Next Article in Journal
Balancing Accuracy and Speed in Gaze-Touch Grid Menu Selection in AR via Mapping Sub-Menus to a Hand-Held Device
Previous Article in Journal
N-Channel MOSFET Reliability Issue Induced by Visible/Near-Infrared Photons in Image Sensors
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Logistic Regression Ensemble Classifier for Intrusion Detection System in Internet of Things

by
Silpa Chalichalamala
1,
Niranjana Govindan
2,* and
Ramani Kasarapu
3
1
Department of Computer Science and Engineering, SRM Institute of Science and Technology, Kattankulathur, Chennai 603203, India
2
Department of Computing Technologies, School of Computing, SRM Institute of Science and Technology, Kattankulathur, Chennai 603203, India
3
School of Computing, Mohan Babu University (Erstwhile Sree Vidyanikethan Engineering College), Tirupati 517102, India
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(23), 9583; https://doi.org/10.3390/s23239583
Submission received: 24 October 2023 / Revised: 18 November 2023 / Accepted: 28 November 2023 / Published: 3 December 2023
(This article belongs to the Section Internet of Things)

Abstract

:
The Internet of Things (IoT) is a powerful technology that connect its users worldwide with everyday objects without any human interference. On the contrary, the utilization of IoT infrastructure in different fields such as smart homes, healthcare and transportation also raises potential risks of attacks and anomalies caused through node security breaches. Therefore, an Intrusion Detection System (IDS) must be developed to largely scale up the security of IoT technologies. This paper proposes a Logistic Regression based Ensemble Classifier (LREC) for effective IDS implementation. The LREC combines AdaBoost and Random Forest (RF) to develop an effective classifier using the iterative ensemble approach. The issue of data imbalance is avoided by using the adaptive synthetic sampling (ADASYN) approach. Further, inappropriate features are eliminated using recursive feature elimination (RFE). There are two different datasets, namely BoT-IoT and TON-IoT, for analyzing the proposed RFE-LREC method. The RFE-LREC is analyzed on the basis of accuracy, recall, precision, F1-score, false alarm rate (FAR), receiver operating characteristic (ROC) curve, true negative rate (TNR) and Matthews correlation coefficient (MCC). The existing researches, namely NetFlow-based feature set, TL-IDS and LSTM, are used to compare with the RFE-LREC. The classification accuracy of RFE-LREC for the BoT-IoT dataset is 99.99%, which is higher when compared to those of TL-IDS and LSTM.

1. Introduction

The Internet of Things (IoT) is generally a smart network that enables seamless internet connections across a wide array of physical devices/components/entities that comprise the IoT smart network. It does so with the goal of broadcasting data from anywhere in the world. Accordingly, any user has the capacity to access any kind of information pertaining to their requirements without any constraints of time and location. The entities or objects that are involved within an IoT network system are wirelessly linked using smart tiny sensors. Therefore, IoT devices have the capacity to interact with others without any human intervention [1]. IoT devices perform across numerous environments to achieve various objectives, leading to the development of several computing and communication technologies used in healthcare, military, agriculture, business and education [2]. A key component in providing security to IoT networks is the detection of intrusions [3]. An Intrusion Detection System (IDS) is an approach developed to ensure network security by detecting, preventing and eliminating unauthorized access during communication. IDS plays an essential role in making the network secure and safe, as its main objective is to guarantee the privacy, accessibility and authenticity of the system [4]. An IDS actively monitors a network for any malicious activity and alerts the system administrator if found. IoT devices are small and portable, which makes them perfect for remote regions [5]. Some of the applications of the IoT, including retail environments, intelligent buildings, smart cities and interconnected vehicles, are susceptible to malicious attacks. Therefore, it is necessary to implement security enhancements such as secure booting, device authentication and access control [6]. The IoT has become an attractive sector for cyberattacks due to its business growth and financial potential. This is the primary reason for the rapid increase in cyberattacks against IoT devices [7]. Proactive network security defenses are required to protect essential assets and data because IoT attack vectors have the potential to result in successful security breaches [8].
The IDS continuously monitors incoming and outgoing network traffic produced by IoT devices to search for any signs of cyberattacks. The two types of attack detection techniques are anomaly based and signature based [9]. The communication link between IoT devices is susceptible to a number of security risks, including data integrity attacks, Distributed Denial of Service (DDoS), session hijacking and man-in-the-middle attacks [10]. Continuous developments in devices, applications and services of IoT have led to increased vulnerabilities in IoT systems [11]. Hence, with the lack of fundamental security processes, the IoT devices become vulnerable targets for attackers and hackers. For example, the IoT is attacked and hacked by botnets that are utilized for initiating DDoS attacks [12]. The enormous internet deployments of IoT devices are associated with an increase in cyberattacks [13]. The maintenance of a minimal processing load in IoT devices is one of the main goals of the technology. Consequently, Host Intrusion Detection Systems (HIDS) are frequently avoided in the IoT ecosystem due to resource-intensive activities such as file or process monitoring [14]. There are numerous efforts made to increase IoT security, including the adoption of complex access control mechanisms for data confidentiality, the application of encryption on data transported in networks and various privacy and trust rules among users and IoT devices [15].
The contributions of this study are typified as follows:
  • An LREC classifier that includes the combination of AdaBoost and RF is used for performing effective classification of intrusions. The integration of AdaBoost and RF, according to the iterative ensemble approach, builds an effective classifier.
  • The issue of data imbalance in the input data is avoided using the ADASYN. The ADASYN is specifically chosen because it effectively controls the network traffic with severe data imbalance. Further, the RFE is utilized for removing the feature with less information so that the prediction is enhanced.
The article is organized as follows: The related works about the IDS are given in Section 2. A detailed explanation of RFE-LREC is given in Section 3, whereas the simulation results are presented in Section 4. Further, this research is concluded in Section 5.

