Enhanced Internet of Things Security Situation Assessment Model with Feature Optimization and Improved SSA-LightGBM
Abstract
:1. Introduction
- 1.
- In order to cope with the fact that the original data have multiple features, high dimensionality, and non-linearity, a feature optimization algorithm is proposed in this paper. The data were first dimensionally reduced using the ICA method and then combined with mRMR, Spearman’s rank correlation coefficient, and XGBoost feature importance to optimize and combine the weights of the features and filter out the subset of features that impact the classification results. This improves the relevance and predictive accuracy of the features.
- 2.
- To suit the vast and intricate IoT landscape, this paper proposes a novel IoT network security situation assessment model that improves LightGBM. To address the challenge of parameter configuration complexity, SSA was improved using piecewise chaotic mapping and the firefly perturbation strategy. This was then applied to the optimization process of LightGBM, which further optimized the model performance. The threat impact is utilized to calculate the situation value for assessing IoT network security.
- 3.
- The experimental results demonstrate that the IoT network security situation assessment model proposed demonstrates excellent convergence, high accuracy, and low error in a comparative analysis with other models. The model converged at 0.0066 with an assessment accuracy of 99.34% and a mean squared error of 0.00001, which is closer to the true situation value. Therefore, applying this method to the problem of situation assessment can effectively assess the IoT security situation.
2. Related Work
3. Principle of the Sparrow Search Algorithm
4. Piecewise Chaos Mapping and the Firefly Perturbation Strategy
4.1. Piecewise Chaos Mapping
4.2. Firefly Perturbation Strategy
- 1.
- The relative fluorescence brightness of fireflies is:
- 2.
- The attractiveness of the fireflies is:
- 3.
- The formula for updating the position between individual fireflies is:
5. Proposed Approach
5.1. Feature Optimization Module
- 1.
- The weight vector obtained using mRMR is as follows:
- 2.
- The weight vector obtained using Spearman’s rank correlation coefficient is as follows:
- 3.
- The weight vector obtained using XGBoost feature importance is as follows:
5.2. Improved SSA-LightGBM Module
6. Experiment and Analysis
6.1. Experimental Environment and Model Configuration
6.1.1. Experimental Data and Preprocessing
6.1.2. Evaluation Metrics
- 1.
- The model performance evaluation was completed as follows:
- 2.
- The accuracy of the fit of the situation assessment was completed as follows:
6.2. Feature Optimization Results
6.3. Situation Assessment
6.4. Results and Analysis of Experiments
6.4.1. Ablation Analysis
6.4.2. Convergence Analysis
6.4.3. Effectiveness Evaluation
6.4.4. Analysis of Situation Assessment Results
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Laghari, A.A.; Wu, K.; Laghari, R.A.; Mureed, A.; Khan, A.A. A review and state of art of Internet of Things (IoT). Arch. Comput. Methods Eng. 2021, 29, 1395–1413. [Google Scholar] [CrossRef]
- Jagatheesaperumal, S.K.; Rajkumar, S.; Suresh, J.V.; Gumaei, A.H.; Alhakbani, N.; Uddin, M.Z.; Hassan, M.M. An IoT-Based Framework for Personalized Health Assessment and Recommendations Using Machine Learning. Mathematics 2023, 11, 2758. [Google Scholar] [CrossRef]
