Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments
The development of the Internet of Things (IoT) has dramatically expanded our daily lives, playing a pivotal role in the enablement of smart cities, healthcare, and buildings. Emerging technologies, such as IoT, seek to improve the quality of service in cognitive cities. Although IoT applications ar...
Main Authors: | , , , , |
---|---|
Format: | Text |
Language: | unknown |
Published: |
2023
|
Subjects: | |
Online Access: | http://arxiv.org/abs/2302.12205 |
id |
ftarxivpreprints:oai:arXiv.org:2302.12205 |
---|---|
record_format |
openpolar |
spelling |
ftarxivpreprints:oai:arXiv.org:2302.12205 2023-09-05T13:19:06+02:00 Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments Hijazi, Neveen Aloqaily, Moayad Ouni, Bassem Karray, Fakhri Debbah, Merouane 2023-02-20 http://arxiv.org/abs/2302.12205 unknown http://arxiv.org/abs/2302.12205 Computer Science - Machine Learning Computer Science - Cryptography and Security Electrical Engineering and Systems Science - Signal Processing text 2023 ftarxivpreprints 2023-08-16T17:33:26Z The development of the Internet of Things (IoT) has dramatically expanded our daily lives, playing a pivotal role in the enablement of smart cities, healthcare, and buildings. Emerging technologies, such as IoT, seek to improve the quality of service in cognitive cities. Although IoT applications are helpful in smart building applications, they present a real risk as the large number of interconnected devices in those buildings, using heterogeneous networks, increases the number of potential IoT attacks. IoT applications can collect and transfer sensitive data. Therefore, it is necessary to develop new methods to detect hacked IoT devices. This paper proposes a Feature Selection (FS) model based on Harris Hawks Optimization (HHO) and Random Weight Network (RWN) to detect IoT botnet attacks launched from compromised IoT devices. Distributed Machine Learning (DML) aims to train models locally on edge devices without sharing data to a central server. Therefore, we apply the proposed approach using centralized and distributed ML models. Both learning models are evaluated under two benchmark datasets for IoT botnet attacks and compared with other well-known classification techniques using different evaluation indicators. The experimental results show an improvement in terms of accuracy, precision, recall, and F-measure in most cases. The proposed method achieves an average F-measure up to 99.9\%. The results show that the DML model achieves competitive performance against centralized ML while maintaining the data locally. Comment: Accepted in IEEE ICC 2023 Text DML ArXiv.org (Cornell University Library) Botnet ENVELOPE(9.856,9.856,63.776,63.776) |
institution |
Open Polar |
collection |
ArXiv.org (Cornell University Library) |
op_collection_id |
ftarxivpreprints |
language |
unknown |
topic |
Computer Science - Machine Learning Computer Science - Cryptography and Security Electrical Engineering and Systems Science - Signal Processing |
spellingShingle |
Computer Science - Machine Learning Computer Science - Cryptography and Security Electrical Engineering and Systems Science - Signal Processing Hijazi, Neveen Aloqaily, Moayad Ouni, Bassem Karray, Fakhri Debbah, Merouane Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments |
topic_facet |
Computer Science - Machine Learning Computer Science - Cryptography and Security Electrical Engineering and Systems Science - Signal Processing |
description |
The development of the Internet of Things (IoT) has dramatically expanded our daily lives, playing a pivotal role in the enablement of smart cities, healthcare, and buildings. Emerging technologies, such as IoT, seek to improve the quality of service in cognitive cities. Although IoT applications are helpful in smart building applications, they present a real risk as the large number of interconnected devices in those buildings, using heterogeneous networks, increases the number of potential IoT attacks. IoT applications can collect and transfer sensitive data. Therefore, it is necessary to develop new methods to detect hacked IoT devices. This paper proposes a Feature Selection (FS) model based on Harris Hawks Optimization (HHO) and Random Weight Network (RWN) to detect IoT botnet attacks launched from compromised IoT devices. Distributed Machine Learning (DML) aims to train models locally on edge devices without sharing data to a central server. Therefore, we apply the proposed approach using centralized and distributed ML models. Both learning models are evaluated under two benchmark datasets for IoT botnet attacks and compared with other well-known classification techniques using different evaluation indicators. The experimental results show an improvement in terms of accuracy, precision, recall, and F-measure in most cases. The proposed method achieves an average F-measure up to 99.9\%. The results show that the DML model achieves competitive performance against centralized ML while maintaining the data locally. Comment: Accepted in IEEE ICC 2023 |
format |
Text |
author |
Hijazi, Neveen Aloqaily, Moayad Ouni, Bassem Karray, Fakhri Debbah, Merouane |
author_facet |
Hijazi, Neveen Aloqaily, Moayad Ouni, Bassem Karray, Fakhri Debbah, Merouane |
author_sort |
Hijazi, Neveen |
title |
Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments |
title_short |
Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments |
title_full |
Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments |
title_fullStr |
Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments |
title_full_unstemmed |
Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments |
title_sort |
harris hawks feature selection in distributed machine learning for secure iot environments |
publishDate |
2023 |
url |
http://arxiv.org/abs/2302.12205 |
long_lat |
ENVELOPE(9.856,9.856,63.776,63.776) |
geographic |
Botnet |
geographic_facet |
Botnet |
genre |
DML |
genre_facet |
DML |
op_relation |
http://arxiv.org/abs/2302.12205 |
_version_ |
1776199912770240512 |