2. Related Work

Sarhan et al. [16] implemented a NetFlow-based standard feature set for the Network Intrusion Detection System (NIDS) datasets of CSE-CICIDS2018, BoT-IoT, UNSW-NB15 and ToN-IoT. Their publicly accessible packet capture (pcap) data and ground truth events were used to extract features and tag methods. Due to the widespread availability of effective collection and NetFlow exporters, the implemented NetFlow-based feature sets had the benefit of being scalable and highly flexible. However, NetFlow was unable to carry out such an exhaustive and rigorous evaluation due to the restricted deployment of ML-based NIDSs in real-world network settings.
Disha and Waheed [17] presented the Gini Impurity-based Weighted Random Forest (GIWRF) to choose significant and pertinent features based on the importance score. The Gini Impurity criteria were used to split the trees, and the weight in the Random Forest algorithm was adjusted for unbalanced class distribution to produce the feature importance score. The presented method detected the intrusions effectively in the imbalanced data class from UNSW-NB15 and ToN-IoT datasets. The developed GIWRF was only suitable for binary classes as it failed to perform the multiclass classification.
Rodríguez et al. [18] implemented an efficient intrusion detection method with UNSW-NB15 dataset based on transfer learning (TL), model refinement and knowledge transfer to identify a wide range of zero-day attacks with imbalanced and scarce datasets. A test dataset with five kinds of innovative attacks was created to assess the TL-based ID framework. With decreased representation in the dataset, the TL-based IDS showed greatly increased efficacy in the detection of zero-day and known threats. Nevertheless, transfer learning, model refinement and knowledge transfer were computationally intensive processes, requiring significant amounts of resources such as processing power and training data.
Zhang et al. [19] implemented a novel network anomaly detection algorithm in terms of multiclass balancing and semi-supervised learning to efficiently detect numerous kinds of anomalous traffic data in actual network environments. This anomaly detection was performed using UNSW-NB15, NSL-KDD and ToNIoT datasets. To develop the principle of consistent distribution among unlabeled and labeled data, the multiclass split balancing and the adaptive confidence threshold function were employed. The implemented method improved the detection performances by using the collaborative rotation forest algorithm to learn from unlabeled and labeled samples. Yet, with remarkable performance and broad applicability, the novel network anomaly detection algorithm was inapplicable to datasets with erratic distribution.
Asgharzadeh et al. [20] presented an IoT Feature Extraction Convolutional Neural Network (IoTFECNN) with hybrid layers to extract both low-level and high-level characteristics and identify IoT anomalies from TON-IoT and NSL-KDD datasets. For effective feature selection, the Binary Multi-objective Enhanced Capuchin Search Algorithm (BMECapSA) was developed. A new hybrid technique, CNN-BMECapSA-RF, was developed by incorporating the IoTFECNN and BMECapSA methods to improve the IoT’s ability to detect anomalies with greater accuracy and precision. Due to improved feature extraction, selection and robust classification, the CNN-BMECapSA-RF technique greatly identified abnormalities in the IoT across all criteria. Anyhow, the execution time and complexity of connecting the BMECapSE to a classifier during the execution created difficulties.
Banaamah and Ahmad [21] implemented deep learning methods based on Long Short-Term Memory (LSTM), Conventional Neural Networks (CNN) and Gated Recurrent Units (GRU) to detect intrusions using Bot-IoT dataset. The CNN, LSTM and GRU methods were evaluated using a BoT-IoT standard dataset for IoT intrusion detection. The implemented method effectively performed the intrusion detection. Here, the LSTM provided better performance than both CNN and GRU because, for training and inference, CNN utilized complex computations that consumed a lot of resources and required more powerful hardware.
Lazzarini et al. [22] implemented a Deep Integrated Stacking for the IoT (DIS-IoT) for intrusion detection, using the TON-IoT dataset based on a stacking ensemble of deep learning (DL) models. DIS-IoT integrated four various DL models—: Deep Neural Network (DNN), MultiLayer Perceptron (MLP), Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM)—to make use of the numerous classification properties. The DIS-IoT performed effectively in both binary and multiclass classification for intrusion detection. However, DIS-IoT was an ensemble of four different methods requiring a large number of resources to run directly on low-power IoT devices.
Fatani et al. [23] presented novel feature extraction and selection techniques for creating an IDS system utilizing the benefits of a Swarm Intelligence (SI) algorithm, with KDD99, CIC2017, BoT-IoT and NSL-KDD datasets. For the purpose of extracting relevant features from the datasets, a feature extraction method based on the Conventional Neural Network (CNN) was created. Then, utilizing the recently developed SI algorithm, the Aquila Optimizer (AQU) provided an alternative feature selection technique to choose optimal features and improve the accuracy of classification. In both binary and multiclass classification situations, AQU had a great ability to boost the intrusion detection efficiency, but it still required a lot of computing power, particularly when applied to large datasets or complicated feature spaces.
Zeeshan et al. [24] introduced a Protocol-Based Deep Intrusion Detection (PB-DID) architecture for Denial of Service (DoS) and Distributed DOS attacks by analyzing the features of two recent benchmark datasets, BoT-IoT and UNSW-NB15. The typical features of the low and Transmission Control Protocol (TCP) categories in both datasets were examined and merged in PB-DID. The PB-DID significantly minimized the processing time by using minimal features for training and classification. Yet, to make both datasets compatible for testing, it was required to calculate a few UNSW-NB15 features that were absent in the BoT-IoT and vice versa.
Fatani et al. [25] introduced an efficient AI-based mechanism for the system of intrusion detection in IoT, utilizing the benefits of a deep learning and MetaHeuristics (MH) optimization algorithm. There were four different datasets, NSL-KDD, KDDCup-99, CICIDS-2017 and BoT-IoT, that were considered in this work. To extract relevant features, a feature extraction method based on the Conventional Neural Network (CNN) was created. To increase the balance between the exploration and exploitation phases, the new feature selection method employed a new form of the Transient Search Optimization (TSO) algorithm using the differential evolution (DE) algorithm. The TSODE-selected features amplified the classifier’s efficiency in detecting each of the attack classes. Despite that, the complexity of the algorithm increased when the DE algorithm was combined with TSO.
Halim et al. [26] presented Genetic Algorithm (GA)-based feature selection for avoiding the dimensionality curse in the datasets Bot-IoT, CIRA-CIC-DOHBrw-2020 and UNSW-NB15. The developed GA was used to choose adequate features from the data for improvement in the accuracy. But the developed GA required a larger amount of reproduction operations and repetitive iterations.
Zhou et al. [27] developed the IDS according to the incremental Long Short-Term Memory (LSTM) using CICIDS2017 and UNSW-NB15 datasets. The increment, i.e., product of function and derivative of LSTM, was used for obtaining the dynamic information of traffic. Next, the state variation was used in LSTM to consider that as incremental LSTM. The developed incremental LSTM was used to choose the optimal feature subset for further accuracy enhancement.

