期刊文献+

Task-Specific Feature Selection and Detection Algorithms for IoT-Based Networks

Task-Specific Feature Selection and Detection Algorithms for IoT-Based Networks
下载PDF
导出
摘要 As IoT devices become more ubiquitous, the security of IoT-based networks becomes paramount. Machine Learning-based cybersecurity enables autonomous threat detection and prevention. However, one of the challenges of applying Machine Learning-based cybersecurity in IoT devices is feature selection as most IoT devices are resource-constrained. This paper studies two feature selection algorithms: Information Gain and PSO-based, to select a minimum number of attack features, and Decision Tree and SVM are utilized for performance comparison. The consistent use of the same metrics in feature selection and detection algorithms substantially enhances the classification accuracy compared to the non-consistent use in feature selection by Information Gain (entropy) and Tree detection algorithm by classification. Furthermore, the Tree with consistent feature selection is comparable to the ensemble that provides excellent performance at the cost of computation complexity. As IoT devices become more ubiquitous, the security of IoT-based networks becomes paramount. Machine Learning-based cybersecurity enables autonomous threat detection and prevention. However, one of the challenges of applying Machine Learning-based cybersecurity in IoT devices is feature selection as most IoT devices are resource-constrained. This paper studies two feature selection algorithms: Information Gain and PSO-based, to select a minimum number of attack features, and Decision Tree and SVM are utilized for performance comparison. The consistent use of the same metrics in feature selection and detection algorithms substantially enhances the classification accuracy compared to the non-consistent use in feature selection by Information Gain (entropy) and Tree detection algorithm by classification. Furthermore, the Tree with consistent feature selection is comparable to the ensemble that provides excellent performance at the cost of computation complexity.
作者 Yang Gyun Kim Benito Mendoza Ohbong Kwon John Yoon Yang Gyun Kim;Benito Mendoza;Ohbong Kwon;John Yoon(Department of Computer Engineering Technology, New York City College of Technology (CUNY), New York, USA;Department of Math/Computer Science/Cybersecurity, Mercy College, Dobbs Ferry, USA)
出处 《Journal of Computer and Communications》 2022年第10期59-73,共15页 电脑和通信(英文)
关键词 CYBERSECURITY Features Selection Information Gain Particle Swarm Optimization Intrusion Detection System Machine Learning Decision Tree Network Attacks IoT Network Cybersecurity Features Selection Information Gain Particle Swarm Optimization Intrusion Detection System Machine Learning Decision Tree Network Attacks IoT Network
  • 相关文献

参考文献1

二级参考文献1

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部