- Fu, H.; Manogaran, G.; Wu, K.; Cao, M.; Jiang, S.; Yang, A. Intelligent decision-making of online shopping behavior based on internet of things. Int. J. Inf. Manag. 2020, 50, 515–525. [Google Scholar] [CrossRef]
- Pivoto, D.G.S.; Almeida, L.F.F.d.; Righi, R.d.R.; Rodrigues, J.J.P.C.; Lugli, A.B.; Alberti, A.M. Cyber-physical systems architectures for industrial internet of things applications in Industry 4.0: A literature review. J. Manuf. Syst. 2021, 58, 176–192. [Google Scholar] [CrossRef]
- Liu, J.; Wu, J.; Sun, L. Control method of urban intelligent parking guidance system based on Internet of Things. Comput. Commun. 2020, 153, 279–285. [Google Scholar] [CrossRef]
- Malik, P.K.; Sharma, R.; Singh, R.; Gehlot, A.; Satapathy, S.C.; Alnumay, W.S.; Pelusi, D.; Ghosh, U.; Nayak, J. Industrial Internet of Things and its applications in industry 4.0: State of the art. Comput. Commun. 2021, 166, 125–139. [Google Scholar] [CrossRef]
- Kiran, A.; Mathivanan, P.; Mahdal, M.; Sairam, K.; Chauhan, D.; Talasila, V. Enhancing Data Security in IoT Networks with Blockchain-Based Management and Adaptive Clustering Techniques. Mathematics 2023, 11, 2073. [Google Scholar] [CrossRef]
- Al-Hadhrami, Y.; Hussain, F.K. DDoS attacks in IoT networks: A comprehensive systematic literature review. World Wide Web 2021, 24, 971–1001. [Google Scholar] [CrossRef]
- Ngo, Q.D.; Nguyen, H.T.; Le, V.H.; Nguyen, D. A survey of IoT malware and detection methods based on static features. ICT Express 2020, 6, 280–286. [Google Scholar] [CrossRef]
- Popoola, S.I.; Ande, R.; Adebisi, B.; Gui, G.; Hammoudeh, M.; Jogunola, O. Federated deep learning for zero-day botnet attack detection in IoT-edge devices. IEEE Internet Things J. 2021, 9, 3930–3944. [Google Scholar] [CrossRef]
- Alfandi, O.; Khanji, S.; Ahmad, L.; Khattak, A. A survey on boosting IoT security and privacy through blockchain: Exploration, requirements, and open issues. Clust. Comput. 2021, 24, 37–55. [Google Scholar] [CrossRef]
- Abd El-Latif, A.A.; Abd-El-Atty, B.; Mazurczyk, W.; Carol, F.; Venegas-Andraca, S.E. Secure data encryption based on quantum walks for 5G Internet of Things scenario. IEEE Trans. Netw. Serv. Manag. 2020, 17, 118–131. [Google Scholar] [CrossRef]
- Yang, H.; Zeng, R.; Wang, F.; Xu, G.; Zhang, J. An unsupervised learning-based network threat situation assessment model for internet of things. Secur. Commun. Netw. 2020, 2020, 1–11. [Google Scholar] [CrossRef]
- Yan, J.; Xu, Y.; Cheng, Q.; Jiang, S.; Wang, Q.; Xiao, Y.; Ma, C.; Yan, J.; Wang, X. LightGBM: Accelerated genomically designed crop breeding through ensemble learning. Genome Biol. 2021, 22, 271. [Google Scholar] [CrossRef] [PubMed]
- Malhotra, P.; Singh, Y.; Anand, P.; Bangotra, D.K.; Singh, P.K.; Hong, W. Review of security issues in Internet of Things and artificial intelligence-driven solutions. Sensors 2021, 21, 1809. [Google Scholar] [CrossRef]
- Ahmid, M.; Kazar, O. A Comprehensive Review of the Internet of Things Security. J. Appl. Secur. Res. 2023, 18, 289–305. [Google Scholar] [CrossRef]
- Peter, O.J.; Qureshi, S.; Yusuf, A.; Al-Shomrani, M.; Idowu, A.A. A new mathematical model of COVID-19 using real data from Pakistan. Results Phys. 2021, 24, 104098. [Google Scholar] [CrossRef]
