Next Article in Journal
Fault Diagnosis Method for Converter Stations Based on Fault Area Identification and Evidence Information Fusion
Previous Article in Journal
Sound-Based Unsupervised Fault Diagnosis of Industrial Equipment Considering Environmental Noise
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Embedding Tree-Based Intrusion Detection System in Smart Thermostats for Enhanced IoT Security

by
Abbas Javed
1,
Muhammad Naeem Awais
1,
Ayyaz-ul-Haq Qureshi
2,*,
Muhammad Jawad
1,
Jehangir Arshad
1 and
Hadi Larijani
3
1
Department of Electrical and Computer Engineering, COMSATS University Islamabad, Lahore Campus, Lahore 54000, Pakistan
2
Department of Cyber Security and Networks, School of Computing, Engineering and Built Environment, Glasgow Caledonian University, Glasgow G4 0BA, UK
3
SMART Technology Research Centre, Department of Cyber Security and Networks, School of Computing, Engineering and Built Environment, Glasgow Caledonian University, Glasgow G4 0BA, UK
*
Author to whom correspondence should be addressed.
Sensors 2024, 24(22), 7320; https://doi.org/10.3390/s24227320
Submission received: 15 October 2024 / Revised: 6 November 2024 / Accepted: 15 November 2024 / Published: 16 November 2024
(This article belongs to the Special Issue Sensor Data Privacy and Intrusion Detection for IoT Networks)

Abstract

:
IoT devices with limited resources, and in the absence of gateways, become vulnerable to various attacks, such as denial of service (DoS) and man-in-the-middle (MITM) attacks. Intrusion detection systems (IDS) are designed to detect and respond to these threats in IoT environments. While machine learning-based IDS have typically been deployed at the edge (gateways) or in the cloud, in the absence of gateways, the IDS must be embedded within the sensor nodes themselves. Available datasets mainly contain features extracted from network traffic at the edge (e.g., Raspberry Pi/computer) or cloud servers. We developed a unique dataset, named as Intrusion Detection in the Smart Homes (IDSH) dataset, which is based on features retrievable from microcontroller-based IoT devices. In this work, a Tree-based IDS is embedded into a smart thermostat for real-time intrusion detection. The results demonstrated that the IDS achieved an accuracy of 98.71% for binary classification with an inference time of 276 microseconds, and an accuracy of 97.51% for multi-classification with an inference time of 273 microseconds. Real-time testing showed that the smart thermostat is capable of detecting DoS and MITM attacks without relying on a gateway or cloud.

1. Introduction

The Internet of Things (IoT) integrates a wide range of smart objects, devices, and wireless sensor nodes (WSNs) for seamless communication and data exchange. The applications of IoT have been reported in smart homes, smart farming, smart cities, smart wearables, healthcare, education, etc. [1]. It is estimated that the number of IoT devices will surpass 27 billion by 2025 [2]. Billions of IoT devices communicate with each other over the internet and most of the IoT devices have limited memory and computational capabilities, making them vulnerable to a wide range of attacks. These IoT devices are not designed to detect and respond to security attacks [3].
Cybercriminals often target smart homes because they hold a high concentration of valuable digital assets, including sensitive personal information, home security controls, and access to connected devices, such as cameras and locks. These assets are attractive for identity theft, financial fraud, or unauthorized surveillance, making smart homes prime targets [4,5]. These devices are particularly vulnerable to cyberattacks due to occupants’ lack of knowledge, insecure IoT devices, weak security controls, and improper configurations. Based on STRIDE taxonomy, the possible cyberattacks on smart homes are spoofing, tampering, repudiation, information disclosure, DoS, and elevation of privilege [5]. In a DoS attack, the smart device is overwhelmed with traffic by the adversary, and as a result, the device stops working. In an MITM attack, the attacker secretly intercepts the communication between the sender and the receiver without either party being aware [6]. MITM attacks can lead to repudiation and information disclosure attacks.
A smart home is a residence where appliances can be remotely controlled via the internet. The smart home market is projected to grow to USD 633.20 billion by 2032 [7]. This growth is largely driven by the adoption of IoT platforms. Key stakeholders are increasingly focusing on developing smart home appliances that utilize IoT and machine learning. Wifi-based smart thermostats are used in smart homes to control heating and cooling appliances. However, according to Rambus [8], nearly 80% of IoT devices remain exposed to potential cyberattacks, highlighting their significant vulnerability to security breaches. These security threats present major challenges for the expansion of the IoT. Due to security vulnerabilities in IoT devices used in smart homes, hackers can gain unauthorized access to personal information and control of connected appliances. Unauthorized access to the smart thermostat may result in high energy consumption and the occupant’s discomfort.
An IDS for IoT is a system designed to monitor and analyze network traffic to identify and react to intrusions and anomalies, safeguarding the security and integrity of the IoT network. Most of the work on IDS for IoT systems has been simulation-based using existing datasets and real-time implementation has been lacking [9,10,11,12,13,14]. IoT devices have limited computational resources and in many cases, malicious/hacked IoT devices remain undetected and are only detected when they stop working. This could be disastrous for some applications and may result in heavy losses.
Raspberry Pi-based gateways function as intermediary devices that connect local IoT devices to the cloud. They perform essential tasks such as data preprocessing, filtering, and traffic monitoring. Furthermore, these gateways can improve the security of the IoT network by hosting lightweight IDS to detect intrusions and anomalies in real-time. Few authors have implemented IDS on Raspberry Pi-based gateways of smart homes [15,16,17,18] to detect intrusions. However, many commercially available WiFi-based IoT devices of smart homes are connected to the cloud without having Raspberry Pi/computer-based gateways on which IDS can be deployed. Consequently, these IoT devices are easy targets for DoS/Distributed Denial of Service (DDoS) and MITM attacks. Therefore, the security of these IoT devices can be enhanced by embedded ML-based IDS.
Embedded ML, also called TinyML, allows embedding ML models in microcontroller-based IoT devices. Numerous applications of embedded ML/TinyML have recently been reported. A few examples include an intrusion detection system for IoT [19], urban noise data analysis [20], fault diagnosis [21], and soil quality monitoring [22].
Researchers have traditionally implemented IDS on gateways or the cloud due to the availability of network traffic analyzers like Wireshark (https://www.wireshark.org (accessed on 6 October 2024)) and tcpdump (https://www.tcpdump.org/ (accessed on 6 October 2024)). In our recent work [19], we introduced a novel approach by embedding an XGBoost-based IDS for binary classification in an ESP32 (https://www.espressif.com/en/products/socs/esp32 (accessed on 6 October 2024))-powered smart thermostat. The smart thermostat updates the HVAC status, indoor air temperature, and humidity on a webpage, allowing occupants to control it remotely. The lightweight IP (lwIP) (https://github.com/espressif/esp-lwip (accessed on 6 October 2024)) library for the ESP32 provides restricted access to network features. We developed a unique dataset named as the IDSH dataset [23] for intrusion detection in smart thermostats by using a Raspberry Pi-based adversary node to generate DoS and MITM attacks. The dataset is based on the features extractable from the smart thermostat using the lwIP library. This dataset is unique because existing datasets rely on packet capture tools (like Wireshark, tcpdump etc.) running on single-board computer-based gateways or workstations. In this work, we enhanced the performance of the IDS in terms of accuracy and computational efficiency through the novel implementation of CatBoost-based IDS on the ESP32 microcontroller. CatBoost implementation is not supported in existing ML libraries that port trained ML models to microcontrollers, so we quantized the trained CatBoost model to implement it in resource-constrained microcontrollers.
The main contributions of this work are as follows:
  • A novel, computationally efficient, decentralized multi-class IDS using the CatBoost algorithm is proposed for deployment directly on IoT devices, without relying on gateways (such as Raspberry Pi or computers) or cloud computing. The decentralized multi-class IDS significantly improves detection accuracy by effectively handling categorical data and missing values. The system demonstrates reduced inference time on resource-constrained microcontrollers due to the fast prediction capability of the algorithm, ensuring that potential attacks are detected and mitigated with minimal latency. This enhances the robustness of the IDS across diverse IoT environments.
  • Quantization of CatBoost model to fit models into the limited memory and processing capabilities of devices like the ESP32.
  • A detailed comparison was conducted between XGBoost- and CatBoost-based IDS implementations on microcontroller-based IoT devices for binary and multi-class classification of DoS and MITM attacks using the IDSH dataset. The evaluation focused on both algorithms’ accuracy, inference time, and storage requirements.
  • Additionally, we evaluated the impact of feature selection on the accuracy of the IDS and the computational burden on resource-constrained IoT devices.
The rest of the paper is organized as follows: Related work is presented in Section 2 and the proposed methodology is described in Section 3. The results are discussed in Section 4, followed by conclusion and future work in Section 5.

