pp. 1035-1046
S&M3579 Research Paper of Special Issue https://doi.org/10.18494/SAM4666 Published: March 25, 2024 Feature Selection for Malicious Detection on Industrial IoT Using Machine Learning [PDF] Hong-Yu Chuang and Ruey-Maw Chen (Received September 20, 2023; Accepted March 12, 2024) Keywords: industrial IoT (IIoT), intrusion detection system, network security, network features
The rapid deployment of IoT devices for enhanced convenience and increased production efficiency has resulted in a significant rise in the potential for cyberattacks. Consequently, the detection of malicious attacks has become a crucial concern in industrial IoT (IIoT) applications. Furthermore, IoT usage is continuously expanding, with new functional IoT devices connecting to the network daily, leading to a substantial increase in network traffic. To address the need for an intrusion detection system (IDS) to identify malicious attacks under a high-traffic condition, a highly efficient IDS is essential. In this study, an IDS based on machine learning (ML) with a reduced set of features on the TON_IoT dataset is employed. The TON_IoT includes telemetry data, operating systems data, and network data for an IoT network. A Pearson correlation coefficient (PCC) was applied to assess the correlations among packet features, and a filtering rule based on the Jamovi software’s frequency table was used to identify the most essential features within the TON_IoT dataset. Finally, the 45 original features were narrowed down to 10 core features for the IDS to effectively detect intrusion activities. To evaluate the detection performance of malicious intrusion activities using the yielded set of 10 core features, we utilized evaluation metrics including accuracy, precision, recall, and F1-score. Four ML techniques, namely, K-Nearest Neighbors, Random Forest, Naïve Bayes, and eXtreme Gradient Boosting, were tested. The experimental results demonstrated that the four ML techniques could detect multiple types of attack with an accuracy exceeding 96% and with a recall rate over 97%, underscoring the effectiveness and efficiency of utilizing the reduced 10 core features for malicious attack detection while maintaining a high level of accuracy.
Corresponding author: Ruey-Maw Chen![]() ![]() This work is licensed under a Creative Commons Attribution 4.0 International License. Cite this article Hong-Yu Chuang and Ruey-Maw Chen, Feature Selection for Malicious Detection on Industrial IoT Using Machine Learning, Sens. Mater., Vol. 36, No. 3, 2024, p. 1035-1046. |