Skip to main content

A Comparison of Ensemble Learning for Intrusion Detection in Telemetry Data

  • Conference paper
  • First Online:
Advances on Intelligent Computing and Data Science (ICACIn 2022)

Abstract

The Internet of Things (IoT) is a grid of interconnected pre-programmed electronic devices to provide intelligent services for daily life tasks. However, the security of such networks is a considerable obstacle to successful implementation. Therefore, developing intelligent security systems for IoT is the need of the hour. This study investigates the performances of different Ensemble Learning (EL) approaches applied for intrusion detection in the IoT sensors’ telemetry data. We compare the accuracy of various EL approaches in homogeneous and heterogeneous combinations using bagging, boosting, and stacking strategies. These EL approaches apply well-known Machine Learning (ML) models such as Decision Tree (DT), Naıve Bayes (NB), Random Forest (RF), Logistic Regression (LR), Linear Discriminant Analysis (LDA) and linear Support Vector Machine (SVM). We evaluate and compare EL approaches for binary and multi-class classification tasks on the ToN-IoT Telemetry dataset for intrusion detection. The results show that stacking EL outperform stand-alone ML algorithms-based classifiers as well as bagging and boosting.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Raghuvanshi, A., Singh, U.K., Joshi, C.: A review of various security and privacy innovations for IoT applications in healthcare. In: Advanced Healthcare Systems: Empowering Physicians with IoT-Enabled Technologies, pp. 43–58 (2022)

    Google Scholar 

  2. Isaac Abiodun, O., et al.: A review on the security of the internet of things: challenges and solutions. Wireless Personal Commun. 1–35 (2021)

    Google Scholar 

  3. Al-A’araji, N.H., Al-Mamory, S.O., Al-Shakarchi, A.H.: Classification and clustering based ensemble techniques for intrusion detection systems: a survey. J. Phys. Conf. Ser. 1818, 012106 (2021)

    Google Scholar 

  4. Zarpelao, B.B., Miani, R.S., Kawakani, C.T., Carlisto de Alvarenga, S.: A survey of intrusion detection in internet of things. J. Netw. Comput. Appl. 84, 25–37 (2017)

    Google Scholar 

  5. Bhati, B.S., Chugh, G., Al-Turjman, F., Bhati, N.S.: An improved ensemble based intrusion detection technique using XGboost. Trans. Emerg. Telecommun. Technol. 32(6), e4076 (2021)

    Google Scholar 

  6. Roesch, M., et al.: Snort: lightweight intrusion detection for networks. Lisa 99, 229–238 (1999)

    Google Scholar 

  7. Singh, J., Nene, M.J.: A survey on machine learning techniques for intrusion detection systems. Int. J. Adv. Res. Comput. Commun. Eng. 2(11), 4349–4355 (2013)

    Google Scholar 

  8. Belouch, M., El hadaj, S.: Comparison of ensemble learning methods applied to network intrusion detection. In: Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing, pp. 1–4 (2017)

    Google Scholar 

  9. Catarinucci, L., et al.: An IoT-aware architecture for smart healthcare systems. IEEE Internet of Things Journal, 2(6), 515–526 (2015)

    Google Scholar 

  10. Yassine, A., Singh, S., Hossain, M.S., Muhammad, G.: IoT big data analytics for smart homes with fog and cloud computing. Future Generation Comput. Syst. 91, 563–573 (2019)

    Google Scholar 

  11. Caragliu, A., Bo, C.D., Nijkamp, P.: Smart cities in europe. J. Urban Technol. 18(2), 65–82 (2011)

    Google Scholar 

  12. Saarika, P.S., Sandhya, K., Sudha, T.: Smart transportation system using IoT. In: 2017 International Conference On Smart Technologies For Smart Nation (Smart- TechCon), pp. 1104–1107. IEEE (2017)

    Google Scholar 

  13. Jayaram, A.: Smart retail 4.0 IoT consumer retailer model for retail intelligence and strategic marketing of in-store products. In: Proceedings of the 17th International Business Horizon-INBUSH ERA-2017, Noida, India, 9 (2017)

    Google Scholar 

  14. Ali, S., Shakeel, M.H., Khan, I., Faizullah, S., Khan, M.S.: Predicting attributes of nodes using network structure. ACM Trans. Intell. Syst. Technol. 12(2) (2021)

