Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments

The development of the Internet of Things (IoT) has dramatically expanded our daily lives, playing a pivotal role in the enablement of smart cities, healthcare, and buildings. Emerging technologies, such as IoT, seek to improve the quality of service in cognitive cities. Although IoT applications ar...

Full description

Bibliographic Details
Main Authors: Hijazi, Neveen, Aloqaily, Moayad, Ouni, Bassem, Karray, Fakhri, Debbah, Merouane
Format: Text
Language:unknown
Published: 2023
Subjects:
DML
Online Access:http://arxiv.org/abs/2302.12205
id ftarxivpreprints:oai:arXiv.org:2302.12205
record_format openpolar
spelling ftarxivpreprints:oai:arXiv.org:2302.12205 2023-09-05T13:19:06+02:00 Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments Hijazi, Neveen Aloqaily, Moayad Ouni, Bassem Karray, Fakhri Debbah, Merouane 2023-02-20 http://arxiv.org/abs/2302.12205 unknown http://arxiv.org/abs/2302.12205 Computer Science - Machine Learning Computer Science - Cryptography and Security Electrical Engineering and Systems Science - Signal Processing text 2023 ftarxivpreprints 2023-08-16T17:33:26Z The development of the Internet of Things (IoT) has dramatically expanded our daily lives, playing a pivotal role in the enablement of smart cities, healthcare, and buildings. Emerging technologies, such as IoT, seek to improve the quality of service in cognitive cities. Although IoT applications are helpful in smart building applications, they present a real risk as the large number of interconnected devices in those buildings, using heterogeneous networks, increases the number of potential IoT attacks. IoT applications can collect and transfer sensitive data. Therefore, it is necessary to develop new methods to detect hacked IoT devices. This paper proposes a Feature Selection (FS) model based on Harris Hawks Optimization (HHO) and Random Weight Network (RWN) to detect IoT botnet attacks launched from compromised IoT devices. Distributed Machine Learning (DML) aims to train models locally on edge devices without sharing data to a central server. Therefore, we apply the proposed approach using centralized and distributed ML models. Both learning models are evaluated under two benchmark datasets for IoT botnet attacks and compared with other well-known classification techniques using different evaluation indicators. The experimental results show an improvement in terms of accuracy, precision, recall, and F-measure in most cases. The proposed method achieves an average F-measure up to 99.9\%. The results show that the DML model achieves competitive performance against centralized ML while maintaining the data locally. Comment: Accepted in IEEE ICC 2023 Text DML ArXiv.org (Cornell University Library) Botnet ENVELOPE(9.856,9.856,63.776,63.776)
institution Open Polar
collection ArXiv.org (Cornell University Library)
op_collection_id ftarxivpreprints
language unknown
topic Computer Science - Machine Learning
Computer Science - Cryptography and Security
Electrical Engineering and Systems Science - Signal Processing
spellingShingle Computer Science - Machine Learning
Computer Science - Cryptography and Security
Electrical Engineering and Systems Science - Signal Processing
Hijazi, Neveen
Aloqaily, Moayad
Ouni, Bassem
Karray, Fakhri
Debbah, Merouane
Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments
topic_facet Computer Science - Machine Learning
Computer Science - Cryptography and Security
Electrical Engineering and Systems Science - Signal Processing
description The development of the Internet of Things (IoT) has dramatically expanded our daily lives, playing a pivotal role in the enablement of smart cities, healthcare, and buildings. Emerging technologies, such as IoT, seek to improve the quality of service in cognitive cities. Although IoT applications are helpful in smart building applications, they present a real risk as the large number of interconnected devices in those buildings, using heterogeneous networks, increases the number of potential IoT attacks. IoT applications can collect and transfer sensitive data. Therefore, it is necessary to develop new methods to detect hacked IoT devices. This paper proposes a Feature Selection (FS) model based on Harris Hawks Optimization (HHO) and Random Weight Network (RWN) to detect IoT botnet attacks launched from compromised IoT devices. Distributed Machine Learning (DML) aims to train models locally on edge devices without sharing data to a central server. Therefore, we apply the proposed approach using centralized and distributed ML models. Both learning models are evaluated under two benchmark datasets for IoT botnet attacks and compared with other well-known classification techniques using different evaluation indicators. The experimental results show an improvement in terms of accuracy, precision, recall, and F-measure in most cases. The proposed method achieves an average F-measure up to 99.9\%. The results show that the DML model achieves competitive performance against centralized ML while maintaining the data locally. Comment: Accepted in IEEE ICC 2023
format Text
author Hijazi, Neveen
Aloqaily, Moayad
Ouni, Bassem
Karray, Fakhri
Debbah, Merouane
author_facet Hijazi, Neveen
Aloqaily, Moayad
Ouni, Bassem
Karray, Fakhri
Debbah, Merouane
author_sort Hijazi, Neveen
title Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments
title_short Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments
title_full Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments
title_fullStr Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments
title_full_unstemmed Harris Hawks Feature Selection in Distributed Machine Learning for Secure IoT Environments
title_sort harris hawks feature selection in distributed machine learning for secure iot environments
publishDate 2023
url http://arxiv.org/abs/2302.12205
long_lat ENVELOPE(9.856,9.856,63.776,63.776)
geographic Botnet
geographic_facet Botnet
genre DML
genre_facet DML
op_relation http://arxiv.org/abs/2302.12205
_version_ 1776199912770240512