3. RFE-LREC Method

This research study proposes the development of a robust Intrusion Detection System using an efficient ensemble classification. The important processes involved in this research are (1) dataset acquisition, (2) preprocessing, (3) oversampling using ADASYN, (4) feature elimination using RFE and (5) ensemble classification. The issue of data imbalance is solved by using the ADASYN, while the irrelevant features from the overall feature set are excluded by using the RFE. Further, the logistic regression-based ensemble classifier (LREC) is used to increase the prediction performance of network intrusion. Figure 1 shows the block diagram of RFE-LREC.

3.1. Dataset Acquisition

The analyses in this research are carried out using two different datasets, which are BoT-IoT [28] and TON-IoT [29].
  • The BoT-IoT dataset is generated in the IoT lab of the University of New South Wales (UNSW) based on a realistic network environment. The BoT-IoT dataset is suitably considered when concentration is on the discovery of IoT devices that are compromised or are acting in a malicious or anomalous way, often referred to as “bots.” The BoT-IoT dataset comprises network traffic information that obtains the different behaviors of IoT devices, such as sensors, smart cameras and remaining linked devices, in a controlled and simulated environment. This data comprises both normal and malicious behaviors, making it a valuable resource to train and estimate an IDS. It has 72 million records of cyberattacks comprising Denial of Service (DoS), Distributed DoS (DDoS), ransomware and reconnaissance. The raw information is available in the pcap field format with a size of 16.7 Gigabits. Further, the UNSW provides the BoT-IoT in two formats, argus and CSV. In the argus format, packets are gathered into flows according to feature vector, while the packet features and its respective classes are provided in the CSV format.
  • The TON-IoT dataset was introduced by the makers of the BoT-IoT dataset to provide a comprehensive dataset that comprises normal and various attack types that threaten the industrial IoT (IIOT). The TON-IoT is created from certain current technologies such as multiple clouding layers, fog and edge. It has 22,339,021 network instances in CSV, pcap and Argus formats.

3.2. Preprocessing Using Min–Max Scaling

The data obtained from the datasets is preprocessed under min–max scaling to convert and rescale the values between the range of 0 and 1 using Equation (1).
X = X X m i n X m a x X m i n
where X is the input, X is preprocessed output and X m i n and X m a x are the minimum and maximum values of input.

3.3. Oversampling Using ADASYN

Adaptive synthetic sampling (ADASYN) is an adaptive oversampling approach that depends on the minority class samples. This ADASYN generates a huge amount of samples when there is less density and generates fewer samples when there is huge density. This characteristic has the benefit of adaptively shifting the decision boundaries when it is difficult to observe the samples. Hence, the ADASYN is effective in handling network traffic even with the issue of severe data imbalance.
The steps processed in ADASYN are as follows:
  • The G amount of samples that are required to be synthesized is computed as denoted in Equation (2).
    G = n b n s × β
    where the minority and majority samples are denoted as n s and n b , respectively, and β 0 , 1 .
  • K amount of neighbors is computed by Euclidean distance denoted by r i , i.e., the ratio of majority class samples existing in the neighborhood for each minority sample. Equation (3) expresses the r i .
    r i = k / K
    where k is the majority class sample in the current neighbor and K denotes the current amount of neighbors.
  • The g amount of samples required to be synthesized for each minority sample is computed in Equation (4), and then the samples are synthesized based on Equation (5).
    g = G × r i
    Z i = X i + X Z i X i × λ
    where the amount of samples needed to be synthesized is denoted as g ; a new synthesized sample is denoted as Z i ; the current minority sample is denoted as X i ; a random minority sample between k neighbors is X Z i ; and λ 0 , 1 .

3.4. Feature Elimination Using RFE

The synthesized sample Z from ADASYN is given as input to the RFE, wherein the feature selection is performed through sequential backward elimination. The RFE starts with an overall group of features and removes one feature at a time. The feature with less information is eliminated each time. The usage of binary SVM in RFE is for effectively ranking the feature by discovering the optimal hyperplane that divides the classes in the feature space. The process of optimal hyperplane search considers the most discriminative features, which helps to capture highly relevant features. RFE, when applied to binary SVM, offers numerous advantages. It systematically computes feature rankings, providing insights into their significance. By progressively eliminating the least influential features, RFE streamlines the dataset, reducing the dimensionality. This not only enhances model performance, but it also streamlines and accelerates the computation. In the scenario of this research study, the top 10 best features are used, which achieves an efficient balance between information retention and model simplification. The result is a more interpretable and robust model that well generalizes any new data. RFE, in conjunction with SVM, proficiently selects the most relevant features, contributing to improved predictive accuracy along with a streamlined, efficient model deployment.
Generally, the RFE is designed using a binary SVM. The RFE uses squared coefficients w j 2 ,   j = 1 , 2 , , m of weight vector w , where m denotes the total amount of initial features. The factor w is a feature ranking condition, which is expressed in the below Equation (6).
w = i = 1 m α i y i Z i
where the input and output pairs are denoted as Z and y , respectively, and α is a positive constant. The coefficient is calculated according to the information gain (contribution percentage of decision for the feature to decide what kind of attack) of the features towards the target label. Hence, the feature with a lesser coefficient is considered as a feature with less information. The RFE executes in an iterative way, whereas the SVM classifier is trained to utilize the remaining features. Subsequently, the ranking condition of features, i.e., c j = w j 2 is computed, and the features with a lesser ranking condition are discarded using RFE. The aforementioned process is continued until the RFE returns the small feature subset s .

