 2019. p. 1–4.
- 18. Zainudin A, Ahakonye LAC, Akter R, Kim DS, Lee JM. An Efficient Hybrid-DNN for DDoS Detection and Classification in Software-Defined IIoT Networks. IEEE Internet of Things Journal. 2022;.
- 19. Zong Y, Huang G. A feature dimension reduction technology for predicting DDoS intrusion behavior in multimedia internet of things. Multimedia Tools and Applications. 2021;80(15):22671–22684.
- 20. Xue B, Zhang M, Browne WN, Yao X. A survey on evolutionary computation approaches to feature selection. IEEE Transactions on evolutionary computation. 2015;20(4):606–626.
- 21. Tripathy BK, Sahoo KS, Luhach AK, Jhanjhi N, Jena SK. A virtual execution platform for OpenFlow controller using NFV. Journal of King Saud University- Computer and Information Sciences. 2022;34(3):964–971.
- 22. Abedin MZ, Guotai C, Hajek P, Zhang T. Combining weighted SMOTE with ensemble learning for the class-imbalanced prediction of small business credit risk. Complex & Intelligent Systems. 2023;9(4):3559–3579.
- 23. Abdulhammed R, Musafer H, Alessa A, Faezipour M, Abuzneid A. Features dimensionality reduction approaches for machine learning based network intrusion detection. Electronics. 2019;8(3):322.
- 24. Nimbalkar P, Kshirsagar D. Feature selection for intrusion detection system in Internet-of-Things (IoT). ICT Express. 2021;7(2):177–181.
- 25. Aljawarneh S, Aldwairi M, Yassein MB. Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. Journal of Computational Science. 2018;25:152–160.
- 26. Roopak M, Tian GY, Chambers J. Multi-objective-based feature selection for DDoS attack detection in IoT networks. IET Networks. 2020;9(3):120–127.
- 27.
Zhao S, Li W, Zia T, Zomaya AY. A dimension reduction model and clas sifier for anomaly-based intrusion detection in internet of things. In: 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech). IEEE; 2017. p. 836–843.
- 28. Panda M, Abd Allah AM, Hassanien AE. Developing an efficient feature engineer ing and machine learning model for detecting IoT-Botnet cyber attacks. IEEE Access. 2021;9:91038–91052.
- 29.
Mohammed AR, Mohammed SA, Shirmohammadi S. Machine learning and deep learning based traffic classification and prediction in software-defined networking. In: 2019 IEEE International Symposium on Measurements & Networking (M&N). IEEE; 2019. p. 1–6.
- 30. Polat H, Polat O, Cetin A. Detecting DDoS attacks in software-defined networks through feature selection methods and machine learning models. Sustainability. 2020;12(3):1035.
- 31. Binsaeed KA, Hafez AM. Enhancing Intrusion Detection Systems with XGBoost Feature Selection and Deep Learning Approaches. International Journal of Ad vanced Computer Science and Applications. 2023;14(5).
- 32. Saeed AA, Jameel NGM. Intelligent feature selection using particle swarm opti mization algorithm with a decision tree for DDoS attack detection. International Journal of Advances in Intelligent Informatics. 2021;7(1):37–48.
- 33. Brao B, Swathi K. Variance-index based feature selection algorithm for network intrusion detection. IOSR J Comput Eng. 2016;18:1–11.
- 34.
Das S, Venugopal D, Shiva S, Sheldon FT. Empirical evaluation of the ensemble framework for feature selection in ddos attack. In: 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom). IEEE; 2020. p. 56–61.
- 35. Salo F, Nassif AB, Essex A. Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection. Computer Networks. 2019;148:164–175.
- 36. Chen W, Xiao S, Liu L, Jiang X, Tang Z. A DDoS attacks traceback scheme for SDN-based smart city. Computers & Electrical Engineering. 2020;81:106503.
- 37. Osanaiye O, Cai H, Choo KKR, Dehghantanha A, Xu Z, Dlodlo M. Ensemble- based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP Journal on Wireless Communications and Networking. 2016;2016(1):1–10.
- 38. Rahman MA, Asyhari AT, Wen OW, Ajra H, Ahmed Y, Anwar F. Effective com bining of feature selection techniques for machine learning-enabled IoT intrusion detection. Multimedia Tools and Applications. 2021;80(20):31381–31399.
- 39. Amiri F, Yousefi MR, Lucas C, Shakery A, Yazdani N. Mutual information-based feature selection for intrusion detection systems. Journal of network and computer applications. 2011;34(4):1184–1199.
- 40. Zamry NM, Zainal A, Rassam MA, Alkhammash EH, Ghaleb FA, Saeed F. Lightweight anomaly detection scheme using incremental principal component analysis and support vector machine. Sensors. 2021;21(23):8017. pmid:34884022
- 41.
Lin JL, Peng ZQ, Lai RK. Improving pavement anomaly detection using backward feature elimination. In: Business Information Systems: 20th International Con ference, BIS 2017, Poznan, Poland, June 28–30, 2017, Proceedings 20. Springer; 2017. p. 341–349.
- 42. Neto ECP, Dadkhah S, Ferreira R, Zohourian A, Lu R, Ghorbani AA. CICIoT2023: A real-time dataset and benchmark for large-scale attacks in IoT environment. Sensors. 2023;23(13):5941. pmid:37447792
- 43. Gao Q, Li S. Identification of orphan genes in unbalanced datasets based on ensemble learning. Frontiers in genetics. 2020;11:571014. pmid:33133122
- 44. Wang CH, Ye Q, Cai J, Suo Y, Lin S, Yuan J, et al. A novel data-driven integrated detection method for network intrusion classification based on multi-feature imbalanced data. Journal of Intelligent & Fuzzy Systems;(Preprint):1–18.
- 45.
Wahba Y, ElSalamouny E, ElTaweel G. Improving the performance of multi-class intrusion detection systems using feature reduction. arXiv preprint arXiv:150706692. 2015;.
- 46. Elreedy D, Atiya AF. A comprehensive analysis of synthetic minority oversam pling technique (SMOTE) for handling class imbalance. Information Sciences. 2019;505:32–64.
- 47. Aamir M, Zaidi SMA. DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation. International Journal of Information Security. 2019;18(6):761–785.
- 48. Hosseini S, Azizi M. The hybrid technique for DDoS detection with supervised learning algorithms. Computer Networks. 2019;158:35–45.
- 49. Kumar A, Shridhar M, Swaminathan S, Lim TJ. Machine learning-based early detection of IoT botnets using network-edge traffic. Computers & Security. 2022;117:102693.
- 50. Popescu MC, Balas VE, Perescu-Popescu L, Mastorakis N. Multilayer perceptron and neural networks. WSEAS Transactions on Circuits and Systems. 2009;8(7):579–588.
- 51.
Krishna KV, Swathi K, Rao BB. LVFE: A Feature Selection Approach for an Efficient NIDS on Cloud Environment Using Least Variance Feature Elimination. 2020;.
- 52.
“Open networking foundation; 2021. Available from: https://www.opennetworking.org.