2. Related Work

The authors in [24] developed the permission and credibility-based IDS (PCIDS) using a decision tree (DT) for IoT devices to protect them against DoS and MITM attacks from adversaries. The PCIDS categorized the user requests into normal, abnormal, and risky categories by calculating the importance ratio, minimum credibility index, and maximum credibility index. The experimental results showed that the accuracy of PCIDS was 94.7%. The authors proposed to deploy the PCIDS on the gateway; however, hardware implementation of PCIDS on the gateway was not achieved.
In [25], the authors prevented the MITM attack on the Internet of Medical Things (IoMT) by transmitting the data signatures derived from locality-sensitive hashing (LSH). Furthermore, the authors also used the Hash Message Authentication Code (HMAC) to prevent modification attacks. The results showed that the proposed technique achieves a high detection rate with a false alarm rate (FAR) of 3%. In a recent study by Tekin et al. [26], the authors conducted a comparative analysis of the energy consumption of ML-based IDS on IoT devices, showing that on-device DT algorithms perform best in terms of training time, inference time, and power efficiency. However, the proposed technique was not tested in a real IoT environment.
In [27], a lightweight ML-based IDS is presented to be deployed on the edge side to detect impersonation attacks. Support vector machines (SVMs) were trained on the WiFi Intrusion Dataset to detect intrusions on the edge. The overall accuracy presented by this system was 98.22%. The authors in [18] introduced Deep-IDS for detecting DoS, DDoS, MITM, brute force, and replay attacks on Raspberry Pi-based edge servers/gateways. The Deep-IDS was trained using the CIC-IDS2017 dataset and achieved an accuracy of 97.67%. Similarly, a two-layered IDS was proposed in [28] to deploy IDS on Raspberry Pi-based the edge side and on cloud servers. In the first stage, an extra tree (ET)-based classifier was used for binary classification, and in the second stage, an ensemble technique was utilized which combined ET, RF, and deep neural network (DNN) for multi-classification. The proposed technique was tested on multiple datasets.
The IDS for real-time detection of DDoS attacks in smart homes based on software-defined networks (SDNs) was proposed in [29]. The authors collected the dataset of normal traffic and DDoS attacks, which was used to train SVM, Logistic Regression (LR), and DT. The results showed that DT outperformed other techniques with an accuracy of 99%.
The authors in [30] improved the precision of IDS using the Shapley (SHAP) value-based FS technique. The accuracy of the convolution neural network (CNN) and random forest (RF) using the FS technique for the CICIDS 2017 and NSL-KDD datasets was 98% with 10 features. In [31], the authors proposed a self-evolving host-based intrusion detection system (SEHIDS) that allows IoT devices to build their customized ANN model based on the traffic characteristics. The proposed technique used a multi-layer perceptron model for signature-based classification and a replicator neural network (ReNN) for anomaly-based intrusion detection. The authors tested their technique on the BoT-IoT, TON-IOT, and IoTID20 datasets. The authors claimed to have achieved an average true positive rate of 1. Similarly, the authors in [12] proposed a transformer-based network intrusion detection system (NIDS) by combining network traffic-based and data-based NIDS. The authors used the TON_IoT dataset and results showed that the proposed technique achieved 98.39% accuracy for binary classification and 97.06% for multi-classification. The authors in [32] proposed federated learning (FL)-based gated recurrent units (GRUs) NIDS for industrial IoT (IIoT). The accuracy of the training was improved by incorporating deep reinforcement learning (DRL). The results showed that the proposed technique performed better than non-FL and other variants of FL for intrusion detection.
In [33], the authors developed a lightweight IDS for IoT using cloud–edge collaboration. A stack-sparsed autoencoder (SSAE) was used for dimension reduction and a temporal convolution network (TCN) was utilized for intrusion detection. The proposed technique reduced the storage requirements, training time, and memory by 50% but the accuracy of the technique was approximately equal to centralized trained models.
Tiny ML is a subset of edge ML that allows the trained model to run on microcontrollers. In [34], the authors proposed a TinyML-based ECG classification system. They embedded a CNN model in the ECG device for classification, which reduces network bandwidth utilization and latency. The results showed that the accuracy of the TinyML-based classifier was 97%. The author in [35] embedded a unidirectional LSTM in a microcontroller for solar power forecasting and achieved a test R2 of 0.9590. In [36], the authors used TinyML for on-device anomaly detection by using the extreme value theory. The proposed technique achieved an excellent accuracy of 99.80%.
The literature reviewed above has explored the approaches of implementing IDS on gateways or on cloud servers. For successful IDS deployment on the edge, it must be both accurate and computationally efficient to detect attacks promptly. Most of the work has focused on deploying IDS on the edge (Raspberry Pi-based gateways) or in the cloud. However, IoT devices in smart homes are vulnerable to external threats due to their limited computational power and the absence of gateways. Therefore, there is a pressing need to develop IDS that can be embedded in IoT devices without relying on gateways or the cloud.