3.5. Classification Using LREC

The feature subset from RFE is given as input to the AdaBoost and RF. The two classifiers, AdaBoost and RF, are utilized to compensate for the learning performance of each other in the individual training of subclasses. Here, the AdaBoost concentrates on sequentially enhancing the performance of weak learners, whereas the RF develops an ensemble of decision trees for making predictions. Further, the classified outputs from these classifiers are combined using logistic regression to make the final prediction. The logistic regression is utilized as a meta-classifier to weigh and combine the classifications from AdaBoost and RF. The interpretability feature of logistic regression is used for providing insights into the contribution of each base classifier for performing the final classification. Further, logistic regression is used to perform a robust and well-generalized final prediction. Moreover, the logistic regression used in the LREC is generally an ensemble of tree architectures like AdaBoost and RF. Each classifier is trained over the data’s random subset and the feature’s random subset. The generation of multiple trees facilitates minimization of the risk of any single tree overemphasizing specific patterns or falling prey to the base rate fallacy. The structure of the LREC is shown in Figure 2.

3.5.1. Random Forest (RF)

RF is generally an enhanced version of bagging where the random selection method is used to construct the trees. Here, the process of training is defined by selecting random attributes. The RFE depends on the following two standards:
(1)
A random sampling of training examples while creating a tree;
(2)
A random group of features taken while splitting the nodes.
The non-pruning strategy is used to obtain less variance and bias. The idea of integrating multiple trees is used to increase prediction and avoid the over-fitting issue. The X dimension vector is given as input to the RF, and Equation (7) expresses the RF model T with K amount of decision trees. Each tree in RF performs the identification while voting is applied to take decisions. Further, the label identified with a higher number of decision trees is returned as the final prediction.
R F = 1 K i = 1 K T s
Bootstrap aggregation is used for minimizing the correlation among various decision trees. The robustness and generalization are revamped by generating the decision trees over a dissimilar training subset.

3.5.2. AdaBoost

The AdaBoost algorithm uses the boosting concept, which helps to produce a robust classifier out of the weaker classifiers. AdaBoost can increase the overall effectiveness of ML classifiers by integrating bad classifiers and extracting the prediction value to create a superior classifier known as an ensemble classifier. The AdaBoost classifier minimizes problems related to overfitting and aids in producing better results. It considers the best values of every individual classifier and selects the best values.

3.5.3. Logistic Regression

Logistic regression is an ensemble learning that integrates multiple classifiers such as AdaBoost and RF for improving the performance using an iterative ensemble approach. It thus creates an effective classifier. Logistic regression evaluates the relationship between various independent variables and the categorical dependent variable. Further, this logistic regression evaluates the posterior probability p of happening by fitting the data into the logistic function. The primary principle is to fix the weights of classifiers and train the sample in every boosting iteration to precisely identify the class target of the given data. Equation (8) expresses the classification y * of logistic regression.
y * = l n p 1 p
The steps carried out in the LREC are given in the following Algorithm 1.
Algorithm 1: Classification using LREC
Input: Features
Output: Intrusion Attacks Classification
For   each   feature   f   in   Data   X
  Perform data normalization
  Perform data oversampling
   Do   Compute   X # RFE Feature selection
  while
    For   j = 1 , 2 , N   do   #   N number of features
     Update   the   value   of   X using Equation (6)
  Do (check converged)
Initialize   training   data   instance   space   S
For   t = 1 , 2 , T   do   #   T is number of base learners
   Train   a   base   learners :   X     H   using   the   distribution   X   #   Ada   boost ,   RFC   and   H is trained tree structure
  Update the distribution over the training of data
 End for
Compute the final score for the instances of base learners
Create the final score based on the meta-learner LR
Initialize   testing   the   data   instance   space   S
if   all   the   results   of   d   classes   S // logistic regression
   Return   S
 End if
Repeat process
Evaluate the performance metrics

4. Results and Discussion

The outcomes of the RFE-LREC method are detailed in this section. The RFE-LREC method is developed and implemented using Python 3.7 language, with the system configuration considered during analysis being i5 processor, Windows 10 operating system and 16 GB RAM. The BoT-IoT and TON-IoT datasets are separated in the ratio of 80:20 for training and testing purposes. This 80:20 ratio is considered because it strikes a realistic balance between bias and variance while evaluating the RFE-LREC performance. With an 80% training set, an adequately large sample is obtained to effectively train LREC, while the 20% test set offers an adequate sample to evaluate the LREC’s generalization performance. The RFE-LREC is evaluated using accuracy, recall, precision, F1-score, TNR and MCC, as expressed in Equations (9)–(14), and also as per FAR and ROC. Additionally, the execution time (ET) and complexity are analyzed for further evaluation.
A c c u r a c y = T P + T N T P + F P + T N + F N
R e c a l l = T P T P + F N
P r e c i s i o n = T P T P + F P
F 1 s c o r e = 2 T P 2 T P + F P + F N
T N R = T N T N + F P
M C C = T P × T N F P × F N T P + F P T P + F N T N + F P T N + F N
where T P and T N denote true positive and true negative and F P and F N denote false positive and false negative.

4.1. Performance Evaluation

The performance of the RFE-LREC is analyzed with different classifiers, oversampling approaches and feature selection approaches. A detailed discussion of the performance evaluation is given in the following sections.

4.1.1. Performance Evaluation for BoT-IoT Dataset

The different state-of-art classifiers—RF, GNB, Decision Tree (Information Gain), Decision Tree (Gini Index) and GBM—are used for evaluating the LREC. The different classes by the name of DDoS, DoS, Reconnaissance, Normal and Theft are considered for analyzing various classifiers, as shown in Table 1. One of the reasons for such consistent high values of the DoS class is data imbalance. If the dataset is heavily skewed towards the majority class (non-DoS), the model is required to achieve a higher accuracy by just identifying the majority class at many times. Next, the different subcategories—UDP, TCP, Service_Scan, OS_Fingerprint, HTTP, Normal and Keylogging—are additionally considered for evaluating the classifiers, as shown in the Table 2. Zero records in Table 1 and Table 2 convey that there is no test data available for those classes trained due to the imbalance in data, and very few instances are obtainable for such classes. This evaluation shows that the LREC provides better performances than the other classifiers. For example, the LREC obtains 99.99% for DoS class, which is the highest in comparison to the RF, GNB, Decision Tree (Information Gain), Decision Tree (Gini Index) and GBM.
Table 3 and Table 4 show the performance evaluation of different classifiers in binary classes, and the attained average results using the BoT-IoT dataset, correspondingly. In the binary class analysis, the classes of Normal and Attack are considered for evaluation. The graph of different classifier performances for binary classes is shown in Figure 3. Likewise, Figure 4 shows the graph of the average performance comparison with different classifiers with the BoT-IoT dataset. This analysis shows that the LREC provides better classification than the other classifiers. For example, the LREC achieves a classification accuracy of 99.99%, which is highest amongst RF, GNB, Decision Tree (Information Gain), Decision Tree (Gini Index) and GBM. The LREC improves classification by combining multiple classifiers, namely RF and AdaBoost, through the iterative ensemble approach.
Table 5 and Table 6 show the performance analysis of different oversampling and feature selection approaches for BoT-IoT, correspondingly. Figure 5 and Figure 6 show the average performance graphs for different oversampling and feature selection approaches, correspondingly. The ADASYN used with RFE-LREC is analyzed with SMOTE, while the RFE is analyzed with Chi-square- and mutual information gain (MIG)-based feature selection approaches. This analysis shows that the ADASYN and RFE exhibit better outputs than the other approaches. The adaptive generation of synthesized samples using ADASYN results in outperformance of the SMOTE. The selection of appropriate features using sequential backward elimination of RFE helps to improve the classification. Moreover, the complexity of O N is common for all classifiers, since it is used in feature selection.