    Google Scholar 

  15. Mansoor, H., Ali, S., Khan, I., Arshad, N., Khan, M.A., Faizullah, S.: Short-term load forecasting using ami data. ArXiv preprint (2022)

    Google Scholar 

  16. Ali, S., Mansoor, H., Arshad, N., Khan, I.: Short term load forecasting using smart meter data. In: Proceedings of the Tenth ACM International Conference on Future Energy Systems, e-Energy 2019, pp. 419–421. ACM (2019)

    Google Scholar 

  17. Ali, S., Mansoor, H., Khan, I., Arshad, N., Faizullah, S., Khan, M.A.: Fair allocation based soft load shedding. In: Intelligent Systems and Applications, pp. 407–424. Springer (2020)

    Google Scholar 

  18. Granjal, J., Monteiro, E., Silva, J.S.: Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun. Surv. Tutorials, 17(3), 1294–1312 (2015)

    Google Scholar 

  19. Khan, M.A., Salah, K.: Lotsecurity: review, blockchain solutions, and open challenges. Future Generation Comput. Syst. 82, 395–411 (2018)

    Google Scholar 

  20. Faizullah, S., Khan, M.A., Alzahrani, A., Khan, I.: Permissioned blockchain-based security for SDN in IoT cloud networks. In: 2019 International Conference on Advances in the Emerging Computing Technologies (AECT), pp. 1–6 (2020)

    Google Scholar 

  21. Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V.: Security and privacy for cloud-based IoT: challenges. IEEE Commun. Mag. 55(1), 26–33 (2017)

    Google Scholar 

  22. Ali, S., et al.: Detecting DDOS attack on SDN due to vulnerabilities in openflow. In: Proceedings of the International Conference on Advances in the Emerging Computing Technologies (AECT), pp. 1–6. IEEE (2020)

    Google Scholar 

  23. Moustafa, N., Turnbull, B., Raymond Choo, K.K.: An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet of Things J. 6(3), 4815–4830 (2018)

    Google Scholar 

  24. Primartha, R., Tama, B.A.: Anomaly detection using random forest: a performance revisited. In: 2017 International Conference on Data and Software Engineering (ICoDSE), pp. 1–6. IEEE (2017)

    Google Scholar 

  25. Verma, A., Ranga, V.: Elnids: ensemble learning based network intrusion detection system for RPL based internet of things. In: 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), pp. 1–6. IEEE (2019)

    Google Scholar 

  26. Wang, Y., Shen, Y., Zhang, G.: Research on intrusion detection model using ensemble learning methods. In: 2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS), pp. 422–425. IEEE (2016)

    Google Scholar 

  27. Tama, B.A., Comuzzi, M., Rhee, K.-H.: TSE-IDS: a two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access, 7, 94497–94507 (2019)

    Google Scholar 

  28. Elijah, A.V., Abdullah, A., Jhanjhi, N., Supramaniam, M., Abdullateef, B.: Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: an empirical study. Int. J. Adv. Comput. Sci. Appl 10(9), 520–528 (2019)

    Google Scholar 

  29. Priya, V., Sumaiya Thaseen, I., Gadekallu, T.R., Aboudaif, M.K., Nasr, E.A.: Robust attack detection approach for IIoT using ensemble classifier. arXiv preprint arXiv:2102.01515 (2021)

  30. Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A., Anwar, A.: Ton IoT telemetry dataset: a new generation dataset of IoT and IIoT for data- driven intrusion detection systems. IEEE Access, 8, 165130–165150 (2020)

    Google Scholar 

  31. Dasarathy, B.V., Sheela, B.V.: A composite classifier system design: concepts and methodology. Proc. IEEE, 67(5), 708–713 (1979)

    Google Scholar 

  32. Alyasiri, H.: Developing Efficient and Effective Intrusion Detection System using Evolutionary Computation. PhD thesis, University of York (2018)

    Google Scholar 

  33. G´eron, A.: Hands-on machine learning with Scikit-Learn, Keras, and TensorFlow: Concepts, tools, and techniques to build intelligent systems. O’Reilly Media (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Naila Naz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Naz, N. et al. (2023). A Comparison of Ensemble Learning for Intrusion Detection in Telemetry Data. In: Saeed, F., Mohammed, F., Mohammed, E., Al-Hadhrami, T., Al-Sarem, M. (eds) Advances on Intelligent Computing and Data Science. ICACIn 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 179. Springer, Cham. https://doi.org/10.1007/978-3-031-36258-3_40

Download citation

Publish with us

Policies and ethics