The quick growth of Internet of Things (IoT) devices has increased the amount of cybersecurity threats, requiring the creation of increasingly complex intrusion detection systems (IDS). The available IDS concentrate on specific threats, rely on restricted datasets, or fail to take into account the resource-constrained of IoT networks. A unique IDS that is lightweight, scalable, and real-time is suggested to detect many types of attacks, including distributed denial of service (DDoS), botnet, and denial of service (DoS) attacks. The suggested approach, which combines hybrid feature selection methods, is used to optimize feature sets. These techniques include Genetic Algorithm (GA), Mutual Information, and Principal Component Analysis (PCA). In addition, federated learning is used for anomaly detection that is responsible for individuals' privacy. Lightweight supervised machine learning models are constructed and assessed using multiple datasets, including IoTID20 and other publicly available benchmarks. The scalability, low latency, and energy efficiency of the proposed system are evaluated by real-time testing in an environment that simulates the Internet of Things for testing purposes. From the simulation results, the proposed approach does a better job than conventional IDS in terms of detection accuracy, computing efficiency, and flexibility to a wide variety of IoT scenarios.
Keywords
Internet of Things, Federated Learning, Hybrid Feature Selection, Cybersecurity, Intrusion Detection System.
B. R. Kikissagbe and M. Adda, “Machine Learning-Based Intrusion Detection Methods in IoT Systems: A Comprehensive Review,” Electronics, vol. 13, no. 18, p. 3601, Sep. 2024, doi: 10.3390/electronics13183601.
R. Uddin, S. A. P. Kumar, and V. Chamola, “Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions,” Ad Hoc Networks, vol. 152, p. 103322, Jan. 2024, doi: 10.1016/j.adhoc.2023.103322.
P. Sun, S. Shen, Y. Wan, Z. Wu, Z. Fang, and X.-Z. Gao, “A Survey of IoT Privacy Security: Architecture, Technology, Challenges, and Trends,” IEEE Internet of Things Journal, vol. 11, no. 21, pp. 34567–34591, Nov. 2024, doi: 10.1109/jiot.2024.3372518.
S. D. Azeez, M. Ilyas, and I. M. Bako, “Federated Learning for Privacy-Preserving Intrusion Detection in IoT Networks,” 2024 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), pp. 1–7, May 2024, doi: 10.1109/hora61326.2024.10550685.
Z. Halim et al., “An effective genetic algorithm-based feature selection method for intrusion detection systems,” Computers & Security, vol. 110, p. 102448, Nov. 2021, doi: 10.1016/j.cose.2021.102448.
M. Di Mauro, G. Galatro, G. Fortino, and A. Liotta, “Supervised feature selection techniques in network intrusion detection: A critical review,” Engineering Applications of Artificial Intelligence, vol. 101, p. 104216, May 2021, doi: 10.1016/j.engappai.2021.104216.
T. Thamaraimanalan, M. Mohankumar, S. Dhanasekaran, and H. Anandakumar, “Experimental analysis of intelligent vehicle monitoring system using Internet of Things (IoT),” EAI Endorsed Transactions on Energy Web, p. 169336, Jul. 2018, doi: 10.4108/eai.16-4-2021.169336.
M. A. Rahman, A. T. Asyhari, L. S. Leong, G. B. Satrya, M. Hai Tao, and M. F. Zolkipli, “Scalable machine learning-based intrusion detection system for IoT-enabled smart cities,” Sustainable Cities and Society, vol. 61, p. 102324, Oct. 2020, doi: 10.1016/j.scs.2020.102324.
M. Hasan, Md. M. Islam, M. I. I. Zarif, and M. M. A. Hashem, “Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches,” Internet of Things, vol. 7, p. 100059, Sep. 2019, doi: 10.1016/j.iot.2019.100059.
A. K. Pathak, S. Saguna, K. Mitra, and C. Ahlund, “Anomaly Detection using Machine Learning to Discover Sensor Tampering in IoT Systems,” ICC 2021 - IEEE International Conference on Communications, pp. 1–6, Jun. 2021, doi: 10.1109/icc42927.2021.9500825.
A. B. Nassif, M. A. Talib, Q. Nasir, and F. M. Dakalbab, “Machine Learning for Anomaly Detection: A Systematic Review,” IEEE Access, vol. 9, pp. 78658–78700, 2021, doi: 10.1109/access.2021.3083060.
D. Li, C. Yu, Q. Zhou, and J. Yu, “Using SVM to Detect DDoS Attack in SDN Network,” IOP Conference Series: Materials Science and Engineering, vol. 466, p. 012003, Dec. 2018, doi: 10.1088/1757-899x/466/1/012003.
M. S. Sivagamasundari, T. Thamaraimanalan, S. Ramalingam and K. Balachander, “Improved Particle Swarm Optimization Based Distributed Energy-Efficient Opportunistic Algorithm for Clustering and Routing in WSNs,” Journal of Information Technology Management, 5-20, 2023.
G. O. Anyanwu, C. I. Nwakanma, J.-M. Lee, and D.-S. Kim, “RBF-SVM kernel-based model for detecting DDoS attacks in SDN integrated vehicular network,” Ad Hoc Networks, vol. 140, p. 103026, Mar. 2023, doi: 10.1016/j.adhoc.2022.103026.
J. Ye, X. Cheng, J. Zhu, L. Feng, and L. Song, “A DDoS Attack Detection Method Based on SVM in Software Defined Network,” Security and Communication Networks, vol. 2018, pp. 1–8, 2018, doi: 10.1155/2018/9804061.
Y. Al-Hadhrami and F. K. Hussain, “Real time dataset generation framework for intrusion detection systems in IoT,” Future Generation Computer Systems, vol. 108, pp. 414–423, Jul. 2020, doi: 10.1016/j.future.2020.02.051.
Acknowledgements
We would like to thank Reviewers for taking the time and effort necessary to review the manuscript. We sincerely appreciate all valuable comments and suggestions, which helped us to improve the quality of the manuscript.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of data and materials
Data sharing is not applicable to this article as no new data were created or analysed in this study.
Author information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Corresponding author
Prathap Mani
Department of Computer Science & Information Technology, American University of Kurdistan Middle East.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this article
Prathap Mani, Arthi D, Periyakaruppan K and Surendarkumar S, “A Lightweight and Federated Machine Learning-Based Intrusion Detection System for Multi-Attack Detection in IoT Networks”, Journal of Machine and Computing. doi: 10.53759/7669/jmc202505033.