SlideShare a Scribd company logo
1 of 12
Injection attack detection using machine
learning for smart iot
applications
Authors: Tarek Gaber, Amir El-Ghamry, Aboul Ella Hassanien
Article history:
Received 29 August 2021
Received in revised form 18 February 2022
Accepted 10 March 2022
Available online 16 March 2022
Published by Elsevier B.V. Physical Communication journal
1
Table of contents:
Definition of an Injection Attack
Cleaning and preprocessing
Feature selection
Proposed method
Classification
Evaluation metrics
Comparison with literature
Results
2
Injection Attack:
 Injection attacks refer to a wide range of attack spectrums through which an adversary can submit various types of
input (code or data) to an application.
 ARP attack is a common and effective way to disturb IoT networks. The ARP attack enables adversaries to intercept
and change data exchanged between victim nodes in a smart IoT network.
 The fragmentation attack, in which an intruder can exploit the design flaw in the Wi-Fi’s frame fragmentation feature
to execute a keystream retrieval attack.
 ChopChop attack, in which the adversary can derive large portions of the keystream, which allows him to create and
embed malicious frames into the network.
3
Proposed method:
 The proposed method aims at improving the accuracy of the detection of injection attacks while using fewer features.
Dataset: AWID
Scenario 2: When using the constant removal technique, the number of features to be used is 13.
Scenario 1: The number of features used in the classification after the data cleaning process is 76 features.
Scenario 3: When using both constant removal and recursive feature elimination, the resulting number of features
reduced to 8 features.
Classification algorithm: SVM, RF, DT Evaluation metrics: Accuracy, Precision, Recall, F1-Score
4
Cleaning and preprocessing:
 AWID dataset contains continuous and
discrete data types as well as symbolic
types with a flexible value range. In
addition as any intrusion detection
dataset.
 Using the raw dataset will be difficult
for the learning process. Therefore,
cleaning and preprocessing techniques
should be applied first.
5
Feature selection:
 Feature selection is the process of reducing data dimensionality in order to enhance machine learning performance
and reduce computation time.
 Constant removal is a simple feature
selection approach that belongs to
invariant filter-based methods which can
be fed into any machine learning (ML)
models. It can be categorized as variance-
based feature selection.
 Recursive feature elimination (RFE) is a
wrapper-based feature selection
approach that uses a search mechanism
to reduce the feature set.
6
Classification:
 Decision Tree (DT): easy to interpret, understand, and visualize. It mimics the human thinking power that helps to
make good interpretations, can predict the class by learning decision rules and is not largely influenced by outliers.
 Random Forest (RF): robust and highly accurate. It creates multiple decision trees and selects the data sample
randomly from the training set, obtaining the prediction from individual decision trees and getting the most votes.
The high accuracy of the RF algorithm is based on the number of used decision trees, and it does not suffer from
overfitting.
 Support Vector Machine (SVM): good generalization capabilities, which prevent it from over-fitting. Has a nature of
Convex Optimization which is very helpful for optimal results.
7
Evaluation metrics
• True Positive (TP): # of records successfully recognized as injection attack.
• True Negative (TN): # of records classified as a normal class.
• False Positive (FP): # of records wrongly classified as injection attack
• False Negative (FN): # of injection attacks undetected by IDS
 The performance of the proposed intrusion detect method has been evaluated using the confusion matrix consisting
of: True Positive (TP), True Negative (TN), False Positive (FP) and False Negative (FN).
 Using the parameters of the confusion matrix above, the following evaluation metrics have been used in this study:
Accuracy, Precision, Recall, and F1 metrics.
8
Evaluation metrics
 Precision: The ratio of the number of positive records that are correctly classified to the total number of positive
records. This means that the lower the false positive rate, the higher the precision result. The precision measure is a
good measure when the cost of a false positive is high.
 Accuracy: The ratio of number of records that are correctly classified to the total number of records. The higher the
accuracy, the better the model applied.
 Recall (Sensitivity): the ratio of the number of positive records that are classified correctly to the total number of
classifications in the actual class. This means that the higher the FN rate, the lower the value of the recall. The recall
measure is important when we want to select the best model in case the FN rate is very high.
 F1-Score: This measure is known as the harmonic mean of the precision and the recall measures. It is considered a
good evaluation measure for imbalanced data.
9
Results:
Algorithm Accuracy Precision Recall F1 Score
Decision tree 0.9681 0.6731 0.8500 0.7513
Random forest 0.9888 0.9511 0.8470 0.8960
SVM 0.9758 0.7008 0.9999 0.8240
Algorithm Accuracy Precision Recall F1 Score
Decision tree 0.9908 0.9539 0.8807 0.9158
Random forest 0.9887 0.9507 0.8439 0.8941
SVM 0.9757 0.7001 0.9999 0.8235
Algorithm Accuracy Precision Recall F1 Score
Decision tree 0.9891 0.9521 0.8500 0.8982
Random forest 0.9891 0.9537 0.8492 0.8985
SVM 0.9756 0.6989 0.9999 0.8227
Classification results using 13 features.
Classification results using 8 features.
Classification results using 76 features.
10
Comparison with literature:
 Mutual information is a technique that applies information gain to select a feature subset from an original feature set.
 In Extra Trees, each individual tree has a random sample of a specific number of features, and the algorithm selects the best
feature to split the data.
 Feature Selection Comparison: The proposed feature selection method was compared with two well-known feature
selection techniques: mutual information and Extra Tree (Extremely Random Tree Classifier).
Algorithm Accuracy Precision Recall F1 Score
Decision tree 0.9889 0.9469 0.8507 0.8948
Random forest 0.9821 0.9535 0.8431 0.8932
SVM 0.9684 0.6432 0.9936 0.7809
Algorithm Accuracy Precision Recall F1 Score
Decision tree 0.9823 0.9447 0.8507 0.8939
Random forest 0.9860 0.9238 0.8418 0.8862
SVM 0.9744 0.6990 0.9998 0.8138
Mutual information-based results of 8 features.
Extra Tree-based results of 8 features.
11
Comparison with literature:
 Intrusion detection comparison: It discusses a comparison with work in the literature that is related to the proposed
method.
 The work in [25] utilized a ladder network that is based on Stacked Auto-Encoder (SAE) to select optimal attributes
from a list of features and then to perform network traffic classification. 82.79% accuracy.
 The work in [27] to detect intrusion, the authors followed a similar preprocessing approach by removing features
with missing values and zero variance, which led to a set of 71 features. Then they applied a Deep Neural Network
(DNN) model with seven hidden layers. 99.99% accuracy.
 In the work [28], the authors utilized ensemble learning algorithms and performed feature analysis and correlations
to remove and combine features, which ended up with 18 features. For injection attacks, they achieved 44%
precision, 93% recall, and 60% F1- Score.
12

More Related Content

Similar to Injection Attack detection using ML for

Intrusion Detection System for Classification of Attacks with Cross Validation
Intrusion Detection System for Classification of Attacks with Cross ValidationIntrusion Detection System for Classification of Attacks with Cross Validation
Intrusion Detection System for Classification of Attacks with Cross Validationinventionjournals
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...CloudTechnologies
 
IRJET - An User Friendly Interface for Data Preprocessing and Visualizati...
IRJET -  	  An User Friendly Interface for Data Preprocessing and Visualizati...IRJET -  	  An User Friendly Interface for Data Preprocessing and Visualizati...
IRJET - An User Friendly Interface for Data Preprocessing and Visualizati...IRJET Journal
 
Improving the performance of Intrusion detection systems
Improving the performance of Intrusion detection systemsImproving the performance of Intrusion detection systems
Improving the performance of Intrusion detection systemsyasmen essam
 
A novel ensemble modeling for intrusion detection system
A novel ensemble modeling for intrusion detection system A novel ensemble modeling for intrusion detection system
A novel ensemble modeling for intrusion detection system IJECEIAES
 
Artificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern RecognitionArtificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern RecognitionDr. Amarjeet Singh
 
MULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSION
MULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSIONMULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSION
MULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSIONIJNSA Journal
 
Cyb 5675 class project final
Cyb 5675   class project finalCyb 5675   class project final
Cyb 5675 class project finalCraig Cannon
 
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...Sagar Deogirkar
 
Machine Learning-Based Phishing Detection
Machine Learning-Based Phishing DetectionMachine Learning-Based Phishing Detection
Machine Learning-Based Phishing DetectionIRJET Journal
 
Analysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOTAnalysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOTIJERA Editor
 
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set ReductionIntrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set ReductionIOSR Journals
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...IJNSA Journal
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...IJNSA Journal
 
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...IRJET Journal
 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxvoversbyobersby
 
Feature Subset Selection for High Dimensional Data using Clustering Techniques
Feature Subset Selection for High Dimensional Data using Clustering TechniquesFeature Subset Selection for High Dimensional Data using Clustering Techniques
Feature Subset Selection for High Dimensional Data using Clustering TechniquesIRJET Journal
 
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET Journal
 

Similar to Injection Attack detection using ML for (20)

Intrusion Detection System for Classification of Attacks with Cross Validation
Intrusion Detection System for Classification of Attacks with Cross ValidationIntrusion Detection System for Classification of Attacks with Cross Validation
Intrusion Detection System for Classification of Attacks with Cross Validation
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...
 
IRJET - An User Friendly Interface for Data Preprocessing and Visualizati...
IRJET -  	  An User Friendly Interface for Data Preprocessing and Visualizati...IRJET -  	  An User Friendly Interface for Data Preprocessing and Visualizati...
IRJET - An User Friendly Interface for Data Preprocessing and Visualizati...
 
Improving the performance of Intrusion detection systems
Improving the performance of Intrusion detection systemsImproving the performance of Intrusion detection systems
Improving the performance of Intrusion detection systems
 
A novel ensemble modeling for intrusion detection system
A novel ensemble modeling for intrusion detection system A novel ensemble modeling for intrusion detection system
A novel ensemble modeling for intrusion detection system
 
Artificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern RecognitionArtificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern Recognition
 
MULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSION
MULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSIONMULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSION
MULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSION
 
Cyb 5675 class project final
Cyb 5675   class project finalCyb 5675   class project final
Cyb 5675 class project final
 
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
 
Machine Learning-Based Phishing Detection
Machine Learning-Based Phishing DetectionMachine Learning-Based Phishing Detection
Machine Learning-Based Phishing Detection
 
Analysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOTAnalysis on different Data mining Techniques and algorithms used in IOT
Analysis on different Data mining Techniques and algorithms used in IOT
 
1725 1731
1725 17311725 1731
1725 1731
 
1725 1731
1725 17311725 1731
1725 1731
 
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set ReductionIntrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
 
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docx
 
Feature Subset Selection for High Dimensional Data using Clustering Techniques
Feature Subset Selection for High Dimensional Data using Clustering TechniquesFeature Subset Selection for High Dimensional Data using Clustering Techniques
Feature Subset Selection for High Dimensional Data using Clustering Techniques
 
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
 

Recently uploaded

Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...SUHANI PANDEY
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.soniya singh
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...SUHANI PANDEY
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
 

Recently uploaded (20)

Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 

Injection Attack detection using ML for

  • 1. Injection attack detection using machine learning for smart iot applications Authors: Tarek Gaber, Amir El-Ghamry, Aboul Ella Hassanien Article history: Received 29 August 2021 Received in revised form 18 February 2022 Accepted 10 March 2022 Available online 16 March 2022 Published by Elsevier B.V. Physical Communication journal 1
  • 2. Table of contents: Definition of an Injection Attack Cleaning and preprocessing Feature selection Proposed method Classification Evaluation metrics Comparison with literature Results 2
  • 3. Injection Attack:  Injection attacks refer to a wide range of attack spectrums through which an adversary can submit various types of input (code or data) to an application.  ARP attack is a common and effective way to disturb IoT networks. The ARP attack enables adversaries to intercept and change data exchanged between victim nodes in a smart IoT network.  The fragmentation attack, in which an intruder can exploit the design flaw in the Wi-Fi’s frame fragmentation feature to execute a keystream retrieval attack.  ChopChop attack, in which the adversary can derive large portions of the keystream, which allows him to create and embed malicious frames into the network. 3
  • 4. Proposed method:  The proposed method aims at improving the accuracy of the detection of injection attacks while using fewer features. Dataset: AWID Scenario 2: When using the constant removal technique, the number of features to be used is 13. Scenario 1: The number of features used in the classification after the data cleaning process is 76 features. Scenario 3: When using both constant removal and recursive feature elimination, the resulting number of features reduced to 8 features. Classification algorithm: SVM, RF, DT Evaluation metrics: Accuracy, Precision, Recall, F1-Score 4
  • 5. Cleaning and preprocessing:  AWID dataset contains continuous and discrete data types as well as symbolic types with a flexible value range. In addition as any intrusion detection dataset.  Using the raw dataset will be difficult for the learning process. Therefore, cleaning and preprocessing techniques should be applied first. 5
  • 6. Feature selection:  Feature selection is the process of reducing data dimensionality in order to enhance machine learning performance and reduce computation time.  Constant removal is a simple feature selection approach that belongs to invariant filter-based methods which can be fed into any machine learning (ML) models. It can be categorized as variance- based feature selection.  Recursive feature elimination (RFE) is a wrapper-based feature selection approach that uses a search mechanism to reduce the feature set. 6
  • 7. Classification:  Decision Tree (DT): easy to interpret, understand, and visualize. It mimics the human thinking power that helps to make good interpretations, can predict the class by learning decision rules and is not largely influenced by outliers.  Random Forest (RF): robust and highly accurate. It creates multiple decision trees and selects the data sample randomly from the training set, obtaining the prediction from individual decision trees and getting the most votes. The high accuracy of the RF algorithm is based on the number of used decision trees, and it does not suffer from overfitting.  Support Vector Machine (SVM): good generalization capabilities, which prevent it from over-fitting. Has a nature of Convex Optimization which is very helpful for optimal results. 7
  • 8. Evaluation metrics • True Positive (TP): # of records successfully recognized as injection attack. • True Negative (TN): # of records classified as a normal class. • False Positive (FP): # of records wrongly classified as injection attack • False Negative (FN): # of injection attacks undetected by IDS  The performance of the proposed intrusion detect method has been evaluated using the confusion matrix consisting of: True Positive (TP), True Negative (TN), False Positive (FP) and False Negative (FN).  Using the parameters of the confusion matrix above, the following evaluation metrics have been used in this study: Accuracy, Precision, Recall, and F1 metrics. 8
  • 9. Evaluation metrics  Precision: The ratio of the number of positive records that are correctly classified to the total number of positive records. This means that the lower the false positive rate, the higher the precision result. The precision measure is a good measure when the cost of a false positive is high.  Accuracy: The ratio of number of records that are correctly classified to the total number of records. The higher the accuracy, the better the model applied.  Recall (Sensitivity): the ratio of the number of positive records that are classified correctly to the total number of classifications in the actual class. This means that the higher the FN rate, the lower the value of the recall. The recall measure is important when we want to select the best model in case the FN rate is very high.  F1-Score: This measure is known as the harmonic mean of the precision and the recall measures. It is considered a good evaluation measure for imbalanced data. 9
  • 10. Results: Algorithm Accuracy Precision Recall F1 Score Decision tree 0.9681 0.6731 0.8500 0.7513 Random forest 0.9888 0.9511 0.8470 0.8960 SVM 0.9758 0.7008 0.9999 0.8240 Algorithm Accuracy Precision Recall F1 Score Decision tree 0.9908 0.9539 0.8807 0.9158 Random forest 0.9887 0.9507 0.8439 0.8941 SVM 0.9757 0.7001 0.9999 0.8235 Algorithm Accuracy Precision Recall F1 Score Decision tree 0.9891 0.9521 0.8500 0.8982 Random forest 0.9891 0.9537 0.8492 0.8985 SVM 0.9756 0.6989 0.9999 0.8227 Classification results using 13 features. Classification results using 8 features. Classification results using 76 features. 10
  • 11. Comparison with literature:  Mutual information is a technique that applies information gain to select a feature subset from an original feature set.  In Extra Trees, each individual tree has a random sample of a specific number of features, and the algorithm selects the best feature to split the data.  Feature Selection Comparison: The proposed feature selection method was compared with two well-known feature selection techniques: mutual information and Extra Tree (Extremely Random Tree Classifier). Algorithm Accuracy Precision Recall F1 Score Decision tree 0.9889 0.9469 0.8507 0.8948 Random forest 0.9821 0.9535 0.8431 0.8932 SVM 0.9684 0.6432 0.9936 0.7809 Algorithm Accuracy Precision Recall F1 Score Decision tree 0.9823 0.9447 0.8507 0.8939 Random forest 0.9860 0.9238 0.8418 0.8862 SVM 0.9744 0.6990 0.9998 0.8138 Mutual information-based results of 8 features. Extra Tree-based results of 8 features. 11
  • 12. Comparison with literature:  Intrusion detection comparison: It discusses a comparison with work in the literature that is related to the proposed method.  The work in [25] utilized a ladder network that is based on Stacked Auto-Encoder (SAE) to select optimal attributes from a list of features and then to perform network traffic classification. 82.79% accuracy.  The work in [27] to detect intrusion, the authors followed a similar preprocessing approach by removing features with missing values and zero variance, which led to a set of 71 features. Then they applied a Deep Neural Network (DNN) model with seven hidden layers. 99.99% accuracy.  In the work [28], the authors utilized ensemble learning algorithms and performed feature analysis and correlations to remove and combine features, which ended up with 18 features. For injection attacks, they achieved 44% precision, 93% recall, and 60% F1- Score. 12