Cyberattack and Fraud Detection Using Ensemble Stacking
Open Access
- 18 January 2022
- Vol. 3 (1), 22-36
- https://doi.org/10.3390/ai3010002
Abstract
Smart devices are used in the era of the Internet of Things (IoT) to provide efficient and reliable access to services. IoT technology can recognize comprehensive information, reliably deliver information, and intelligently process that information. Modern industrial systems have become increasingly dependent on data networks, control systems, and sensors. The number of IoT devices and the protocols they use has increased, which has led to an increase in attacks. Global operations can be disrupted, and substantial economic losses can be incurred due to these attacks. Cyberattacks have been detected using various techniques, such as deep learning and machine learning. In this paper, we propose an ensemble staking method to effectively reveal cyberattacks in the IoT with high performance. Experiments were conducted on three different datasets: credit card, NSL-KDD, and UNSW datasets. The proposed stacked ensemble classifier outperformed the individual base model classifiers.Keywords
This publication has 35 references indexed in Scilit:
- Distributed attack detection scheme using deep learning approach for Internet of ThingsFuture Generation Computer Systems, 2018
- Context-Aware Computing, Learning, and Big Data in Internet of Things: A SurveyIEEE Internet of Things Journal, 2017
- Secure Location of Things (SLOT): Mitigating Localization Spoofing Attacks in the Internet of ThingsIEEE Internet of Things Journal, 2017
- Internet of Things security: A surveyJournal of Network and Computer Applications, 2017
- A Novel Idea for Credit Card Fraud Detection using Decision TreeInternational Journal of Computer Applications, 2017
- Securing SDN Infrastructure of IoT–Fog Networks From MitM AttacksIEEE Internet of Things Journal, 2017
- Internet of Things: Architectures, Protocols, and ApplicationsJournal of Electrical and Computer Engineering, 2017
- Security and Privacy for Cloud-Based IoT: ChallengesIEEE Communications Magazine, 2017
- A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone NetworksIEEE Transactions on Emerging Topics in Computing, 2016
- Detection of financial statement fraud and feature selection using data mining techniquesDecision Support Systems, 2011