IoT networks have drastically increased in the past few years because of the rapid growth in networking technology and IoT devices. However, these IoT devices suffer from various attacks because of the vulnerability of the IoT network. Because of the numerous elements in network data, the machine learning model will take a long to detect an assault. The proposed model has provided a solution for reducing this time by reducing the feature count. A statistical feature selection-based IDS model is presented for securing an IoT environment. Information gain, gain ratio, and Pearson coefficient values are calculated for all the dataset features, and then the addition is performed. After this, the addition is ranked in descending order, and top-5 and top-8 features are selected as best features. These reduced features are fed to random forests, and results are calculated. For the model's evaluation, the IoT-BoT dataset is used. The accuracy obtained with top-5 features with the random forest is 99.9995% which is better than other state-of-the-art research work. The proposed model has shown a reduction in computation time with similar accuracy compared to all the features. The proposed model is also tested against other state-of-the-art methodologies and is more accurate.

1.
S.
Al-Sarawi
,
M.
Anbar
,
R.
Abdullah
, and
A. B.
Al Hawari
, “
Internet of things market analysis forecasts, 2020–2030
,” in
2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4) (IEEE
,
2020
) pp.
449
453
.
2.
C.
Wheelus
and
X.
Zhu
, “
Iot network security: Threats, risks, and a data-driven defense framework
,”
IoT
1
,
259
285
(
2020
).
3.
L.
Tawalbeh
,
F.
Muheidat
,
M.
Tawalbeh
,
M.
Quwaider
, et al, “
Iot privacy and security: Challenges and solutions
,”
Applied Sciences
10
,
4102
(
2020
).
4.
R. B.
Adhao
and
V. K.
Pachghare
, “
Performance-based feature selection using decision tree
,” in
2019 International Conference on Innovative Trends and Advances in Engineering and Technology (ICITAET) (IEEE
,
2019
) pp.
135
138
.
5.
N.
Moustafa
,
B.
Turnbull
, and
K.-K. R.
Choo
, “
An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things
,”
IEEE Internet of Things Journal
6
,
4815
4830
(
2018
).
6.
M.
Nivaashini
and
P.
Thangaraj
, “
A framework of novel feature set extraction based intrusion detection system for internet of things using hybrid machine learning algorithms
,” in
2018 international conference on computing, power and communication technologies (GUCON) (IEEE
,
2018
) pp.
44
49
.
7.
I.
Ullah
and
Q. H.
Mahmoud
, “
A two-level flow-based anomalous activity detection system for iot networks
,”
Electronics
9
,
530
(
2020
).
8.
A.
Abbas
,
M. A.
Khan
,
S.
Latif
,
M.
Ajaz
,
A. A.
Shah
, and
J.
Ahmad
, “
A new ensemble-based intrusion detection system for internet of things
,”
Arabian Journal for Science and Engineering
,
1
15
(
2021
).
9.
V. K.
Pachghare
,
V. K.
Khatavkar
, and
P. A.
Kulkarni
, “
Pattern based network security using semi-supervised learning
,”
International Journal of Information and Network Security
1
,
228
(
2012
).
10.
I.
Karna
,
A.
Madam
,
C.
Deokule
,
R.
Adhao
, and
V.
Pachghare
, “
Ensemble-based filter feature selection technique for building flow-based ids
,” in
2021 2nd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS) (IEEE
,
2021
) pp.
324
328
.
11.
R. B.
Adhao
and
V. K.
Pachghare
, “
Network traffic classification using feature selections and two-tier stacked classifier
.”
International Journal of Next-Generation Computing
12
,
544
550
(
2021
).
12.
E.
Harris
, “
Information gain versus gain ratio: A study of split method biases
.” in
ISAIM
(
2002
).
13.
J.
Brownlee
, “
How to choose a feature selection method for machine learning
,”
Machine Learning Mastery
10
(
2019
).
14.
V.
Pachghare
,
Cryptography and information security
(
PHI Learning Pvt. Ltd
.,
2019
).
15.
A.
Derhab
,
A.
Aldweesh
,
A. Z.
Emam
, and
F. A.
Khan
, “
Intrusion detection system for internet of things based on temporal convolution neural network and efficient feature engineering
,”
Wireless Communications and Mobile Computing
2020
(
2020
).
16.
M.
Shafiq
,
Z.
Tian
,
Y.
Sun
,
X.
Du
, and
M.
Guizani
, “
Selection of effective machine learning algorithm and bot-iot attacks traffic identification for internet of things in smart city
,”
Future Generation Computer Systems
107
,
433
442
(
2020
).
17.
O.
Ibitoye
,
O.
Shafiq
, and
A.
Matrawy
, “
Analyzing adversarial attacks against deep learning for intrusion detection in iot networks
,” in
2019 IEEE Global Communications Conference (GLOBECOM) (IEEE
,
2019
) pp.
1
6
.
This content is only available via PDF.
You do not currently have access to this content.