- Ahmed, I.; Modu, G.U.; Yusuf, A.; Kumam, P.; Yusuf, I. A mathematical model of Coronavirus Disease (COVID-19) containing asymptomatic and symptomatic classes. Results Phys. 2021, 21, 103776. [Google Scholar] [CrossRef]
- Bharadwaj, H.K.; Agarwal, A.; Chamola, V.; Lakkaniga, N.R.; Hassija, V.; Guizani, M.; Sikdar, B. A review on the role of machine learning in enabling IoT based healthcare applications. IEEE Access 2021, 9, 38859–38890. [Google Scholar] [CrossRef]
- Churcher, A.; Ullah, R.; Ahmad, J.; ur Rehman, S.; Masood, F.; Gogate, M.; Alqahtani, F.; Nour, B.; Buchanan, W.J. An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks. Sensors 2021, 21, 446. [Google Scholar] [CrossRef]
- Xie, L.; Yan, L.; Zhang, X.; Yang, H. A security situation assessment model of information system for smart mobile devices. Wirel. Commun. Mob. Comput. 2020, 2020, 8886516. [Google Scholar] [CrossRef]
- Liao, Y.; Zhao, G.; Wang, J.; Li, S. Network security situation assessment model based on extended hidden Markov. Math. Probl. Eng. 2020, 2020, 1428056. [Google Scholar] [CrossRef]
- Yang, J.; Yang, Y.; Zheng, L.; Cheng, R.; Lin, S. Network Security Situation Assessment Based on Attack Graph Techniques. J. Phys. Conf. Ser. 2022, 2310, 012071. [Google Scholar] [CrossRef]
- Tao, X.; Kong, K.; Zhao, F.; Cheng, S.; Wang, S. An efficient method for network security situation assessment. Int. J. Distrib. Sens. Netw. 2020, 16, 1550147720971517. [Google Scholar] [CrossRef]
- Yang, H.; Zeng, R.; Xu, G.; Zhang, L. A network security situation assessment method based on adversarial deep learning. Appl. Soft Comput. 2021, 102, 107096. [Google Scholar] [CrossRef]
- Tao, X.; Liu, Z.; Yang, C. An efficient network security situation assessment method based on AE and PMU. Wirel. Commun. Mob. Comput. 2021, 2021, 1173065. [Google Scholar] [CrossRef]
- Yang, H.; Zhang, Z.; Xie, L.; Zhang, L. Network security situation assessment with network attack behavior classification. Int. J. Intell. Syst. 2022, 37, 6909–6927. [Google Scholar] [CrossRef]
- Zhang, R.; Liu, M.; Pan, Z. Network Security Situation Assessment Based on Improved WOA-SVM. IEEE Access 2022, 10, 96273–96283. [Google Scholar] [CrossRef]
- Liu, Z.; Yang, C.; Liu, Y.; Ding, Y. A BIPMU-based network security situation assessment method for wireless network. Comput. Stand. Interfaces 2023, 83, 103661. [Google Scholar] [CrossRef]
- Gharehchopogh, F.S.; Namazi, M.; Ebrahimi, L.; Abdollahzadeh, B. Advances in sparrow search algorithm: A comprehensive survey. Arch. Comput. Methods Eng. 2023, 30, 427–455. [Google Scholar] [CrossRef]
- Luo, Y.; Zhou, R.; Liu, J.; Cao, Y.; Ding, X. A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map. Nonlinear Dyn. 2018, 93, 1165–1181. [Google Scholar] [CrossRef]
- Han, X.; Wu, B.; Wang, D. Firefly algorithm with disturbance-factor-based particle filter for seismic random noise attenuation. IEEE Geosci. Remote Sens. Lett. 2019, 17, 1268–1272. [Google Scholar] [CrossRef]
Approach | Year | Author | Characteristics |
---|---|---|---|
Mathematical Model | 2020 | Lixia Xie et al. [21] | Assessment model based on an improved BP network. |
Mathematical Model | 2020 | Yiwei Liao et al. [22] | Awareness technology based on multisource heterogeneous information. |
Mathematical Model | 2022 | Jinwei Yang et al. [23] | Assessment model based on the combination of intrusion detection. |
Machine Learning | 2020 | Xiao-ling Tao et al. [24] | Using SAE and BPNN to evaluate a security situation. |
Machine Learning | 2021 | Hongyu Yang et al. [25] | Using DAE for feature learning and accurately identifying attacks. |
Machine Learning | 2021 | Xiao-ling Tao et al. [26] | Using AE and the minimalist memory unit. |
Machine Learning | 2022 | Hongyu Yang et al. [27] | Utilizing parallel feature extraction networks, BiGRU, and attention mechanisms. |
Machine Learning | 2022 | Ran Zhang et al. [28] | Using improved WOA-SVM. |
Machine Learning | 2023 | Ziyi Liu et al. [29] | Assessment model based on BIPMU. |
Threshold | Number of Features | Accuracy | Precision | Recall | F1 |
---|---|---|---|---|---|
0.01 | 57 | 99.37 | 99.39 | 99.37 | 99.38 |
0.03 | 56 | 99.49 | 99.49 | 99.49 | 99.49 |
0.06 | 52 | 99.61 | 99.62 | 99.61 | 99.61 |
0.10 | 42 | 99.55 | 99.55 | 99.55 | 99.55 |
0.14 | 33 | 98.92 | 99.13 | 98.92 | 99.01 |
0.19 | 22 | 99.47 | 99.47 | 99.47 | 99.47 |
0.25 | 16 | 99.26 | 99.27 | 99.27 | 99.26 |
0.33 | 11 | 98.92 | 98.97 | 98.92 | 98.94 |
0.40 | 5 | 96.65 | 96.84 | 96.65 | 96.72 |
Attack Type | Threat Factor |
---|---|
Normal | 1 |
Analysis | 2 |
Reconnaiss | 3 |
Fuzzers | 4 |
Dos | 5 |
Generic | 6 |
Shellcode | 7 |
Worms | 8 |
Exploits | 9 |
Backdoor | 10 |
Parameter | Value Range | Precision | Optimal Value |
---|---|---|---|
max_depth | [8, 35] | 1 | 28 |
num_leaves | [5, 100] | 1 | 44 |
bagging_fraction | [0.1, 0.95] | 0.01 | 0.95 |
feature_fraction | [0.1, 0.95] | 0.01 | 0.95 |
n_estimators | [5, 100] | 1 | 79 |
lambda_l1 | [0, 0.9] | 0.01 | 0.9 |
lambda_l2 | [0, 40] | 1 | 19 |
learning_rate | [0.02, 0.2] | 0.01 | 0.2 |
Model | Accuracy | Precision | Recall | F1 |
---|---|---|---|---|
SVM | 95.75 | 95.33 | 95.75 | 95.42 |
RF | 96.27 | 96.32 | 96.26 | 96.23 |
KNN | 96.27 | 96.67 | 96.27 | 96.4 |
GBDT | 96.55 | 96.54 | 96.55 | 96.53 |
XGBoost | 97.05 | 97.06 | 97.05 | 97.05 |
LightGBM | 97.76 | 97.82 | 97.76 | 97.76 |
Our approach | 99.34 | 99.34 | 99.35 | 99.34 |
Model | MRE | MAE | MSE | RMSE |
---|---|---|---|---|
SVM | 0.00325 | 0.00294 | 0.00002 | 0.00396 |
RF | 0.01275 | 0.01425 | 0.00062 | 0.02489 |
KNN | 0.00505 | 0.00764 | 0.00009 | 0.00979 |
GBDT | 0.00639 | 0.0086 | 0.00012 | 0.01087 |
XGBoost | 0.0057 | 0.00871 | 0.00018 | 0.01175 |
LightGBM | 0.00418 | 0.00546 | 0.00007 | 0.00854 |
Our approach | 0.00133 | 0.00192 | 0.00001 | 0.00374 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Xie, B.; Li, F.; Li, H.; Wang, L.; Yang, A. Enhanced Internet of Things Security Situation Assessment Model with Feature Optimization and Improved SSA-LightGBM. Mathematics 2023, 11, 3617. https://doi.org/10.3390/math11163617
Xie B, Li F, Li H, Wang L, Yang A. Enhanced Internet of Things Security Situation Assessment Model with Feature Optimization and Improved SSA-LightGBM. Mathematics. 2023; 11(16):3617. https://doi.org/10.3390/math11163617
Chicago/Turabian StyleXie, Baoshan, Fei Li, Hao Li, Liya Wang, and Aimin Yang. 2023. "Enhanced Internet of Things Security Situation Assessment Model with Feature Optimization and Improved SSA-LightGBM" Mathematics 11, no. 16: 3617. https://doi.org/10.3390/math11163617
APA StyleXie, B., Li, F., Li, H., Wang, L., & Yang, A. (2023). Enhanced Internet of Things Security Situation Assessment Model with Feature Optimization and Improved SSA-LightGBM. Mathematics, 11(16), 3617. https://doi.org/10.3390/math11163617