4.1.2. Performance Evaluation for TON-IoT Dataset

The evaluation of RFE-LREC using TON-IoT is similar to the previous section. The RFE-LREC for binary classes and average results are shown in the Table 7 and Table 8, respectively. The graph of different classifier results for binary classes is shown in Figure 7. In addition, Figure 8 depicts the graph for the comparison of average performance with different classifiers. The LREC achieves a superior identification of intrusion when contrasted against the RF, GNB, Decision Tree (Information Gain), Decision Tree (Gini Index) and GBM. For instance, the accuracy of LREC for TON-IoT is 97.06%, which is greater when differentiated with the other classifiers.
Further, the different oversampling and feature selection approaches are assessed alongside ADASYN with TON-IoT, as shown in Table 9 and Table 10, respectively. An accuracy graph for different oversampling and feature selection approaches with TON-IoT are shown in Figure 9 and Figure 10, respectively. This analysis shows that the ADASYN and RFE display a better performance when differentiated with the remaining approaches.

4.2. Comparative Analysis

The existing researches, NetFlow-based feature set [16], TL-IDS [18] and LSTM [21] are used to relatively assess the proposed method. The reason for taking these existing researches is that they also contribute towards the classifier. Table 11 shows the comparative analysis of the RFE-LREC with TL-IDS [18] and LSTM [21] in the BoT-IoT, whereas Table 12 shows the comparison of RFE-LREC with NetFlow [16] in TON-IoT. Additionally, the graph of comparative analysis for the BoT-IoT dataset is shown in Figure 11. The LREC accomplishes a better classification by integrating the RF and AdaBoost via the iterative ensemble approach. Further, the adaptive generation of synthesized samples using ADASYN is exploited to amplify the classification accuracy. An elimination of the inappropriate features is carried out to amplify the classification.

5. Conclusions

The open nature and self-configuring architecture of the IoT causes it to be vulnerable to intrusive cyberattacks. In this research, the LREC, a combination of AdaBoost and RF, is developed for performing an effective classification of intrusion. The ADASYN avoids the issue of data imbalance by adaptively generating the synthesized samples, which is the process of generating a huge amount of samples when there is less density and generating a less number of samples when there is huge density. An inappropriate feature that exists in the overall feature set is eliminated by selecting the features through sequential backward elimination. The interpretability feature of LREC is used for improving the classification performances by combining the AdaBoost and RF using an iterative ensemble approach. In addition, logistic regression is deployed to perform robust and generalized final predictions. From the analysis, it is evident that the RFE-LREC exhibits superior outputs than the existing approaches, which are NetFlow, TL-IDS and LSTM. The classification accuracy of RFE-LREC for the BoT-IoT dataset is 99.99%, which is higher when compared to the TL-IDS and LSTM. The developed IDS will be improved by using the regularization approaches to control overfitting in individual trees that further help to enhance the overall performance of the ensemble model for a better prediction.
The proposed algorithm will be enhanced by applying regularization techniques to control overfitting in individual trees, which can improve the overall performance of the ensemble model for better intrusion detection.

Author Contributions

Conceptualization, N.G.; methodology, N.G.; software, R.K. and S.C.; validation, R.K. and S.C.; formal analysis, R.K.; investigation, N.G.; resources, N.G. and S.C.; data curation, N.G.; writing—original draft preparation, N.G.; writing—review and editing, R.K. and S.C.; visualization, R.K.; supervision, S.C.; project administration, S.C. and R.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The datasets generated during and/or analyzed during the current study are available in the BoT-IoT (https://staff.itee.uq.edu.au/marius/NIDS_datasets/#RA3, accessed on 3 August 2023) and ToN-IoT (https://staff.itee.uq.edu.au/marius/NIDS_datasets/#RA2, accessed on 3 August 2023) repositories.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Jeyaselvi, M.; Dhanaraj, R.K.; Sathya, M.; Memon, F.H.; Krishnasamy, L.; Dev, K.; Ziyue, W.; Qureshi, N.M.F. A highly secured intrusion detection system for IoT using EXPSO-STFA feature selection for LAANN to detect attacks. Clust. Comput. 2023, 26, 559–574. [Google Scholar] [CrossRef]
  2. Saba, T.; Rehman, A.; Sadad, T.; Kolivand, H.; Bahaj, S.A. Anomaly-based intrusion detection system for IoT networks through deep learning model. Comput. Electr. Eng. 2022, 99, 107810. [Google Scholar] [CrossRef]
  3. Zhang, Y.; Li, P.; Wang, X. Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access 2019, 7, 31711–31722. [Google Scholar] [CrossRef]
  4. Hassan, I.H.; Abdullahi, M.; Aliyu, M.M.; Yusuf, S.A.; Abdulrahim, A. An improved binary manta ray foraging optimization algorithm based feature selection and random forest classifier for network intrusion detection. Intell. Syst. Appl. 2022, 16, 200114. [Google Scholar] [CrossRef]
  5. Vishwakarma, M.; Kesswani, N. DIDS: A Deep Neural Network based real-time Intrusion detection system for IoT. Decis. Anal. J. 2022, 5, 100142. [Google Scholar] [CrossRef]
  6. Siddharthan, H.; Deepa, T.; Chandhar, P. SENMQTT-SET: An intelligent intrusion detection in IoT-MQTT networks using ensemble multi cascade features. IEEE Access 2022, 10, 33095–33110. [Google Scholar] [CrossRef]
  7. Hanafi, A.V.; Ghaffari, A.; Rezaei, H.; Valipour, A.; Arasteh, B. Intrusion detection in Internet of things using improved binary golden jackal optimization algorithm and LSTM. Clust. Comput. 2023. [Google Scholar] [CrossRef]
  8. Samha, A.K.; Malik, N.; Sharma, D.; Kavitha, S.; Dutta, P. Intrusion Detection System Using Hybrid Convolutional Neural Network. Mob. Netw. Appl. 2023. [Google Scholar] [CrossRef]
  9. Bhavsar, M.; Roy, K.; Kelly, J.; Olusola, O. Anomaly-based intrusion detection system for IoT application. Discov. Internet Things 2023, 3, 5. [Google Scholar] [CrossRef]
  10. Mahadik, S.; Pawar, P.M.; Muthalagu, R. Efficient Intelligent Intrusion Detection System for Heterogeneous Internet of Things (HetIoT). J. Netw. Syst. Manag. 2023, 31, 2. [Google Scholar] [CrossRef]
  11. Siddiqui, A.J.; Boukerche, A. Adaptive ensembles of autoencoders for unsupervised IoT network intrusion detection. Computing 2021, 103, 1209–1232. [Google Scholar] [CrossRef]
  12. Nimbalkar, P.; Kshirsagar, D. Feature selection for intrusion detection system in Internet-of-Things (IoT). ICT Express 2021, 7, 177–181. [Google Scholar] [CrossRef]
  13. Mehedi, S.T.; Anwar, A.; Rahman, Z.; Ahmed, K.; Islam, R. Dependable intrusion detection system for IoT: A deep transfer learning based approach. IEEE Trans. Ind. Inf. 2023, 19, 1006–1017. [Google Scholar] [CrossRef]
  14. Ahmad, J.; Shah, S.A.; Latif, S.; Ahmed, F.; Zou, Z.; Pitropakis, N. DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial Internet of things. J. King Saud Univ. -Comput. Inf. Sci. 2022, 34, 8112–8121. [Google Scholar] [CrossRef]
  15. Roy, S.; Li, J.; Choi, B.-J.; Bai, Y. A lightweight supervised intrusion detection mechanism for IoT networks. Future Gener. Comput. Syst. 2022, 127, 276–285. [Google Scholar] [CrossRef]
  16. Sarhan, M.; Layeghy, S.; Portmann, M. Towards a standard feature set for network intrusion detection system datasets. Mob. Netw. Appl. 2022, 27, 357–370. [Google Scholar] [CrossRef]
  17. Disha, R.A.; Waheed, S. Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection technique. Cybersecurity 2022, 5, 1. [Google Scholar] [CrossRef]
  18. Rodríguez, E.; Valls, P.; Otero, B.; Costa, J.J.; Verdú, J.; Pajuelo, M.A.; Canal, R. Transfer-Learning-Based Intrusion Detection Framework in IoT Networks. Sensors 2022, 22, 5621. [Google Scholar] [CrossRef] [PubMed]
  19. Zhang, H.; Xiao, Z.; Gu, J.; Liu, Y. A network anomaly detection algorithm based on semi-supervised learning and adaptive multiclass balancing. J. Supercomput. 2023, 79, 20445–20480. [Google Scholar] [CrossRef]
  20. Asgharzadeh, H.; Ghaffari, A.; Masdari, M.; Gharehchopogh, F.S. Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm. J. Parallel Distrib. Comput. 2023, 175, 1–21. [Google Scholar] [CrossRef]
  21. Banaamah, A.M.; Ahmad, I. Intrusion Detection in IoT Using Deep Learning. Sensors 2022, 22, 8417. [Google Scholar] [CrossRef]
  22. Lazzarini, R.; Tianfield, H.; Charissis, V. A stacking ensemble of deep learning models for IoT intrusion detection. Knowl.-Based Syst. 2023, 279, 110941. [Google Scholar] [CrossRef]
  23. Fatani, A.; Dahou, A.; Al-qaness, M.A.A.; Lu, S.; Abd Elaziz, M.A. Advanced Feature Extraction and Selection Approach Using Deep Learning and Aquila Optimizer for IoT Intrusion Detection System. Sensors 2021, 22, 140. [Google Scholar] [CrossRef] [PubMed]
  24. Zeeshan, M.; Riaz, Q.; Bilal, M.A.; Shahzad, M.K.; Jabeen, H.; Haider, S.A.; Rahim, A. Protocol-based deep intrusion detection for dos and ddos attacks using unsw-nb15 and Bot-IoT Data-Sets. IEEE Access 2022, 10, 2269–2283. [Google Scholar] [CrossRef]
  25. Fatani, A.; Abd Elaziz, M.; Dahou, A.; Al-Qaness, M.A.A.; Lu, S. IoT intrusion detection system using deep learning and enhanced transient search optimization. IEEE Access 2021, 9, 123448–123464. [Google Scholar] [CrossRef]
  26. Halim, Z.; Yousaf, M.N.; Waqas, M.; Sulaiman, M.; Abbas, G.; Hussain, M.; Ahmad, I.; Hanif, M. An effective genetic algorithm-based feature selection method for intrusion detection systems. Comput. Secur. 2021, 110, 102448. [Google Scholar] [CrossRef]
  27. Zhou, H.; Kang, L.; Pan, H.; Wei, G.; Feng, Y. An intrusion detection approach based on incremental long short-term memory. Int. J. Inf. Secur. 2023, 22, 433–446. [Google Scholar] [CrossRef]
  28. Koroniotis, N.; Moustafa, N.; Sitnikova, E.; Turnbull, B. Towards the development of realistic botnet dataset in the Internet of things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst. 2019, 100, 779–796. [Google Scholar] [CrossRef]
  29. Moustafa, N. A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets. Sustain. Cities Soc. 2021, 72, 102994. [Google Scholar] [CrossRef]
Figure 1. Block diagram of RFE-LREC.
Figure 1. Block diagram of RFE-LREC.
Sensors 23 09583 g001
Figure 2. Structure of LREC.
Figure 2. Structure of LREC.
Sensors 23 09583 g002
Figure 3. Graph of different classifier performances for binary classes with BoT-IoT.
Figure 3. Graph of different classifier performances for binary classes with BoT-IoT.
Sensors 23 09583 g003
Figure 4. Graph of average performance for different classifiers with BoT-IoT.
Figure 4. Graph of average performance for different classifiers with BoT-IoT.
Sensors 23 09583 g004
Figure 5. Graph of average performance for different oversampling approaches with BoT-IoT.
Figure 5. Graph of average performance for different oversampling approaches with BoT-IoT.
Sensors 23 09583 g005
Figure 6. Graph of average performance for feature selection approaches with BoT-IoT.
Figure 6. Graph of average performance for feature selection approaches with BoT-IoT.
Sensors 23 09583 g006
Figure 7. Graph of different classifier performances for binary classes with TON-IoT.
Figure 7. Graph of different classifier performances for binary classes with TON-IoT.
Sensors 23 09583 g007
Figure 8. Graph of average performance for different classifiers with TON-IoT.
Figure 8. Graph of average performance for different classifiers with TON-IoT.
Sensors 23 09583 g008
Figure 9. Graph of average performance for different oversampling approaches with TON-IoT.
Figure 9. Graph of average performance for different oversampling approaches with TON-IoT.
Sensors 23 09583 g009
Figure 10. Graph of average performance for feature selection approaches with TON-IoT.
Figure 10. Graph of average performance for feature selection approaches with TON-IoT.
Sensors 23 09583 g010
Figure 11. Graph for comparative analysis of BoT-IoT dataset. Adapted from ref. [18,21].
Figure 11. Graph for comparative analysis of BoT-IoT dataset. Adapted from ref. [18,21].
Sensors 23 09583 g011
Table 1. Evaluation of classifiers for BoT-IoT dataset with different classes.
Table 1. Evaluation of classifiers for BoT-IoT dataset with different classes.
ClassifiersClassPrecision (%)Recall (%)F1-Measure (%)Accuracy (%)ROC (%)FAR (%)TNR (%)MCC (%)
RFDDoS9896979798.996.879597
DoS9698979798.996.879797
Reconnaissance98.99243997906.875595
Normal98.99979897906.879795
Theft98.9929449798.996.874595
GNBDDoS6696787198.996.159778
DoS8944597198.996.157978
Reconnaissance03900671506.159578
Normal8921337198.996.154478
Theft98.9957737198.996.156778
Decision Tree
(Information Gain)
DDoS9788929198.995.449092
DoS86969191505.449992
Reconnaissance94314691905.445592
Normal94577191925.447692
Theft0000009199.995.440192
Decision Tree
(Gini Index)
DDoS9788929199.995.488992
DoS8697919199.995.489892
Reconnaissance9130459199.995.484592
Normal95597391905.486992
Theft0000009199.995.480292
GBMDDoS98.9998.9998.9998.9999.997.69898
DoS98.9998.9998.9998.9999.997.69898
Reconnaissance97939498.99507.69897.99
Normal98.9998.9998.9998.99907.69897.99
Theft98.9998.9998.9998.9999.997.69898.76
LRECDDoS98.9999.9998.9998.9999.992.09998.99
DoS99.9999.9999.9999.9999.992.09998.99
Reconnaissance9999.999899.99982.09998.99
Normal99.9999.9999.9999.99982.09998.99
Theft99.9999.999899.9999.992.09998.99
Table 2. Evaluation of classifiers for BoT-IoT dataset with different subcategories.
Table 2. Evaluation of classifiers for BoT-IoT dataset with different subcategories.
ClassifiersSubcategoryPrecision (%)Recall (%)F1-Measure (%)Accuracy (%)ROC (%)FAR (%)TNR (%)MCC (%)
RFUDP98193298504.22296
TCP00000098504.20396
Service_Scan99.99020498504.20396
OS_Fingerprint0000009898.994.20296
HTTP8097979898.994.29596
Normal98.9998.9998.9998504.297.9896
Keylogging98.9998.9998.9998534.297.9896
GNBUDP17672898504.287796
TCP98.9950679898.994.286596
Service_Scan03900698504.289596
OS_Fingerprint00000098504.280396
HTTP8320339898.994.283396
Normal96999898504.289796
Keylogging98.9998.9998.9998534.289796
Decision Tree
(Information Gain)
UDP88768299507.67898
TCP98.99365399507.64498
Service_Scan95345099507.64498
OS_Fingerprint81263999507.64598
HTTP88597199507.67998
Normal9898.999999507.696.9998
Keylogging98.9998.9998.9999507.696.9998
Decision Tree
(Gini Index)
UDP86838499505.78797
TCP00000099505.70297
Service_Scan83050999505.70397
OS_Fingerprint9224389998.995.73297
HTTP8862739998.995.75697
Normal98100999998.995.79897
Keylogging98.9998.9998.999998.995.79897
GBMUDP98.99989998.99504.89698
TCP98.999899.9998.99504.89698
Service_Scan99939698.99964.89298
OS_Fingerprint93939398.9998.994.89298
