Empirical evaluation of feature selection methods for machine learning based intrusion detection in IoT scenarios
Resumen: This paper delves into the critical need for enhanced security measures within the Internet of Things (IoT) landscape due to inherent vulnerabilities in IoT devices, rendering them susceptible to various forms of cyber-attacks. The study emphasizes the importance of Intrusion Detection Systems (IDS) for continuous threat monitoring. The objective of this study was to conduct a comprehensive evaluation of feature selection (FS) methods using various machine learning (ML) techniques for classifying traffic flows within datasets containing intrusions in IoT environments. An extensive benchmark analysis of ML techniques and FS methods was performed, assessing feature selection under different approaches including Filter Feature Ranking (FFR), Filter-Feature Subset Selection (FSS), and Wrapper-based Feature Selection (WFS). FS becomes pivotal in handling vast IoT data by reducing irrelevant attributes, addressing the curse of dimensionality, enhancing model interpretability, and optimizing resources in devices with limited capacity. Key findings indicate the outperformance for traffic flows classification of certain tree-based algorithms, such as J48 or PART, against other machine learning techniques (naive Bayes, multi-layer perceptron, logistic, adaptive boosting or k-Nearest Neighbors), showcasing a good balance between performance and execution time. FS methods' advantages and drawbacks are discussed, highlighting the main differences in results obtained among different FS approaches. Filter-feature Subset Selection (FSS) approaches such as CFS could be more suitable than Filter Feature Ranking (FFR), which may select correlated attributes, or than Wrapper-based Feature Selection (WFS) methods, which may tailor attribute subsets for specific ML techniques and have lengthy execution times. In any case, reducing attributes via FS has allowed optimization of classification without compromising accuracy. In this study, F1 score classification results above 0.99, along with a reduction of over 60% in the number of attributes, have been achieved in most experiments conducted across four datasets, both in binary and multiclass modes. This work emphasizes the importance of a balanced attribute selection process, taking into account threat detection capabilities and computational complexity.
Idioma: Inglés
DOI: 10.1016/j.iot.2024.101367
Año: 2024
Publicado en: Internet of Things (Netherlands) 28 (2024), 101367 [18 pp.]
ISSN: 2542-6605

Factor impacto JCR: 7.6 (2024)
Categ. JCR: COMPUTER SCIENCE, INFORMATION SYSTEMS rank: 16 / 258 = 0.062 (2024) - Q1 - T1
Categ. JCR: TELECOMMUNICATIONS rank: 13 / 120 = 0.108 (2024) - Q1 - T1
Categ. JCR: ENGINEERING, ELECTRICAL & ELECTRONIC rank: 33 / 366 = 0.09 (2024) - Q1 - T1

Factor impacto SCIMAGO: 1.527 - Artificial Intelligence (Q1) - Engineering (miscellaneous) (Q1) - Computer Science (miscellaneous) (Q1) - Software (Q1) - Hardware and Architecture (Q1) - Information Systems (Q1) - Management of Technology and Innovation (Q1) - Computer Science Applications (Q1)

Financiación: info:eu-repo/grantAgreement/ES/DGA/T31-20R
Financiación: info:eu-repo/grantAgreement/ES/MCINN/PID2022-136476OB-I00
Financiación: info:eu-repo/grantAgreement/ES/UZ/UZ2021-TEC-01
Tipo y forma: Article (Published version)
Área (Departamento): Área Ingeniería Telemática (Dpto. Ingeniería Electrón.Com.)

Creative Commons You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.


Exportado de SIDERAL (2025-09-22-14:50:06)


Visitas y descargas

Este artículo se encuentra en las siguientes colecciones:
Articles > Artículos por área > Ingenieria Telematica



 Record created 2024-10-03, last modified 2025-09-23


Versión publicada:
 PDF
Rate this document:

Rate this document:
1
2
3
 
(Not yet reviewed)