Skip to main content

A Comparative Study of Attribute Selection Algorithms on Intrusion Detection System in UAVs: A Case Study of UKM-IDS20 Dataset

  • Conference paper
  • First Online:
Risks and Security of Internet and Systems (CRiSIS 2022)

Abstract

Security issues of unmanned aerial vehicles (UAVs) have received great attention. A new dataset named UKM-IDS20 has been recently developed for intrusion detection in UAVs to distinguish between abnormal and normal behaviors. The feature selection process in datasets is essential in improving IDSs performance. Decreasing features reduces the complexity of the storage and executive load. This paper investigates the influence of feature selection IDS for UAV networks. To achieve our goal, we propose the IGC-MLP algorithm. In the beginning, the algorithm utilized feature selection algorithms to determine the optimal features. Then, the resulting features are applied to the multilayer perception classification model. We evaluate our algorithm in two scenarios (15 and 20 features). The evaluation demonstrates that our model achieves better accuracy (99.93\(\%\)). Consequently, reducing the number of features reduces memory size and CPU time needed for intrusion detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Condomines, J.-P., Zhang, R., Larrieu, N.: Network intrusion detection system for UAV ad-hoc communication: from methodology design to real test validation. Ad Hoc Netw. 90, 101759 (2019)

    Article  Google Scholar 

  2. Oliveira, N., Praca, I., Maia, E., Sousa, O.: Intelligent cyber attack detection and classification for network-based intrusion detection systems. Appl. Sci. 11(4), 1674 (2021)

    Article  Google Scholar 

  3. Balogun, A.O., et al.: A novel rank aggregation-based hybrid multifilter wrapper feature selection method in software defect prediction. In: Computational Intelligence and Neuroscience, 2021 (2021)

    Google Scholar 

  4. Bangui, H., Buhnova, B.: Recent advances in machine-learning driven intrusion detection in transportation: survey. Procedia Comput. Sci. 184, 877–886 (2021)

    Article  Google Scholar 

  5. Choudhary, G., Sharma, V., You, I., Yim, K., Chen, I.-R., Cho, J.-H.: Intrusion detection systems for networked unmanned aerial vehicles: a survey. In: 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 560–565 (2018)

    Google Scholar 

  6. Yadav, V., Rahul, M., Yadav, R.: A new efficient method for the detection of intrusion in 5g and beyond networks using ml (2021)

    Google Scholar 

  7. Reza Fotohi and Somayyeh Firoozi Bari: A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and hopfield neural network (HNN) algorithms. J. Supercomput. 76(9), 6860–6886 (2020)

    Article  Google Scholar 

  8. Al-Daweri, M.S., Abdullah, S., Ariffin, K.A.Z.: An adaptive method and a new dataset UKM-ids20, for the network intrusion detection system. Comput. Commun. 180, 57–76 (2021)

    Article  Google Scholar 

  9. Ravi, N., Ramachandran, G.: A robust intrusion detection system using machine learning techniques for manet. Int. J. Knowl.-Based Intell. Eng. Syst. 24(3), 253–260 (2020)

    Google Scholar 

  10. Li, X., Zhongyuan, H., Mengfan, X., Wang, Y., Ma, J.: Transfer learning based intrusion detection scheme for internet of vehicles. Inf. Sci. 547, 119–135 (2021)

    Article  Google Scholar 

  11. Sedjelmaci, H., Senouci, S.M., Ansari, N.: Intrusion detection and ejection framework against lethal attacks in UAV-aided networks: a Bayesian game-theoretic methodology. IEEE Trans. Intell. Transp. Syst. 18(5), 1143–1153 (2016)

    Article  Google Scholar 

  12. Małowidzki, M., Berezinski, P., Mazur, M.: Network intrusion detection: half a kingdom for a good dataset. In: Proceedings of NATO STO SAS-139 Workshop, Portugal (2015)

    Google Scholar 

  13. Moustafa, N., Slay, J.: Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1–6. IEEE (2015)

    Google Scholar 

  14. Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J. Comput. Sci. 25, 152–160 (2018)

    Google Scholar 

  15. Ring, M., Wunderlich, S., Scheuring, D., Landes, D., Hotho, A.: A survey of network-based intrusion detection data sets. Comput. Secur. 86, 147–167 (2019)

    Article  Google Scholar 

  16. Zhang, J., Zulkernine, M., Haque, A.: Random-forests-based network intrusion detection systems. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 38(5), 649–659 (2008)

    Google Scholar 

  17. Mohammed, A.: Anomalous network packet detection. Master’s thesis (2015)

    Google Scholar 

  18. Whelan, J., Sangarapillai, T., Minawi, O., Almehmadi, A., El-Khatib, K.: Novelty-based intrusion detection of sensor attacks on unmanned aerial vehicles. In: Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, pp. 23–28 (2020)

    Google Scholar 

  19. Koroniotis, N., Moustafa, N., Sitnikova, E.: A new network forensic framework based on deep learning for internet of things networks: a particle deep framework. Futur. Gener. Comput. Syst. 110, 91–106 (2020)

    Article  Google Scholar 

  20. Mokbal, F.M.M., Wang, D., Osman, M., Yang, P., Alsamhi, S.H.: An efficient intrusion detection framework based on embedding feature selection and ensemble learning technique. Int. Arab J. Inf. Technol. 19(2), 237–248 (2022)

    Google Scholar 

  21. Aversano, L., Bernardi, M.L., Cimitile, M., Pecori, R., Veltri, L.: Effective anomaly detection using deep learning in IoT systems. In: Wireless Communications and Mobile Computing (2021)

    Google Scholar 

  22. Samaras, S., et al.: Deep learning on multi sensor data for counter UAV applications-a systematic review. Sensors 19(22), 4837 (2019)

    Article  Google Scholar 

  23. Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q.: A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 41–50 (2018)

    Article  Google Scholar 

  24. Sarkar, S.S., Sheikh, K.H., Mahanty, A., Mali, K., Ghosh, A., Sarkar, R.: A harmony search-based wrapper-filter feature selection approach for microstructural image classification. Int. Mat. Manuf. Innovat. 10(1), 1–19 (2021)

    Article  Google Scholar 

  25. Yang, J., Li, T., Liang, G., Wang, Y.P., Gao, T.Y., Zhu, F.D.: Spam transaction attack detection model based on GRU and WGAN-div. Comput. Commun. 161, 172–182 (2020)

    Article  Google Scholar 

  26. Kumari, A., Gupta, R., Tanwar, S., Kumar, N.: A taxonomy of blockchain-enabled softwarization for secure UAV network. Comput. Commun. 161, 304–323 (2020)

    Article  Google Scholar 

  27. Abdulhadi, H.M.T., Talabani, H.S.: Comparative study of supervised machine learning algorithms on thoracic surgery patients based on ranker feature algorithms. UHD J. Sci. Technol. 5(2), 66–74 (2021)

    Article  Google Scholar 

  28. Aicha Idriss Hentati and Lamia Chaari Fourati: Comprehensive survey of UAVs communication networks. Comput. Stand. Interf. 72, 103451 (2020)

    Article  Google Scholar 

  29. Ahmed, M., Cox, D., Simpson, B., Aloufi, A.: Ecu-ioft: a dataset for analysing cyber-attacks on internet of flying things. Appl. Sci. 12(4), 1990 (2022)

    Article  Google Scholar 

  30. Zaidi, S., Atiquzzaman, M., Calafate, C.T.: Internet of flying things (IoFT): a survey. Comput. Commun. 165, 53–74 (2021)

    Article  Google Scholar 

  31. Mohammed, T.A., Mohammed, A.B.: Security architectures for sensitive data in cloud computing. New York, NY, USA. Association for Computing Machinery (2020)

    Google Scholar 

  32. El-Rewini, Z., Sadatsharan, K., Sugunaraj, N., Selvaraj, D.F., Plathottam, S.J., Ranganathan, P.: Cybersecurity attacks in vehicular sensors. IEEE Sensors J. 20(22), 13752–13767 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahmed Burhan Mohammed .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mohammed, A.B., Chaari Fourati, L., Fakhrudeen, A.M. (2023). A Comparative Study of Attribute Selection Algorithms on Intrusion Detection System in UAVs: A Case Study of UKM-IDS20 Dataset. In: Kallel, S., Jmaiel, M., Zulkernine, M., Hadj Kacem, A., Cuppens, F., Cuppens, N. (eds) Risks and Security of Internet and Systems. CRiSIS 2022. Lecture Notes in Computer Science, vol 13857. Springer, Cham. https://doi.org/10.1007/978-3-031-31108-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-31108-6_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-31107-9

  • Online ISBN: 978-3-031-31108-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics