Unsupervised Learning for Feature Selection: A Proposed Solution for Botnet Detection in 5G Networks
View/ Open
Accepted manuscript (816.2Kb)
Download
Publication date
2023-01Keyword
Botnet attackInternet of Things
Network security
Intrusion detection system
Machine learning
Feature selection
Rights
© 2022 IEEE. Reproduced in accordance with the publisher's self-archiving policy. See https://www.ieee.org/publications/rights/index.html for more information.Peer-Reviewed
YesOpen Access status
openAccess
Metadata
Show full item recordAbstract
The world has seen exponential growth in deploying Internet of Things (IoT) devices. In recent years, connected IoT devices have surpassed the number of connected non-IoT devices. The number of IoT devices continues to grow and they are becoming a critical component of the national infrastructure. IoT devices' characteristics and inherent limitations make them attractive targets for hackers and cyber criminals. Botnet attack is one of the serious threats on the Internet today. This article proposes pattern-based feature selection methods as part of a machine learning (ML) based botnet detection system. Specifically, two methods are proposed: the first is based on the most dominant pattern feature values and the second is based on Maximal Frequent Itemset (MFI) mining. The proposed feature selection method uses Gini Impurity (GI) and an unsupervised clustering method to select the most influential features automatically. The evaluation results show that the proposed methods have improved the performance of the detection system. The developed system has a True Positive Rate (TPR) of 100% and a False Positive Rate (FPR) of 0% for best performing models. In addition, the proposed methods reduce the computational cost of the system as evidenced by the detection speed of the system.Version
Accepted manuscriptCitation
Lefoane M, Ghafir I, Kabir S et al (2022) Unsupervised Learning for Feature Selection: A Proposed Solution for Botnet Detection in 5G Networks. IEEE Transactions on Industrial Informatics. 19(1): 921-929.Link to Version of Record
https://doi.org/10.1109/TII.2022.3192044Type
Articleae974a485f413a2113503eed53cd6c53
https://doi.org/10.1109/TII.2022.3192044