3. Materials and Methods

In this work, we considered the application of smart thermostats in smart homes. The thermostat is designed to update the indoor air environment (temperature and humidity levels), and air conditioner control signal (ON/OFF) on an Amazon Web Service (AWS) server. The webpage hosted on the AWS server shows the indoor air environment parameters, and based on temperature and humidity levels, occupants can send control signals to the air conditioner through a webpage. We proposed to embed ML-based IDS in smart thermostats for on-device intrusion detection. The proposed architecture of embedded IDS is shown in Figure 1. The bi-directional communication between cloud and smart thermostats can be disrupted/manipulated by an adversary node. Since for most IoT devices, Raspberry Pi-based gateways are not available for the implementation of IDS, we proposed to embed an IDS in a smart thermostat in this work.

3.1. Threat Model

The adversary does not know the ML-based IDS is running on the smart thermostat. The adversary aims to intercept and modify the communication between the cloud and the smart thermostat. Moreover, the adversary can launch a DoS attack on the smart thermostat or cloud to make them irresponsive.

3.1.1. Targeted System

The targeted system is a smart thermostat controlling the split air conditioner for maintaining indoor thermal comfort. The smart thermostat uploads the indoor air temperature to a website using WiFi and can be remotely controlled through HTTP.

3.1.2. Adversarial Capabilities

The adversary node is implemented using Raspberry Pi 4 (manufactured by the Raspberry Pi Foundation, Cambridge, United Kingdom) with Kali Linux OS (version: 2023.3). The adversary can connect to the hotspot from which the smart thermostat is also connected and can generate DoS and MITM attacks as shown in Figure 1.

3.1.3. Adversary Goals

The adversary’s primary objective is to compromise the communication between the smart thermostat and the cloud. The specific goals of the adversary include the following:
  • Launching DoS attacks on either the smart thermostat or the cloud server to render them unresponsive.
  • Eavesdropping on the communication between the smart thermostat and the cloud via MITM attacks.
  • Manipulating the control signals sent to the air conditioner.
  • Altering the temperature and humidity data uploaded to the webpage by the smart thermostat.

3.2. Training Dataset for IDS

Most of the well-known datasets like TON_IoT [37] and EdgeIIoT [38] used packet capture tools for dataset collection. These datasets required gateways to be part of the IoT architecture. The IDS proposed using such datasets is intended to be implemented on the gateway (Raspberry Pi). However, most IoT devices are connected to WiFi access points, and single-board computer (Raspberry Pi) gateways are not always available. We developed an IDSH dataset [23] that was captured on the ESP32 without using packet capture tools like Wireshark or tcpdump. We used the IDSH dataset to implement IDS on a smart thermostat for detecting DoS and MITM attacks. The dataset consists of sensor data, HVAC control signals, and network traffic features (connection activity and statistical data).
The block diagram of the testbed is shown in Figure 2 and the parameters collected at each step are detailed in Figure 2. The steps involved in dataset collection are described in our previous work [19]. The IDSH dataset features description is given in Appendix A in Table A1. The IDSH dataset contains 4144 samples, which include instances of normal traffic, DoS attacks, and MITM attacks. The input features and target of IDS are shown in Table 1. The timestamp, source IP, and destination IP were excluded to prevent overfitting.

3.2.1. Data Preprocessing

The dataset is normalized using the standard Min-Max normalization function, which scales the data to a range of [0, 1] for positive values or [−1, 1] when negative values are present. Label encoding is applied to convert the string-based output variables into integer format, enabling their use in training machine learning algorithms.

3.2.2. Feature Selection

The chi-square [39] is used for FS to reduce the number of features. Table 2 shows the features selected by chi-square.

3.3. Deployment of a Machine Learning-Based Intrusion Detection System on a Smart Thermostat

In this study, XGBoost and CatBoost models are deployed on an ESP32-based smart thermostat for both binary and multi-class attack classification. The XGBoost-based IDS is implemented on the microcontroller using MicroMLgen [40]. Since existing libraries do not support the conversion of CatBoost models into optimized C++ code for microcontroller implementation, we quantized the CatBoost models to fit within the limited memory and processing capabilities of devices like the ESP32.

4. Results

In the absence of Raspberry Pi-based gateways, IoT devices have no defense against cyberattacks. Therefore, in this work, we embedded an ML-based IDS into a smart thermostat built with an ESP32 microcontroller. The ESP32 microcontroller has 440 KB of ROM and 520 KB of SRAM for program storage and execution. To implement the IDS, the smart thermostat extracts features from data traffic using the lwIP library. The smart thermostat communicates with an HTTP client hosted in the cloud through HTTP POST requests.
In our previous work [19], we evaluated the feasibility of embedding RF, XGBoost, DT, and ANN-based IDSs in terms of memory, inference time, and accuracy. Our results showed that XGBoost-based IDS outperformed DT, ANN, and RF for binary classification. In this work, we evaluated the performance of optimized CatBoost-based IDS on a smart thermostat for binary and multi-class classification and compared the results with our previous work. In this section, the implementation of IDS with CatBoost is discussed. Initially, we present the simulation results of CatBoost for binary and multi-classification of attacks on a smart thermostat. We also discuss the impact of FS on the performance of CatBoost implementation with reduced features using the FS technique. Later, we will discuss the implementation of CatBoost IDS on an ESP32-based smart thermostat and compare it with XGBoost.

4.1. CatBoost-Based IDS Implementation on IoT Device Without Feature Selection for Binary Classification

The performance of CatBoost for the implementation of IDS was evaluated for binary classification without using an FS technique. The IDSH dataset was split into 70% training and 30% testing. During training, 10-fold cross-validation was used to avoid overfitting and ensure generalization. The IDSH dataset has 20 input features while Label and Type are ground truths. The timestamp, source_ip, and destination_ip were not included as inputs to avoid overfitting. Hyperparameter tuning was performed using grid search. The parameters for grid search included depth, learning rate, regularization parameter (L2_Leaf_reg), and the number of trees. The range for the number of trees was [50, 100, 150, 200, 250, 300]; for 12_Leaf_reg, it was [1, 3, 5]; and the learning rate was [0.01, 0.1, 0.2, 0.3]. The performance of CatBoost was evaluated in terms of accuracy, precision, recall, and F1-score. The testing results are shown in Table 3. The highest accuracy of 99.03% was achieved at a depth of 10 with a false negative rate (FNR) of 1.30% and false positive rate (FPR) of 0.25%.

4.2. CatBoost-Based IDS Implementation on IoT Device with Feature Selection for Binary Classification

The chi-square [39] FS technique was used to find the optimal number of features. The FS technique was performed for each depth. We evaluated the performance of CatBoost for seven to sixteen features. Table 4 shows the best FS results for each depth. The results show that the CatBoost model with 10 features and a depth of 10 gives the highest accuracy of 99.03%.

4.3. Catboost-Based IDS for Multi-Classification Without Feature Selection

Similar to binary classification, for multi-classification, the timestamp, source_ip, and destination_ip were not included as inputs to avoid overfitting. Hyperparameter tuning was performed using grid search. The parameters for grid search included depth, learning rate, regularization parameter (L2_Leaf_reg), and the number of trees. The range for the number of trees was [50, 100, 150, 200, 250, 300]; for 12_Leaf_reg, it was [1, 3, 5]; and the learning rate was [0.01, 0.1, 0.2, 0.3]. The performance of CatBoost was evaluated in terms of accuracy, precision, recall, and F1-score. The testing results are shown in Table 5. The highest accuracy of 98.15% was achieved at a depth of seven.

4.4. Catboost-Based IDS for Multi-Classification with Feature Selection

The CatBoost model was also trained for multi-classification by using the FS technique. We evaluated the performance of CatBoost with seven to sixteen features. Below seven features, the accuracy of IDS dropped below 90%. The performance of CatBoost was evaluated for depths from six to ten and the best performance at each depth with FS is shown in Table 6. The results show that CatBoost with depth=7 and with 10 features gave highest accuracy of 98.15%.

4.5. Quantization of CatBoost-Based IDS

Quantization in ML is used for compressing large model data. The ESP32 has a limited memory and processing power; therefore, running a large ML model may not be feasible or may require a large inference time. The weights and parameters of trained CatBoost models are saved in double format for higher precision. The floating point numbers can be represented in half (16-bit), single (32-bit), and double (64-bit) precision. The hardware acceleration in ESP32 is only supported for single precision, while double is implemented using software that requires more memory and takes longer to complete the operation. Therefore, in this work, we utilized post-training quantization in which the model parameters and weights of the CatBoost model were stored using single precision. Quantization may result in a small decrease in model accuracy due to reduced numerical precision. However, in CatBoost models, where tree-based learning creates discrete splits, the impact is generally minimized. This trade-off is often acceptable for models that do not rely heavily on high precision in calculations, particularly for inference tasks on ESP32. Since the ESP32 supports hardware acceleration for single precision (32-bit float), converting the parameters of CatBoost from double to float results in lower memory consumption and faster inference time.
Therefore, to support our aforementioned discussion, we also compared the detection accuracy of CatBoost (Depth = 6, Trees = 200) with and without quantization for binary classification in Figure 3 and the results illustrate that the accuracy did not decrease. In Figure 3, the graph shows the detection of benign (0) and attack (1) for 50 samples. The CatBoost with quantization results are the results of the model running on ESP32 and the CatBoost without quantization results are the results of the model running on the local machine. Therefore, we can conclude that applying quantization for limited memory-based ESP32 did not compromise the accuracy of the detection.

4.6. IDS Implementation on Smart Thermostat for Real-Time Intrusion Detection

The implementation of IDS on a smart thermostat is challenging due to its limited memory and processing power. In our previous work, we implemented an XGBoost-based IDS for binary classification without using an FS technique. In this section, we evaluate the implementation of a CatBoost-based IDS on a smart thermostat for both binary and multi-class classification. Additionally, we compare the performance of the CatBoost-based IDS with the XGBoost-based IDS on the smart thermostat.
The ESP32 has limited RAM and program storage, which prevents embedding an IDS with a large number of trees and deep models. In Table 7, for Depth = 6, a CatBoost model with 200 trees can be embedded for binary classification. Beyond 200 trees, the memory overflows on the ESP32. For Depth = 7, a CatBoost model with 120 trees can be embedded without using FS, and with FS, a model with 140 trees can be embedded. Similarly, the implementation results for the maximum possible number of trees and depths are shown in Table 7. The results show that for binary classification, the CatBoost-based IDS achieved the highest accuracy of 98.71%, outperforming the XGBoost-based IDS developed in our previous work [19], which had an accuracy of 97.66%. The results indicate that the CatBoost-based IDS is more accurate and faster than the XGBoost-based IDS.
For multi-class classification, the highest accuracy of 97.51% was achieved by the CatBoost-based IDS (90 trees, depth = 6). In comparison, the highest accuracy achieved by the XGBoost-based IDS (50 trees, depth = 7) was 96.70%, with an inference time of 2111 μs, whereas the inference time for CatBoost was only 267 μs.

4.7. Discussion

In this study, we developed an IDS for IoT devices in smart homes where gateways are not available for the deployment of IDS. The IDS was embedded in a smart thermostat for real-time intrusion detection without relying on gateways.
We evaluated the feasibility of implementing the IDS for binary and multi-class classification. The CatBoost model (Trees = 200, Depth = 10) achieved the highest accuracy of 99.03% for binary classification both with and without FS. However, due to the limited program storage and RAM available on the ESP32, embedding a CatBoost model with a depth greater than eight was not possible. The IDS performance comparison of XGBoost and CatBoost for binary and multi-classification on smart thermostat is shown in Figure 4. The highest number of trees allowed for Depth = 7 was 140, and for Depth = 8, the maximum number of trees was 70. Therefore, the maximum accuracy achieved by the CatBoost-based IDS on the smart thermostat was 98.71% using a depth of six and 200 trees. The CatBoost-based IDS outperformed the IDS implemented with XGBoost in our previous work [19] in terms of accuracy, inference time, and program storage. The CatBoost-based IDS improved accuracy by 1.06%, decreased inference time by 92.14%, and reduced program storage by 14.09%.
Similarly, for multi-class classification, the highest accuracy was 98.15% with the CatBoost (Depth = 7, Trees = 200)-based IDS. On the smart thermostat, the highest accuracy of the CatBoost-based IDS was 97.51%. The CatBoost model outperformed the XGBoost-based IDS in terms of accuracy, inference time, and program storage. The CatBoost-based IDS improved accuracy by 0.83%, reduced inference time by 87.35%, and reduced program storage by 11.32%.
The increase in the number of trees improves accuracy by capturing complex patterns, but this increase also raises the computational burden; as a result, inference time and memory consumption increase. A deeper CatBoost/XGBoost model captures complex patterns and increases accuracy. However, deeper trees consume more memory and increase inference time. As shown in Table 3, increasing tree depth generally improves accuracy. However, in memory-limited devices such as ESP32 microcontrollers, Table 7 demonstrates that as depth increases, fewer trees can be used before memory overflow occurs. For example, at a depth of six, the maximum number of trees is 200 for binary classification and 90 for multi-classification. When depth is increased to eight, the maximum number of trees drops to 70 for binary classification and 25 for multi-classification.
The FS method improved the accuracy for binary classification by using a reduced number of features. Table 4 shows that with a reduced number of features, the accuracy improves. However, on the microcontroller, the FS technique did not reduce inference time or program storage. The inference time depends on the number of trees and the depth of the trees. Since the number of trees was either the same or greater, the inference time was not significantly improved.
CatBoost and XGBoost are both based on the gradient boosting framework, using decision trees as base learners. However, CatBoost is particularly well-suited for constrained devices like the ESP32 due to its native support for categorical data, eliminating the need for preprocessing. CatBoost’s ordered boosting technique efficiently handles training and inference without storing large amounts of data, making it ideal for memory-limited environments.
Additionally, CatBoost prevents target leakage by splitting the data into multiple parts and using only past data for predictions. This approach not only maintains high accuracy but also reduces storage requirements and prevents overfitting as depicted in Figure 4. Unlike XGBoost, CatBoost uses symmetric trees, which require fewer computations for predictions, contributing to faster inference times. This is critical for implementing IDS on resource-constrained devices like the ESP32, where minimal inference time is crucial.
Furthermore, CatBoost’s symmetric tree structure allows it to use fewer trees and shallower depths while maintaining performance, which further enhances inference speed as shown in Table 7. These characteristics make CatBoost a more efficient choice than XGBoost for IDS deployment on microcontrollers.
In smart homes, IoT devices have limited computational resources and are used in sensitive applications like door locks, CCTVs, and smart thermostat, etc. During the interaction with the cloud, an adversary can stop the operation of these devices with a DoS attack or can intercept the sensitive information through an MITM attack. A lightweight IDS that can quickly and efficiently detect these attacks with minimal computational load can enhance security for homeowners. Rapid detection of DoS attacks is especially crucial, as it allows for mitigation before the device is overwhelmed. In this work, we demonstrate that a CatBoost-based IDS can detect these attacks in under 276 microseconds, without sacrificing accuracy.

5. Conclusions and Future Work

In this study, we proposed a CatBoost-based IDS for IoT devices in smart homes. The system is designed to work with IoT devices that communicate with the cloud, eliminating the need for resource-intensive gateways like Raspberry Pi or computers. Our embedded machine learning-based IDS effectively protects these devices from DoS and MITM attacks without relying on gateways or cloud processing. The results showed that the CatBoost-based IDS achieved 99.03% accuracy for binary classification and 98.15% accuracy for multi-class classification. Due to the limited processing power and memory of the ESP32-based smart thermostat, the highest achieved accuracy was 98.71% for binary classification and 97.51% for multi-class classification. The CatBoost IDS performed binary classification in 276 μs and multi-class classification in 273 μs. Additionally, CatBoost-based IDS outperformed the XGBoost-based IDS in terms of accuracy, program storage, and inference time. While FS methods slightly improved accuracy, the inference time remained unaffected, as the number of trees and tree depth did not change.
For future work, we plan to expand the IDSH dataset to include more attack types and a larger sample size. Due to the limited resources and restricted access to network parameters in the lwIP library, we were able to extract only a limited set of network features from the microcontroller. Moving forward, we aim to extract a wider range of network parameters directly from IoT devices to further improve the IDS’s effectiveness. Additionally, we will explore other machine learning techniques that require fewer computational resources while delivering higher accuracy.

Author Contributions

Conceptualization, A.J., M.N.A., A.-u.-H.Q. and H.L.; methodology, A.J., M.N.A., A.-u.-H.Q., M.J. and J.A.; software, A.J., M.N.A. and M.J.; validation, A.J., M.N.A., A.-u.-H.Q., M.J., J.A. and H.L.; formal analysis, A.J., M.N.A., A.-u.-H.Q., M.J. and J.A.; investigation, A.J., M.N.A., J.A., A.-u.-H.Q. and H.L.; resources, A.J. and A.-u.-H.Q.; data curation, A.J., M.N.A., J.A., H.L. and M.J.; writing—original draft preparation, A.J., M.N.A., M.J. and A.-u.-H.Q.; writing—review and editing, A.J., M.J., M.N.A., J.A., H.L. and A.-u.-H.Q.; visualization, A.J., M.N.A., A.-u.-H.Q. and J.A.; supervision, A.J. and A.-u.-H.Q.; project administration, A.J. and A.-u.-H.Q.; funding acquisition, A.J. and A.-u.-H.Q. All authors have read and agreed to the published version of the manuscript.

Funding

The APC was funded by Department of Cyber Security and Networks, School of Computing, Engineering and Built Environment, Glasgow Caledonian University, UK.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

The dataset presented in the study is openly available on Kaggle at https://doi.org/10.1109/JIOT.2023.3289206 (accessed on 8 October 2024).

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A

Table A1. Description of the IDSH dataset.
Table A1. Description of the IDSH dataset.
IDFeatureTypeDescription
1timestampTimeTimestamp of connection
2source_ipStringSource IP address
3source_portNumberSource ports which originate endpoint’s TCP/UDP ports
4destination_ipStringDestination IP address
5dst_portNumberDestination ports which respond to endpoint’s TCP/UDP ports
6protocolStringTransport layer protocols of flow connections
7FamilyStringAddress family
8ServiceStringDynamically detected protocols, such as DNS, HTTP, and SSL
9DurationTimeThe difference in the time between the packet being sent from the source and receiving the response from the cloud server
10source_bytesNumberSource bytes which originate from the source
11destination_bytesNumberDestination bytes which are responses from the destination
12conn_stateStringVarious connection states, such as S0 (connection without replay), S1 (connection established), and REJ (connection attempt rejected)
13missed_bytesNumberNumber of missing bytes in content gaps
14source_packetsNumberNumber of original packets which is estimated from source systems
15src_ip_bytesNumberNumber of original IP bytes which is the total length of IP header field of source systems
16destination_packetsNumberNumber of destination packets which is estimated from destination systems
17dst_ip_bytesNumberNumber of destination IP bytes which is the total length of IP header field of destination systems
18TemperatureStringRoom temperature (°C) of the Zone
19HumidityStringHumidity (%) of the Zone.
20StatusStringStatus of air conditioner (ON/OFF).
21LabelNumberTag Normal traffic as 0 and attack as 1.
22TypeStringTag attack categories as Normal, DoS, and MITM.

References

  1. Mishra, N.; Pandya, S. Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review. IEEE Access 2021, 9, 59353–59377. [Google Scholar] [CrossRef]
  2. IoT Business News. Number of Connected IOT Devices Growing 9% to 12.3 Billion Globally, Cellular IOT Now Surpassing 2 Billion. Available online: https://iotbusinessnews.com/2021/09/23/13465-number-of-connected-iot-devices-growing-9-to-12-3-billion-globally-cellular-iot-now-surpassing-2-billion/ (accessed on 24 January 2024).
  3. Saied, M.; Guirguis, S.; Madbouly, M. Review of artificial intelligence for enhancing intrusion detection in the internet of things. Eng. Appl. Artif. Intell. 2024, 127, 107231. [Google Scholar] [CrossRef]
  4. Nemec Zlatolas, L.; Feher, N.; Hölbl, M. Security perception of IoT devices in smart homes. J. Cybersecur. Priv. 2022, 2, 65–73. [Google Scholar] [CrossRef]
  5. Araya, J.I.I.; Rifà-Pous, H. Anomaly-based cyberattacks detection for smart homes: A systematic literature review. Internet Things 2023, 22, 100792. [Google Scholar] [CrossRef]
  6. Sapalo Sicato, J.C.; Sharma, P.K.; Loia, V.; Park, J.H. VPNFilter malware analysis on cyber threat in smart home network. Appl. Sci. 2019, 9, 2763. [Google Scholar] [CrossRef]
  7. Insights, F.B. Smart Home Market Size, Share & Industry Analysis, by Device Type (Safety & Security Access Control, Home Appliances, HVAC, Lighting Control, Smart Entertainment Devices, Smart Kitchen Appliances, and Others), by Application (Retrofit and New Construction), by Protocol (Wired and Wireless), and Regional Forecast, 2024–2032. Available online: https://www.fortunebusinessinsights.com/industry-reports/smart-home-market-101900 (accessed on 24 August 2024).
  8. Rambus. Smart Home: Threats and Countermeasures. Available online: https://www.rambus.com/iot/smart-home/ (accessed on 24 August 2024).
  9. Rani, D.; Gill, N.S.; Gulia, P.; Arena, F.; Pau, G. Design of an intrusion detection model for IoT-enabled smart home. IEEE Access 2023, 11, 52509–52526. [Google Scholar] [CrossRef]
  10. Abdusalomov, A.; Kilichev, D.; Nasimov, R.; Rakhmatullayev, I.; Im Cho, Y. Optimizing Smart Home Intrusion Detection with Harmony-Enhanced Extra Trees. IEEE Access 2024, 12, 117761–117786. [Google Scholar] [CrossRef]
  11. Sabir, M.; Ahmad, J.; Alghazzawi, D.M. A Lightweight Deep Autoencoder Scheme for Cyberattack Detection in the Internet of Things. Comput. Syst. Sci. Eng. 2023, 46, 57–72. [Google Scholar] [CrossRef]
  12. Wang, M.; Yang, N.; Weng, N. Securing a smart home with a transformer-based iot intrusion detection system. Electronics 2023, 12, 2100. [Google Scholar] [CrossRef]
  13. Javeed, D.; Saeed, M.S.; Ahmad, I.; Kumar, P.; Jolfaei, A.; Tahir, M. An Intelligent Intrusion Detection System for Smart Consumer Electronics Network. IEEE Trans. Consum. Electron. 2023, 69, 906–913. [Google Scholar] [CrossRef]
  14. Ullah, S.; Ahmad, J.; Khan, M.A.; Alshehri, M.S.; Boulila, W.; Koubaa, A.; Jan, S.U.; Ch, M.M.I. TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks. Comput. Netw. 2023, 237, 110072. [Google Scholar] [CrossRef]
  15. Bhardwaj, A.; Bharany, S.; Abulfaraj, A.W.; Ibrahim, A.O.; Nagmeldin, W. Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities. Egypt. Inform. J. 2024, 25, 100443. [Google Scholar] [CrossRef]
  16. Nguyen, X.H.; Nguyen, X.D.; Huynh, H.H.; Le, K.H. Realguard: A lightweight network intrusion detection system for IoT gateways. Sensors 2022, 22, 432. [Google Scholar] [CrossRef] [PubMed]
  17. Zang, M.; Zheng, C.; Dittmann, L.; Zilberman, N. Towards continuous threat defense: In-network traffic analysis for IoT gateways. IEEE Internet Things J. 2023, 11, 9244–9257. [Google Scholar] [CrossRef]
  18. Racherla, S.; Sripathi, P.; Faruqui, N.; Kabir, M.A.; Whaiduzzaman, M.; Shah, S.A. Deep-IDS: A Real-Time Intrusion Detector for IoT Nodes Using Deep Learning. IEEE Access 2024, 12, 63584–63597. [Google Scholar] [CrossRef]
  19. Javed, A.; Ehtsham, A.; Jawad, M.; Awais, M.N.; Qureshi, A.u.H.; Larijani, H. Implementation of Lightweight Machine Learning-Based Intrusion Detection System on IoT Devices of Smart Homes. Future Internet 2024, 16, 200. [Google Scholar] [CrossRef]
  20. Hammad, S.S.; Iskandaryan, D.; Trilles, S. An unsupervised TinyML approach applied to the detection of urban noise anomalies under the smart cities environment. Internet Things 2023, 23, 100848. [Google Scholar] [CrossRef]
  21. Asutkar, S.; Chalke, C.; Shivgan, K.; Tallur, S. TinyML-enabled edge implementation of transfer learning framework for domain generalization in machine fault diagnosis. Expert Syst. Appl. 2023, 213, 119016. [Google Scholar] [CrossRef]
  22. Bhattacharya, S.; Pandey, M. Deploying an energy efficient, secure & high-speed sidechain-based TinyML model for soil quality monitoring and management in agriculture. Expert Syst. Appl. 2024, 242, 122735. [Google Scholar]
  23. Javed, A. Intrusion Detection in Smart Homes (IDSH) Dataset. Available online: https://www.kaggle.com/dsv/7552151 (accessed on 10 October 2024).
  24. Zhang, C.; Lian, Z.; Huang, H.; Su, C. PCIDS: Permission and Credibility-Based Intrusion Detection System in IoT Gateways. IEEE Internet Things J. 2024, 11, 904–913. [Google Scholar] [CrossRef]
  25. Salem, O.; Alsubhi, K.; Shaafi, A.; Gheryani, M.; Mehaoua, A.; Boutaba, R. Man-in-the-Middle Attack Mitigation in Internet of Medical Things. IEEE Trans. Ind. Inform. 2022, 18, 2053–2062. [Google Scholar] [CrossRef]
  26. Tekin, N.; Acar, A.; Aris, A.; Uluagac, A.S.; Gungor, V.C. Energy consumption of on-device machine learning models for IoT intrusion detection. Internet Things 2023, 21, 100670. [Google Scholar] [CrossRef]
  27. Lee, S.J.; Yoo, P.D.; Asyhari, A.T.; Jhi, Y.; Chermak, L.; Yeun, C.Y.; Taha, K. IMPACT: Impersonation Attack Detection via Edge Computing Using Deep Autoencoder and Feature Abstraction. IEEE Access 2020, 8, 65520–65529. [Google Scholar] [CrossRef]
  28. Aldaej, A.; Ullah, I.; Ahanger, T.A.; Atiquzzaman, M. Ensemble technique of intrusion detection for IoT-edge platform. Sci. Rep. 2024, 14, 11703. [Google Scholar] [CrossRef]
  29. Garba, U.H.; Toosi, A.N.; Pasha, M.F.; Khan, S. SDN-based detection and mitigation of DDoS attacks on smart homes. Comput. Commun. 2024, 221, 29–41. [Google Scholar] [CrossRef]
  30. Chen, X.; Liu, M.; Wang, Z.; Wang, Y. Explainable Deep Learning-Based Feature Selection and Intrusion Detection Method on the Internet of Things. Sensors 2024, 24, 5223. [Google Scholar] [CrossRef]
  31. Baz, M. SEHIDS: Self evolving host-based intrusion detection system for IoT networks. Sensors 2022, 22, 6505. [Google Scholar] [CrossRef]
  32. Kaur, A. Intrusion Detection Approach for Industrial Internet of Things Traffic using Deep Recurrent Reinforcement Learning Assisted Federated Learning. IEEE Trans. Artif. Intell. 2024, 1–13. [Google Scholar] [CrossRef]
  33. Yang, R.; He, H.; Xu, Y.; Xin, B.; Wang, Y.; Qu, Y.; Zhang, W. Efficient intrusion detection toward IoT networks using cloud–edge collaboration. Comput. Netw. 2023, 228, 109724. [Google Scholar] [CrossRef]
  34. Kim, E.; Kim, J.; Park, J.; Ko, H.; Kyung, Y. TinyML-Based Classification in an ECG Monitoring Embedded System. Comput. Mater. Contin. 2023, 75, 1751–1764. [Google Scholar] [CrossRef]
  35. Hayajneh, A.M.; Alasali, F.; Salama, A.; Holderbaum, W. Intelligent Solar Forecasts: Modern Machine Learning Models and TinyML Role for Improved Solar Energy Yield Predictions. IEEE Access 2024, 12, 10846–10864. [Google Scholar] [CrossRef]
  36. Pereira, E.S.; Marcondes, L.S.; Silva, J.M. On-Device Learning TinyML for Anomaly Detection Based on Extreme Values Theory. IEEE Micro 2023, 43, 58–65. [Google Scholar] [CrossRef]
  37. The TON_IoT Datasets: UNSW Research. Available online: https://research.unsw.edu.au/projects/toniot-datasets (accessed on 30 April 2024).
  38. Ferrag, M.A.; Friha, O.; Hamouda, D.; Maglaras, L.; Janicke, H. Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications: Centralized and Federated Learning. IEEE Access 2022, 10, 40281–40306. [Google Scholar] [CrossRef]
  39. Pearson, K.X. On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling. Lond. Edinb. Dublin Philos. Mag. J. Sci. 1900, 50, 157–175. [Google Scholar] [CrossRef]
  40. TensorFlow Lite TinyML for ESP32. Available online: https://github.com/eloquentarduino/micromlgen (accessed on 30 March 2024).
Figure 1. Proposed architecture of embedded IDS for smart thermostats.
Figure 1. Proposed architecture of embedded IDS for smart thermostats.
Sensors 24 07320 g001
Figure 2. Dataset collection on smart thermostats.
Figure 2. Dataset collection on smart thermostats.
Sensors 24 07320 g002
Figure 3. Comparison of IDS implemented with quantization and without quantization.
Figure 3. Comparison of IDS implemented with quantization and without quantization.
Sensors 24 07320 g003
Figure 4. Comparison of IDS implemented with CatBoost and XGBoost on the smart thermostat.
Figure 4. Comparison of IDS implemented with CatBoost and XGBoost on the smart thermostat.
Sensors 24 07320 g004
Table 1. Inputs and target of IDS.
Table 1. Inputs and target of IDS.
Selected Input FeaturesTarget
source_port, dst_port, protocol, Family, Service, Duration, source_bytes, destination_bytes, conn_state, missed_bytes, source_packets, src_ip_bytes, destination_packets, dst_ip_bytes, Temperature, Humidity, StatusLabel (binary classification), Type (multi-class classification)
Table 2. Selected features.
Table 2. Selected features.
No. of FeaturesSelected Features
7source_port, Duration, missed_bytes, dst_ip_bytes, Temperature, Humidity, Status
8source_port, Duration, destination_bytes, missed_bytes, dst_ip_bytes, Temperature, Humidity, Status
9source_port, Duration, destination_bytes, conn_state, missed_bytes, dst_ip_bytes, Temperature, Humidity, Status
10source_port, protocol, Duration, destination_bytes, conn_state, missed_bytes, dst_ip_bytes, Temperature, Humidity, Status
11source_port, protocol, Duration, source_bytes, destination_bytes, conn_state, missed_bytes, dst_ip_bytes, Temperature, Humidity, Status
Table 3. Performance of CatBoost for binary classification.
Table 3. Performance of CatBoost for binary classification.
HyperparametersAccuracyPrecisionRecallF1-ScoreFPRFNR
Trees = 200, Depth = 6, 12_Reg_Leaf = 1, LR = 0.198.63%0.980.980.981.41%1.25%
Trees = 200, Depth = 7, 12_Reg_Leaf = 3, LR = 0.398.79%0.980.990.991.30%1.00%
Trees = 200, Depth = 8, 12_Reg_Leaf = 3, LR = 0.398.79%0.980.980.981.41%0.75%
Trees = 200, Depth = 9, 12_Reg_Leaf = 3, LR = 0.398.63%0.980.980.981.30%1.50%
Trees = 200, Depth = 10, 12_Reg_Leaf = 3, LR = 0.399.03%0.990.990.991.30%0.25%
Table 4. Performance of CatBoost for binary classification using feature selection.
Table 4. Performance of CatBoost for binary classification using feature selection.
HyperparametersNo. of FeaturesAccuracyPrecisionRecallF1-ScoreFPRFNR
Trees = 200, Depth = 6, 12_Reg_Leaf = 3, LR = 0.3998.71%0.980.990.981.53%0.75%
Trees = 200, Depth = 7, 12_Reg_Leaf = 3, LR = 0.3998.87%0.980.980.981.41%1.00%
Trees = 200, Depth = 8, 12_Reg_Leaf = 3, LR = 0.3998.95%0.980.990.991.18%0.75%
Trees = 150, Depth = 9, 12_Reg_Leaf = 3, LR = 0.3998.87%0.980.990.991.18%1.00%
Trees = 200, Depth = 10, 12_Reg_Leaf = 3, LR = 0.31099.03%0.990.990.991.30%0.25%
Table 5. Performance of CatBoost for multi-classification without using feature selection.
Table 5. Performance of CatBoost for multi-classification without using feature selection.
HyperparametersAccuracyPrecisionRecallF1-Score
Trees = 250, Depth = 6, 12_Reg = 3, LR = 0.397.90%0.960.960.96
Trees = 200, Depth = 7, 12_Reg_Leaf = 3, LR = 0.398.15%0.970.970.97
Trees = 250, Depth = 8, 12_Reg_Leaf = 3, LR = 0.397.90%0.970.960.96
Trees = 150, Depth = 9, 12_Reg_Leaf = 3, LR = 0.397.90%0.960.960.96
Trees = 250, Depth = 10, 12_Reg_Leaf = 3, LR = 0.397.66%0.960.960.96
Table 6. Performance of CatBoost for multi-classification with feature selection.
Table 6. Performance of CatBoost for multi-classification with feature selection.
HyperparametersNo. of FeaturesAccuracyPrecisionRecallF1-Score
Trees = 250, Depth = 6, 12_Reg_Leaf = 3, LR = 0.31097.91%0.970.960.96
Trees = 200, Depth = 7, 12_Reg_Leaf = 3, LR = 0.31098.15%0.970.970.97
Trees = 250, Depth = 8, 12_Reg_Leaf = 3, LR = 0.31097.91%0.970.960.96
Trees = 150, Depth = 9, 12_Reg_Leaf = 3, LR = 0.31097.91%0.960.960.96
Trees = 150, Depth = 10, 12_Reg_Leaf = 3, LR = 0.3897.74%0.960.960.96
Table 7. Implementation of IDS on the smart thermostat for binary and multi-classification.
Table 7. Implementation of IDS on the smart thermostat for binary and multi-classification.
ML Models (Hyperparameters)No. of FeaturesClassificationAccuracyInference Time μs (Average)Program Storage
CatBoost (Trees = 200, Depth = 6, 12_Reg_Leaf = 3, LR = 0.3)17Binary98.63%28472.20%
CatBoost (Trees = 120, Depth = 7, 12_Reg_Leaf = 3, LR = 0.3)17Binary98.55%22372.83%
CatBoost (Trees = 70, Depth = 8, 12_Reg_Leaf = 3, LR = 0.3)17Binary98.47%24971.85%
CatBoost (Trees = 200, Depth = 6, 12_Reg_Leaf = 3, LR = 0.3)9Binary98.71%27672.17%
CatBoost (Trees = 140, Depth = 7, 12_Reg_Leaf = 1, LR = 0.3)9Binary98.47%26073.59%
CatBoost (Trees = 70, Depth = 8, 12_Reg_Leaf=1, LR = 0.3)10Binary98.47%25371.76%
XGBoost (Trees = 100, Depth = 8) [19]17Binary97.66%351584.01%
CatBoost (Trees = 90, Depth = 6, 12_Reg_Leaf = 3, LR = 0.3)17Multi-Classification97.51%26773.25%
CatBoost (Trees = 90, Depth = 6, 12_Reg_Leaf = 3, LR = 0.3)10Multi-Classification97.51%27373.25%
CatBoost (Trees = 40, Depth = 7, 12_Reg_Leaf = 3, LR = 0.3)17Multi-Classification96.86%16072.86%
CatBoost (Trees = 40, Depth = 7, 12_Reg_Leaf=3, LR = 0.3)10Multi-Classification96.86%15872.51%
CatBoost (Trees = 25, Depth = 8, 12_Reg_Leaf = 3, LR = 0.3)17Multi-Classification96.86%14071.38%
CatBoost (Trees = 25, Depth = 8, 12_Reg_Leaf = 3, LR = 0.3)10Multi-Classification96.86%13771.27%
XGBoost (Trees = 100, Depth = 6, LR = 0.3)17Multi-Classification96.14%407585.68%
XGBoost (Trees = 100, Depth = 6, LR = 0.3)10Multi-Classification96.14%407385.68%
XGBoost (Trees = 50, Depth = 7, LR = 0.3)17Multi-Classification96.30%201180.38%
XGBoost (Trees = 50, Depth = 7, LR = 0.3)7Multi-Classification96.54%203781.12%
XGBoost (Trees = 50, Depth = 8, LR = 0.3)17Multi-Classification96.54%347283.65%
XGBoost (Trees = 50, Depth = 7, LR = 0.3)7Multi-Classification96.70%211182.60%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Javed, A.; Awais, M.N.; Qureshi, A.-u.-H.; Jawad, M.; Arshad, J.; Larijani, H. Embedding Tree-Based Intrusion Detection System in Smart Thermostats for Enhanced IoT Security. Sensors 2024, 24, 7320. https://doi.org/10.3390/s24227320

AMA Style

Javed A, Awais MN, Qureshi A-u-H, Jawad M, Arshad J, Larijani H. Embedding Tree-Based Intrusion Detection System in Smart Thermostats for Enhanced IoT Security. Sensors. 2024; 24(22):7320. https://doi.org/10.3390/s24227320

Chicago/Turabian Style

Javed, Abbas, Muhammad Naeem Awais, Ayyaz-ul-Haq Qureshi, Muhammad Jawad, Jehangir Arshad, and Hadi Larijani. 2024. "Embedding Tree-Based Intrusion Detection System in Smart Thermostats for Enhanced IoT Security" Sensors 24, no. 22: 7320. https://doi.org/10.3390/s24227320

APA Style

Javed, A., Awais, M. N., Qureshi, A. -u. -H., Jawad, M., Arshad, J., & Larijani, H. (2024). Embedding Tree-Based Intrusion Detection System in Smart Thermostats for Enhanced IoT Security. Sensors, 24(22), 7320. https://doi.org/10.3390/s24227320

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop