Abstract
Security issues of unmanned aerial vehicles (UAVs) have received great attention. A new dataset named UKM-IDS20 has been recently developed for intrusion detection in UAVs to distinguish between abnormal and normal behaviors. The feature selection process in datasets is essential in improving IDSs performance. Decreasing features reduces the complexity of the storage and executive load. This paper investigates the influence of feature selection IDS for UAV networks. To achieve our goal, we propose the IGC-MLP algorithm. In the beginning, the algorithm utilized feature selection algorithms to determine the optimal features. Then, the resulting features are applied to the multilayer perception classification model. We evaluate our algorithm in two scenarios (15 and 20 features). The evaluation demonstrates that our model achieves better accuracy (99.93\(\%\)). Consequently, reducing the number of features reduces memory size and CPU time needed for intrusion detection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Condomines, J.-P., Zhang, R., Larrieu, N.: Network intrusion detection system for UAV ad-hoc communication: from methodology design to real test validation. Ad Hoc Netw. 90, 101759 (2019)
Oliveira, N., Praca, I., Maia, E., Sousa, O.: Intelligent cyber attack detection and classification for network-based intrusion detection systems. Appl. Sci. 11(4), 1674 (2021)
Balogun, A.O., et al.: A novel rank aggregation-based hybrid multifilter wrapper feature selection method in software defect prediction. In: Computational Intelligence and Neuroscience, 2021 (2021)
Bangui, H., Buhnova, B.: Recent advances in machine-learning driven intrusion detection in transportation: survey. Procedia Comput. Sci. 184, 877–886 (2021)
Choudhary, G., Sharma, V., You, I., Yim, K., Chen, I.-R., Cho, J.-H.: Intrusion detection systems for networked unmanned aerial vehicles: a survey. In: 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 560–565 (2018)
Yadav, V., Rahul, M., Yadav, R.: A new efficient method for the detection of intrusion in 5g and beyond networks using ml (2021)
Reza Fotohi and Somayyeh Firoozi Bari: A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and hopfield neural network (HNN) algorithms. J. Supercomput. 76(9), 6860–6886 (2020)
Al-Daweri, M.S., Abdullah, S., Ariffin, K.A.Z.: An adaptive method and a new dataset UKM-ids20, for the network intrusion detection system. Comput. Commun. 180, 57–76 (2021)
Ravi, N., Ramachandran, G.: A robust intrusion detection system using machine learning techniques for manet. Int. J. Knowl.-Based Intell. Eng. Syst. 24(3), 253–260 (2020)
Li, X., Zhongyuan, H., Mengfan, X., Wang, Y., Ma, J.: Transfer learning based intrusion detection scheme for internet of vehicles. Inf. Sci. 547, 119–135 (2021)
Sedjelmaci, H., Senouci, S.M., Ansari, N.: Intrusion detection and ejection framework against lethal attacks in UAV-aided networks: a Bayesian game-theoretic methodology. IEEE Trans. Intell. Transp. Syst. 18(5), 1143–1153 (2016)
Małowidzki, M., Berezinski, P., Mazur, M.: Network intrusion detection: half a kingdom for a good dataset. In: Proceedings of NATO STO SAS-139 Workshop, Portugal (2015)
Moustafa, N., Slay, J.: Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1–6. IEEE (2015)
Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J. Comput. Sci. 25, 152–160 (2018)
Ring, M., Wunderlich, S., Scheuring, D., Landes, D., Hotho, A.: A survey of network-based intrusion detection data sets. Comput. Secur. 86, 147–167 (2019)
Zhang, J., Zulkernine, M., Haque, A.: Random-forests-based network intrusion detection systems. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 38(5), 649–659 (2008)
Mohammed, A.: Anomalous network packet detection. Master’s thesis (2015)
Whelan, J., Sangarapillai, T., Minawi, O., Almehmadi, A., El-Khatib, K.: Novelty-based intrusion detection of sensor attacks on unmanned aerial vehicles. In: Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, pp. 23–28 (2020)
Koroniotis, N., Moustafa, N., Sitnikova, E.: A new network forensic framework based on deep learning for internet of things networks: a particle deep framework. Futur. Gener. Comput. Syst. 110, 91–106 (2020)
Mokbal, F.M.M., Wang, D., Osman, M., Yang, P., Alsamhi, S.H.: An efficient intrusion detection framework based on embedding feature selection and ensemble learning technique. Int. Arab J. Inf. Technol. 19(2), 237–248 (2022)
Aversano, L., Bernardi, M.L., Cimitile, M., Pecori, R., Veltri, L.: Effective anomaly detection using deep learning in IoT systems. In: Wireless Communications and Mobile Computing (2021)
Samaras, S., et al.: Deep learning on multi sensor data for counter UAV applications-a systematic review. Sensors 19(22), 4837 (2019)
Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q.: A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 41–50 (2018)
Sarkar, S.S., Sheikh, K.H., Mahanty, A., Mali, K., Ghosh, A., Sarkar, R.: A harmony search-based wrapper-filter feature selection approach for microstructural image classification. Int. Mat. Manuf. Innovat. 10(1), 1–19 (2021)
Yang, J., Li, T., Liang, G., Wang, Y.P., Gao, T.Y., Zhu, F.D.: Spam transaction attack detection model based on GRU and WGAN-div. Comput. Commun. 161, 172–182 (2020)
Kumari, A., Gupta, R., Tanwar, S., Kumar, N.: A taxonomy of blockchain-enabled softwarization for secure UAV network. Comput. Commun. 161, 304–323 (2020)
Abdulhadi, H.M.T., Talabani, H.S.: Comparative study of supervised machine learning algorithms on thoracic surgery patients based on ranker feature algorithms. UHD J. Sci. Technol. 5(2), 66–74 (2021)
Aicha Idriss Hentati and Lamia Chaari Fourati: Comprehensive survey of UAVs communication networks. Comput. Stand. Interf. 72, 103451 (2020)
Ahmed, M., Cox, D., Simpson, B., Aloufi, A.: Ecu-ioft: a dataset for analysing cyber-attacks on internet of flying things. Appl. Sci. 12(4), 1990 (2022)
Zaidi, S., Atiquzzaman, M., Calafate, C.T.: Internet of flying things (IoFT): a survey. Comput. Commun. 165, 53–74 (2021)
Mohammed, T.A., Mohammed, A.B.: Security architectures for sensitive data in cloud computing. New York, NY, USA. Association for Computing Machinery (2020)
El-Rewini, Z., Sadatsharan, K., Sugunaraj, N., Selvaraj, D.F., Plathottam, S.J., Ranganathan, P.: Cybersecurity attacks in vehicular sensors. IEEE Sensors J. 20(22), 13752–13767 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Mohammed, A.B., Chaari Fourati, L., Fakhrudeen, A.M. (2023). A Comparative Study of Attribute Selection Algorithms on Intrusion Detection System in UAVs: A Case Study of UKM-IDS20 Dataset. In: Kallel, S., Jmaiel, M., Zulkernine, M., Hadj Kacem, A., Cuppens, F., Cuppens, N. (eds) Risks and Security of Internet and Systems. CRiSIS 2022. Lecture Notes in Computer Science, vol 13857. Springer, Cham. https://doi.org/10.1007/978-3-031-31108-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-31108-6_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-31107-9
Online ISBN: 978-3-031-31108-6
eBook Packages: Computer ScienceComputer Science (R0)