Comparison of Multiple Feature Selection Techniques for Machine Learning-Based Detection of IoT Attacks
dc.contributor.author | Phan, Viet Anh | cs |
dc.contributor.author | Jeřábek, Jan | cs |
dc.contributor.author | Malina, Lukáš | cs |
dc.date.accessioned | 2025-02-18T11:36:13Z | |
dc.date.available | 2025-02-18T11:36:13Z | |
dc.date.issued | 2024-07-30 | cs |
dc.description.abstract | The Internet of Things (IoT) has become increasingly practical in applications such as smart homes, autonomous vehicles, and environmental monitoring. However, this rapid expansion has led to significant cybersecurity threats. Detecting these threats is critical, and while machine learning techniques are valuable, they struggle with high-dimensional data. Feature selection helps by reducing computational costs while maintaining model generalization. Selecting the most effective feature selection method is a crucial task. This research addresses this gap by testing five feature selection methods: Random Forest (RF), Recursive Feature Elimination (RFE), Logistic Regression (LR), XGBoost Regression (XGBoost), and Information Gain (IG) using the CIC-IoT 2023 dataset. It evaluates these methods when being used with five machine learning models: Decision Tree (DT), Random Forest (RF), k-Nearest Neighbors (k-NN), Gradient Boosting (GB), and Multi-layer Perceptron (MLP) using metrics like accuracy, precision, recall, and F1-score across three datasets. The results show that RFE, especially with the RF model, achieves the highest accuracy (99.57%) with 30 features. RF is the most stable, with accuracy from 83% to 99.56%. Additionally, the 5-feature scheme is best for implementing IDS on resource-limited IoT devices, with RFE paired with the k-NN model being the optimal combination. | en |
dc.format | text | cs |
dc.format.extent | 1-10 | cs |
dc.format.mimetype | application/pdf | cs |
dc.identifier.citation | ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and Security. 2024, p. 1-10. | en |
dc.identifier.doi | 10.1145/3664476.3670440 | cs |
dc.identifier.isbn | 979-8-4007-1718-5 | cs |
dc.identifier.orcid | 0009-0003-1787-8063 | cs |
dc.identifier.orcid | 0000-0001-9487-5024 | cs |
dc.identifier.orcid | 0000-0002-7208-2514 | cs |
dc.identifier.other | 189196 | cs |
dc.identifier.researcherid | JMC-4821-2023 | cs |
dc.identifier.researcherid | E-3929-2018 | cs |
dc.identifier.researcherid | E-2174-2018 | cs |
dc.identifier.scopus | 59245308100 | cs |
dc.identifier.scopus | 23011945600 | cs |
dc.identifier.scopus | 49863792100 | cs |
dc.identifier.uri | https://hdl.handle.net/11012/250054 | |
dc.language.iso | en | cs |
dc.publisher | Association for Computing Machinery | cs |
dc.relation.ispartof | ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and Security | cs |
dc.relation.uri | https://dl.acm.org/doi/10.1145/3664476.3670440 | cs |
dc.rights | Creative Commons Attribution 4.0 International | cs |
dc.rights.access | openAccess | cs |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | cs |
dc.subject | IoT | en |
dc.subject | Anomaly Detection | en |
dc.subject | IDS | en |
dc.subject | Machine Learning | en |
dc.subject | Feature Selection | en |
dc.title | Comparison of Multiple Feature Selection Techniques for Machine Learning-Based Detection of IoT Attacks | en |
dc.type.driver | conferenceObject | en |
dc.type.status | Peer-reviewed | en |
dc.type.version | publishedVersion | en |
eprints.grantNumber | info:eu-repo/grantAgreement/MV0/VK/VK01030019 | cs |
sync.item.dbid | VAV-189196 | en |
sync.item.dbtype | VAV | en |
sync.item.insts | 2025.02.18 12:36:13 | en |
sync.item.modts | 2025.02.13 15:32:04 | en |
thesis.grantor | Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií. Ústav telekomunikací | cs |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- 3664476.3670440.pdf
- Size:
- 1.23 MB
- Format:
- Adobe Portable Document Format
- Description:
- file 3664476.3670440.pdf