HTTP98989898.9998.994.89798
Normal98.9998.9998.9998.99504.89798
Keylogging98.9998.9998.9998.99534.89998
LRECUDP99.999999.9999.99500.019999
TCP9599.999099.99500.019999
Service_Scan9799.999899.99500.019999
OS_Fingerprint95949499.9998.990.019999
HTTP99999999.9998.990.019999
Normal99.9999.9999.9999.9998.990.019999
Keylogging99.9999.9999.9999.9998.990.019999
Table 3. Evaluation of classifiers for BoT-IoT dataset with binary classes.
Table 3. Evaluation of classifiers for BoT-IoT dataset with binary classes.
ClassifiersClassPrecision (%)Recall (%)F1-Measure (%)Accuracy (%)ROC (%)FAR (%)TNR (%)MCC (%)
RFAttack98.9998.9998.9998.99717.097.0797
Normal98.99365298.99717.03097
GNBAttack98.9998.9998.9998.99505.097.0797
Normal03900698.99505.08897
Decision Tree
(Information Gain)
Attack98.9998.9998.9998.99504.997.0797
Normal95375498.99504.93597
Decision Tree
(Gini Index)
Attack98.9998.9998.9998.99505.797.0797
Normal95365198.99505.73397
GBMAttack98.9998.9998.9998.99505.797.0797
Normal99939698.99504.98897
LRECAttack99.9999.9999.9999.99904.89998
Normal9999.999899.99904.89998
Table 4. Average classification performances for different classifiers with BoT-IoT.
Table 4. Average classification performances for different classifiers with BoT-IoT.
ClassifiersPrecision (%)Recall (%)F1 Measure (%)Accuracy (%)ROC (%)FAR (%)TNR (%)MCC (%)ET (min)Complexity
RF98.9966.9975.598.9971.007.063.539720O (2M + N)
GNB51.594.9952.598.9950.005.092.539725O (M + N)
Decision Tree
(Information Gain)
96.9968.4976.598.9950.004.966.039730O (M + N)
Decision Tree
(Gini Index)
97.0067.0074.0098.9950.005.7669740O (M + N)
GBM98.9995.9997.4898.9950.008.1592.539755O (M + N)
LREC99.4999.9998.9999.9990.004.8999812O (M + N)
Table 5. Evaluation of different oversampling approaches for BoT-IoT.
Table 5. Evaluation of different oversampling approaches for BoT-IoT.
OversamplingPrecision (%)Recall (%)F1 Measure (%)Accuracy (%)ROC (%)FAR (%)TNR (%)MCC (%)
SMOTE95.7991.9896.7994.5894.005.789.9992.78
ADASYN99.9999.9998.9999.9990.004.898.9998.88
Table 6. Evaluation of different feature selection approaches for BoT-IoT.
Table 6. Evaluation of different feature selection approaches for BoT-IoT.
Feature SelectionPrecision (%)Recall (%)F1 Measure (%)Accuracy (%)ROC (%)FAR (%)TNR (%)MCC (%)
Chi295.0094.0094.0094.2894.007.090.0093.88
MIG94.7995.5395.7796.0096.005.793.3392.00
RFE99.9999.9998.9999.9990.004.897.3398.88
Table 7. Evaluation of classifiers for TON-IoT dataset with binary classes.
Table 7. Evaluation of classifiers for TON-IoT dataset with binary classes.
ClassifiersClassPrecision (%)Recall (%)F1 Measure (%)Accuracy (%)ROC (%)FAR (%)TNR (%)MCC (%)
RFAttack98.99949697.02965.59396.72
Normal9598.999697.02965.59496.72
GNBAttack93939393.00936.89293.00
Normal93939393.00936.89293.00
Decision Tree
(Information Gain)
Attack98.99959696.06955.59495.86
Normal9598.999696.06955.597.6995.86
Decision Tree
(Gini Index)
Attack98.99949696.06955.69495.77
Normal9598.999696.06955.697.6995.77
GBMAttack95949696.66965.69395.77
Normal95999696.66965.59895.77
LRECAttack98.9998.7798.7798.9998.995.29697.88
Normal9998.7798.7798.9998.995.29797.88
Table 8. Average classification performances for different classifiers with TON-IoT.
Table 8. Average classification performances for different classifiers with TON-IoT.
ClassifiersPrecision (%)Recall (%)F1 Measure (%)Accuracy (%)ROC (%)FAR (%)TNR (%)MCC (%)ET (min)Complexity
RF96.9996.499697.02965.593.596.7220O (2M + N)
GNB9596.59696.66965.559293.0025O (M + N)
Decision Tree
(Information Gain)
93939393936.894.4595.8630O (M + N)
Decision Tree
(Gini Index)
96.9996.999696.06955.594.4595.7740O (M + N)
GBM96.9996.999696.06955.695.595.7755O (M + N)
LREC98.9998.7798.7798.8898.995.296.597.8812O (M + N)
Table 9. Evaluation of different oversampling approaches for TON-IoT.
Table 9. Evaluation of different oversampling approaches for TON-IoT.
OversamplingPrecision (%)Recall (%)F1 Measure (%)Accuracy (%)ROC (%)FAR (%)TNR (%)MCC (%)
SMOTE96.8796.0095.9794.9695.265.894.0092.99
ADASYN98.9998.7798.7798.8898.995.294.7996.89
Table 10. Evaluation of different feature selection approaches for TON-IoT.
Table 10. Evaluation of different feature selection approaches for TON-IoT.
Feature SelectionPrecision (%)Recall (%)F1 Measure (%)Accuracy (%)ROC (%)FAR (%)TNR (%)MCC (%)
Chi297.9596.7095.0096.9996.005.495.7095.88
Mutual information gain96.6697.2897.6595.6697.005.594.2895.88
RFE98.9998.7798.7798.8898.995.297.7796.98
Table 11. Comparative analysis for BoT-IoT dataset.
Table 11. Comparative analysis for BoT-IoT dataset.
MethodsPrecision (%)Recall (%)F1 Measure (%)Accuracy (%)
TL-IDS [18]98.2297.8997.9797.89
LSTM [21]99.710099.899.8
RFE-LREC99.9999.9998.9999.99
Table 12. Comparative analysis for TON-IoT dataset.
Table 12. Comparative analysis for TON-IoT dataset.
MethodsF1 Measure (%)Accuracy (%)
NetFlow [16]9997.86
RFE-LREC98.7798.88
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chalichalamala, S.; Govindan, N.; Kasarapu, R. Logistic Regression Ensemble Classifier for Intrusion Detection System in Internet of Things. Sensors 2023, 23, 9583. https://doi.org/10.3390/s23239583

AMA Style

Chalichalamala S, Govindan N, Kasarapu R. Logistic Regression Ensemble Classifier for Intrusion Detection System in Internet of Things. Sensors. 2023; 23(23):9583. https://doi.org/10.3390/s23239583

Chicago/Turabian Style

Chalichalamala, Silpa, Niranjana Govindan, and Ramani Kasarapu. 2023. "Logistic Regression Ensemble Classifier for Intrusion Detection System in Internet of Things" Sensors 23, no. 23: 9583. https://doi.org/10.3390/s23239583

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop