Advances in Complex Systems and Their Applications to Cybersecurity
View this Special IssueResearch Article  Open Access
Hector AlaizMoreton, Jose AveleiraMata, Jorge OndicolGarcia, Angel Luis MuñozCastañeda, Isaías García, Carmen Benavides, "Multiclass Classification Procedure for Detecting Attacks on MQTTIoT Protocol", Complexity, vol. 2019, Article ID 6516253, 11 pages, 2019. https://doi.org/10.1155/2019/6516253
Multiclass Classification Procedure for Detecting Attacks on MQTTIoT Protocol
Abstract
The large number of sensors and actuators that make up the Internet of Things obliges these systems to use diverse technologies and protocols. This means that IoT networks are more heterogeneous than traditional networks. This gives rise to new challenges in cybersecurity to protect these systems and devices which are characterized by being connected continuously to the Internet. Intrusion detection systems (IDS) are used to protect IoT systems from the various anomalies and attacks at the network level. Intrusion Detection Systems (IDS) can be improved through machine learning techniques. Our work focuses on creating classification models that can feed an IDS using a dataset containing frames under attacks of an IoT system that uses the MQTT protocol. We have addressed two types of method for classifying the attacks, ensemble methods and deep learning models, more specifically recurrent networks with very satisfactory results.
1. Introduction
The “Internet of Things” (IoT) describes many different systems and devices that are constantly connected to Internet, giving information from their sensors or interacting with their actuators. By 2020 it is estimated that there will be 4.5 billion IoTs joining the Internet [1]. These devices have special features, such as a low computing capacity and the use specific lighter protocols. This makes IoT devices more efficient, smaller, and less energy consuming; however these low settings reduce their encryption capacity. These heterogeneous systems and networks offer new challenges in cybersecurity, such as new vulnerabilities and anomalies [2, 3]. One of the most important attacks in recent years, the Mirai botnet, exploited these vulnerabilities by carrying out distributed denial of service attacks infecting IoT devices and attacking with as many as 400,000 simultaneously connected devices [4].
One way of improving network security is the use of Intrusion Detection Systems (IDS). IDS are one of the most productive techniques for detecting attacks within a network. This tool can detect network intrusions and network misuses by matching patterns of known attacks against ongoing network activity [5]. With this purpose, our focus is to develop an IDS with machine learning models for the IoT. IDS use two different detection methods: signaturebased detection and anomalybased detection. Signaturebased detection methods are effective in detecting wellknown attacks by inspecting network traffic for specific patterns. Anomalybased detection systems identify attacks by monitoring the behaviour of the entire system, objects, or traffic and comparing them with a predefined normal status [6].
Machine learning techniques are used to improve detection methods, by creating new rules automatically for signaturebased IDS or adapting the detection patterns of anomalybased IDS. These anomalybased IDS have had good results in qualifying frames that may be under attack [7], and they are effective even in detecting zeroday attacks [8].
To build a machine learning classifier it is necessary to use a dataset. Within the network intrusion detection there are some wellknown datasets that are used to feed IDS with machine learning techniques [9]. As there are no public datasets based on network traffic using IoT protocols, we have used a dataset that has been created in our previous research (the dataset is available in https://joseaveleira.es/dataset. ©® reg#LE22918). The main focus of this paper is on the three different machine learning techniques that classify three different attacks and normal frames at the same time using our IoT environment dataset.
2. Related Work
There are several approaches for the detection of anomalies in traditional networks using machine learning. The most widely used datasets are the KDD99 [10] and NSLKDD Dataset [11] (an improved version of KDD'99). These datasets contain traffic captured on the TCP protocol and collect different types of attacks. Based on these datasets, some models have been developed for anomaly detection using a Support Vector Machine and Random Forest [12, 13]. Another technique used on this dataset is KCentroid clustering, whose objective is to improve the performance of other models [14]. There are also ways of upgrading these datasets, such as balancing classes to increase the models’ prediction accuracy, which improves their performance [15].
Other detection techniques with good results are the use of Fuzziness based semisupervised learning getting an accuracy of 84 [16] and also obtaining good results analyzing the network traffic using sequential extreme learning machine with accuracies around 95 [17]. These good results indicate that machine learning is a good approach to improve the detection of intrusions in the network layer.
The machine learning methods are based on deep learning [18]. There are many approaches for solving anomaly detection using deep learning. One proposed way is to use the Deep Belief Network (DBN) as a feature selector on the KDD dataset, combined with a SVM that classifies the attacks [19, 20]. Another proposed method is to use deep learning models as feature selectors using the Fisher Score, a classical statistic method, combined with an autoencoder to reduce the dimensions of the data and extract the highestvalued features [21]. Deep learning models are used as classifiers too. Understanding that the temporary data sequence of network attacks is important, the Long Short Term Memory (LSTM) network, a variant of recurrent networks, has been used to classify the KDD’s attacks [22].
As regards the IoT IDS, there is an approach that uses fog computing combined with mobile edge computing. Using this combination, a numerical simulation is made for the NSLKDD dataset, where it has been demonstrated that this type of IDS has a good performance both in accuracy and time dependence [23]. Using this dataset, there is also an IDS based on rules which rules are modified using machine learning KNN and SVM techniques [24]. Because the research into IDS schemes for IoT is still incipient, the proposed solutions do not cover a wide range of attacks or IoT technologies [25].
There are other more recent datasets such as the AWID [26] which collects TCP frames of data from a WLAN network over which several attacks were made on 802.11 security mechanism through which a study on WiFi intrusions was made using a neural network classifier [27]; another current dataset is the CICIDS2017 [28] used to validate the detection algorithms on which training has been carried out with recurrent neural networks [29].
This research is based on a dataset specialized in a protocol implemented in IoT environments to detect specific vulnerabilities. It is specialized in an IoT protocol where does not exist dissection of traffic ready to use with research purposes.
3. Methods and Materials
This section describes the methods, from a theoretical point of view as well as the materials used for implementing the experiments.
3.1. MQTT Dataset
In order to classify anomalies in an IoT environment, we built a dataset using MQTT, which is a publishsubscribebased messaging protocol. It is a light protocol widely used in IoT [30].
The MQTT’s architecture follows a star topology, with a central node that functions as a server or broker. The broker is in charge of managing the network and transmitting. The communication is based on topics created by the client that publishes the message and the nodes that wish to receive it must subscribe to it. The communication can be one to one, or one to many.
This dataset has been obtained in a test environment with several sensors, actuators, and a server. This server hosts the management application, also working as the broker that manages the messages of the MQTT protocol. The scheme of the environment is detailed in the Figure 1.
We carried out several attacks against the MQTT protocol in the test environment. We captured these attacks at the network level along with all generated traffic. The attacks carried out were as follows:(i)DoS: denial of service is one of the most common attacks on the Internet [31]. In the case of the MQTT protocol, the broker is attacked by saturating it with a large number of messages per second and new connections. Using the MQTTmalaria program [32], this program is used for testing the scalability and load testing utilities for MQTT environments.(ii)Man in the middle (MitM) consists of intercepting the messages between two communication points in an attempt to modify the content; in this case it is done between a sensor and the broker by modifying the sensor data. To carry out the attack we used the distribution Kali Linux and the tool Ettercap.(iii)Intrusion: taking into account the characteristics of the MQTT protocol, this attack consists of using the wellknown port (1883) for this protocol and a command that uses the special character “#” can be used by an external attacker for knowing the active topics available for being subscripted. To find out which topics a client outside the system [33].
The relevant fields and the protocol are selected after capturing the network traffic in the system. All communication frames are tagged to show whether one of them is under attack or is normal. There are three CSV files generated, one for each attack, all of them being part of the dataset used. Selecting features and labeling the frames indicating whether or not they are under attack enable supervised learning techniques to be used on this dataset.
The features of the data set are as follows:(i)DoS.csv that contains the capture of 94.625 frames and of which 45.513 are under attack traffic and 49.112 are normal traffic.(ii)MitM.csv that contains 110668 frames with 3855 under man in the middle attack and 106.813 normal traffic frames.(iii)Intrusion.csv with 80,893 total frames with 1898 under attack and 78,995 normal traffic frames.
3.2. Classification Methods
We have chosen XGBoost because other research delivered good results like [34–36]. We have also chosen recurrent networks for our experiments because of the importance of time in network attacks [22], as frames are produced sequentially, and the sequence and time between frames provide relevant information for detecting an attack. We shall go into our classification models in more detail in the following sections.
3.2.1. XGBoost (Gradient Boosting)
Gradient boosting systems build additive models in a forward way through steps, allowing the optimization of arbitrary differentiable loss functions. In each forward step, regression trees are fitted onto the negative gradient of the binomial or multinomial loss function [37]. XGBoost stands for Extreme Gradient Boosting [38]. It is a scalable machine learning system for tree boosting which optimizes many systems and algorithms, such as a tree learning algorithm that handles sparse data, handling instance weights in approximate tree learning or exploiting outofcore computation. For the implementation of this method, we are using the XGBoost library for Python [39].
3.2.2. Recurrent Neural Networks
Recurrent neural networks are a variant of neural networks designed for highly sequenced problems. RNN contain cycles that feed the network activation from a previous time step as inputs into the network, influencing predictions at the current time step. The addition of cycles gives the RNN a new dimension, where instead of mapping only inputs to outputs, the network will learn a mapping function for the inputs to an output over time. One of the main disadvantages of this kind of network is the training problems, such as a vanishing gradient and exploding gradients [40]. These problems can be addressed through variations in the neurons, such as GRU or LSTM cells.
LSTM Recurrent Network. LSTM networks have a unique formulation that allows them to prevent the problems of scaling and training of the vanilla RNN, avoiding the back propagation error that either blows up or decays exponentially. An LSTM layer consists of a set of recurrently connected blocks, known as memory blocks that are the computational units of the LSTM network [41]. These cells are made up of weights and gates. Each memory block contains one or more recurrently connected memory cells and three multiplicative units: input, output, and forget gates. The gates allow the information flows to interact with the cells. The forget gate and the input gate update the internal state, while the output gate is the final limiter of the cells’ output. These gates and the consistent data flow called CEC, or constant error carrousel, keep each cell stable [42]. For the implementation of this network, we are using the Keras framework for Python with the Tensorflow backend, using GPU processing and an improvedperformance version that uses Cudnn (CudnnLSTM) [43].
GRU Recurrent Network. Just like LSTM networks, GRU networks have a structure and formulation that improve the vanilla RNN. GRU was first proposed in Cho et al. [44] as an alternative to the LSTM to capture dependencies of different time scales adaptively. The only difference between these networks is the procedure for updating the CEC. It is similar to the LSTM but with one difference, the GRU units have no mechanism for controlling the exposure to which this data flow is submitted [45]. This lack of control mechanisms makes the GRU units faster than the LSTM and more adaptable to the changes in the time flow [46]. For the implementation of this network, we are using the Keras framework for Python with the Tensorflow backend, using GPU processing and an improvedperformance version that uses Cudnn (CudnnGRU) [43].
3.3. Optimization Methods
SGD methods are iterative methods used for optimizing an objective function. Adam is based on adaptive estimates of lowerorder moments. This method is simple to implement and computationally efficient and has few memory requirements. It does not change as a result of the diagonal rescaling of the gradients and works well for problems that are large in data and/or parameters. Adam is also appropriate for changing objectives and problems with very noisy and/or sparse gradients. The hyperparameters of this method are easy and intuitive to understand and usually require little tuning [47]. Based on Adam we have Nadam, which is an Adam version applying Nesterov momentum [48]. We have tested RMSprop, Adam, and Nadam, all of which are stochastic gradient descent methods, but we got our best results using Nadam to optimize our loss. Nadam brings more speed in learning in each minibatch step. Nadam gave us better results because we have a complex net and fewer epochs. We needed a faster loss function optimizer to learn more in fewer epochs, without fearing a fast Decay into overfitting.
3.4. Batch Normalization
This method works by making normalization a part of the model architecture and carrying out a normalization step for each training minibatch. It addresses the problem of the internal covariate shift, brought about by the values of the input layers’ changing during training. This problem requires low learning rates and a careful parameter initialization and makes it harder to train models with saturating nonlinearities. Batch Normalization allows us to use higher learning rates and pay less attention to initialization. It can also act as a regularizer, in some cases eliminating the need for other regularization techniques [49].
3.5. Evaluation Metrics
Metrics evaluate the performance of a machine learning model. Every metric measures the efficiency in a different way, so we use several metrics for our models in order to obtain a more accurate view.
3.5.1. Multiclass Logarithmic Loss and Categorical Cross Entropy
The logarithmic loss metric measures the performance of a classification model in which the prediction input is a probability value of between 0 and 1. Its formula is as follows:
where is the known label and is the prediction of the model. Logarithmic loss and cross entropy in machine learning when calculating error rates of between 0 and 1 lead to the same thing. The crossentropy formula is as follows:
If , and , ,
The same formula is applied in both situations. We can extend the logarithmic loss to multiclass problems, given the true labels of a set of samples encoded as a 1ofK binary indicator matrix , where if sample has label taken from a set of labels. Let be a matrix of probability estimates, with :
3.5.2. Multiclass Classification Error Rate
The multiclass error rate is the percentage of misclassifications made by the model:
3.5.3. FBeta Score
The Fbeta score is the weighted harmonic average of precision and recall, obtaining its best value at 1 and its worst value at 0. The parameter determines the weight of precision in the combined score. 1 lends more weight to precision, while 1 favors recall.
3.5.4. Categorical Accuracy
The calculation of the average accuracy rate across all predictions made for a multiclass problem is made using the following formula:
3.6. Dropout
Dropout is used to prevent overfitting. It works by randomly dropping units and their connections from the neural network during training. This prevents network units from adapting too much to a problem [50].
4. Experiments
Our experiments are based on three datasets, one for each attack. Before joining them, we balanced each one of them to reduce the huge differences between all of the classes. We balance the classes of each dataset using the resample method provided by Scikitlearn [51]. Once all of the datasets were balanced, we put them together to build a multiclass dataset. With the complete dataset ready, we chose the most representative features using a Feature Importance (FIM) report system. Our FIM algorithm is a hybrid method based on the mutual information function and it is composed by two routines; one corresponding to a filter process (based on the minimumredundancymaximumrelevance) and another corresponding to a wrapper process, where we used several models like SVM, Decision Trees, or Random Forests. This method confronts each feature of the dataset against the target feature. Choosing the highest values gives us the most important features for each set of data. After that, we confront each of the variables chosen in pairs between them and then we delete the highestvalued features to decrease redundancy. We also have to prepare our custom metric Fbeta score. Taking into account the Fbeta formula presented on the paper, we select beta = 1 to increase the value of the recall variable. The recall is the amount of data well classified in both parts, referring to the amount of present false positives and negatives. The classifications problems, in networks specifically, have many problems with false positives and negatives, so giving more value to the metric can make it more sensitive to these failures and could give us a more accurate vision. Immediately after that, we prepare the categorical values in order to make it possible to train both recurrent neural networks Box 1.

Finally, we set four timesteps for both recurrent LSTM and GRU networks, transforming the inputs into tensors made up of samples, timesteps, and features Box 2.

A hyperparameter search on recurrent networks is computationally expensive, so we have chosen their hyperparameters depending on logs of training, increasing the width and length of the network or increasing the periods if it is underfitted or by applying a batch normalization, dropout or reducing the length, width, or epochs to reduce overfitting. Now, we will describe our three different classification methods in greater detail.
4.1. XGBoost
We define the XGBoost model for our problem, highlighting the four types that we wish to classify and specifying both the tree method and the booster. We use a version of the tree method called the XGBoost fasthistogram algorithm. This method is much faster and uses considerably less memory than other methods [52], but it needs a specific version of CUDA to work. We also highlighted the evaluation metrics that we wanted to use (multiclass logarithmic loss and multiclass classification error rate), the number of threads and the number of estimators in the model. We have applied a grid search with a threefold cross validation to take the best parameters of the model. These are the parameters we wish to tune in Box 3.

This grid search gives us a set of parameters that perform best on the problem in Box 4.

4.2. Recurrent LSTM
For our LSTM network, we first compile some of the parameters of the net, setting the loss, the optimizer, and the metrics. Our loss is a variant of cross entropy for multiclassification called categorical cross entropy. We are using the unmodified version of the Nadam optimizer. We tested Adam, RMSprop, and Nadam, establishing that Nadam is more efficient than Adam and RMSprop for our model. We set the metrics categorical accuracy and fscore to measure the model’s accuracy and reliability, setting parameter for Fbetascore metric at 2 in Box 5.

We fit the model with our data, using a batch size of 128 and 15 epochs. We use a 10% validation split to validate the results of the training in Box 6.

We use an EncoderDecoder approach for our LSTM network. We also use a CUDA version of the LSTM cell from the Keras library [43]. In order to avoid overfitting, we used dropout, setting its value between 0.3 and 0.4 depending on the size of the previous layers, and batch normalization to control exploding gradients and speed up the training process in Box 7.

4.3. Recurrent GRU
For our GRU network, we compile the parameters of the net, setting the loss, the optimizer, and the metrics. We have set some of the GRU net parameters similar to our LSTM net. Our loss is a variant of cross entropy for multiclassification called categorical cross entropy. We are using the unmodified version of the Nadam optimizer. As we did on LSTM, we tested both Adam and Nadam, finding that Nadam is more efficient than Adam for our model. We set the categorical accuracy and fscore of the metrics to measure the model’s accuracy and reliability, setting parameter for Fbetascore metric at 2 in Box 8.

We fit the model with our data, using a batch size of 256 and 17 epochs. We use a 10% validation split to validate the results of the training in Box 9.

We use a linear structure approach for our GRU network. We also used a CUDA version of GRU cell from the Keras library [43]. In order to avoid overfitting, we used dropout, setting its value between 0.2 and 0.3 depending on the size of the previous layers, and batch normalization to control exploding gradients and speed up the training process. Because of the GRU cell design, it needs more time to learn than LSTM, although it is faster. This also affects dealing with the overfitting, needing fewer dropout values for the GRU net in Box 10.

5. Results and Discussion
Once we had the results of the search for the XGBoost, we trained the model and tested it on our data, with the following results as detailed in Figure 2 and Table 1.

Our LSTM and GRU networks gave us the following results for training and validation (Figures 3, 4, 5, 6 and Table 2).

In our previous work, the ensemble methods gave us better accuracies than the linear methods on the three datasets separately; i.e., for DoS, the best accuracy achieved was 0.99377 using a random forest model and Boosting Gradient achieved 0.99373, while SVM achieved 0.99023, taking into account the best two models and the worst. The difference was smaller for DoS, but on intrusion and MitM the difference between these two types of method was higher. Specifically, on intrusion Random Forest and Boosting Gradient they got 0.95294 and 0.95385, respectively, while SVM got 0.93031. The results were similar for intrusion. In our experiments on this paper, XGBoost achieved the highest accuracy. This result confirms that ensemble methods achieve higher accuracies and less loss than other linear models or neural networks such as SVM, GRU, and LSTM for problems involving attacks on IoT networks.
Multiclass classification problems tend to be more complex than binary problems, making getting better results harder for these problems. We had similar results in both experiments on ensemble models when classifying, where we maintain the highest metrics and results. Focusing on our GRU and LSTM models, we had better results overall using deep learning than using linear models, but we had worse results than ensembles. LSTM got worse result than the SVM’s DoS model and slightly better results than the SVM model for intrusion and MitM. GRU performed better, getting worse results than the SVM’s DoS, but better than SVM for intrusion and MitM.
Even though we dealt with imbalance, there are still huge differences between classes. This may have affected the accuracy in some of our models negatively, specifically the GRU and LSTM. We have been able to maintain a good result by taking the sequencing of the problem into account.
6. Conclusion
IoT systems have been growing in recent years and are expected to increase considerably. The special features of these devices make the network technologies more heterogeneous than traditional networks, presenting new challenges to cybersecurity. Taking into account the fact that IDS are an important security barrier that can detect intrusions and security risks in the network quickly, we propose models for the detection of attacks in IoT environments that can provide an IDS oriented for IoT. We use specific datasets with particular attacks for these systems, specifically for the MQTT protocol. In this case, machine learning techniques can be used to classify the frames that an IDS can assign as attack or normal. We chose the LSTM, GRU, and XGBoost models for our classification problem. We selected these recurrent models because of the importance of time and sequencing in network attacks. We picked XGBoost because the structure of the problem benefits the hierarchical ensemble method’s performance, enabling them to achieve the highest accuracies. All these three classification methods are very efficient, with GPU implementations. Ensemble methods obtained the highest results, and deep learning models achieved better results in general than linear models, but not as good as ensemble methods. These models can be used for future work in which an IDS is fed with a model. This IDS will be implemented in a standard computer similar to the one use for the creation of machine and deep learning models. Thus, the Python model will be deployed in a standard unit with a Port Mirroring from the router.
Data Availability
The dataset used to support the findings of this study is available in https://joseaveleira.es/dataset. ©® reg#LE22918.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
Acknowledgments
This work is partially supported by (i) Instituto Nacional de Ciberseguridad (INCIBE) and developed Research Institute of Applied Sciences in Cybersecurity (RIASC); (ii) Junta de Castilla y León, Consejería de Educación, Project LE078G18. UXXI2018/000149. U220.
References
 J. Green, “The Internet of Things Reference Model,” Internet of Things World Forum, pp. 1–12, 2014. View at: Google Scholar
 M. A. Razzaq, S. H. Gill, M. A. Qureshi, and S. Ullah, “Security Issues in the Internet of Things (IoT): A Comprehensive Study,” International Journal of Advanced Computer Science and Applications, vol. 8, no. 6, p. 383, 2017. View at: Google Scholar
 C. Ordóñez Galán, F. Sánchez Lasheras, F. J. de Cos Juez, and A. Bernardo Sánchez, “Missing data imputation of questionnaires by means of genetic algorithms with different fitness functions,” Journal of Computational and Applied Mathematics, vol. 311, pp. 704–717, 2017. View at: Publisher Site  Google Scholar
 C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, “DDoS in the IoT: mirai and other botnets,” IEEE Computer Society, vol. 50, no. 7, pp. 80–84, 2017. View at: Publisher Site  Google Scholar
 N. BenAsher and C. Gonzalez, “Effects of cyber security knowledge on attack detection,” in Computers in Human Behavior 48, , 5161. doi:10.1016/j.chb..01.039, URL http, //dx.doi.org/10.1016/j.chb.2015.01.039, 2015, http://dx.doi.org/10.1016/j.chb.2015.01.039. View at: Google Scholar
 K. Prabha and S. Sudha, “A Survey on IPS Methods and Techniques,” in Proceedings of the International Journal of Computer Science Issues 13 (2, vol. 13, pp. 38–43, 2016, http://ijcsi.org/contents.php. View at: Google Scholar
 T. Hamed, J. B. Ernst, and S. C. Kremer, “A Survey and Taxonomy of Classifiers of Intrusion Detection Systems,” in Proceedings of the URL, vol. 39, p. 21, Cham, 2018. View at: Google Scholar
 R. Perdisci, D. Ariu, P. Fogla, G. Giacinto, and W. Lee, “McPAD: a multiple classifier system for accurate payloadbased anomaly detection,” Computer Networks, vol. 53, no. 6, pp. 864–881, 2009. View at: Publisher Site  Google Scholar
 M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, “Towards generating reallife datasets for network intrusion detection,” International Journal of Network Security, vol. 17, no. 6, pp. 683–701, 2015. View at: Google Scholar
 S. J. Stolfo, KDD cup, URL http, //kdd.ics.uci.edu/, 1999, http://kdd.ics.uci.edu/.
 M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” in Proceedings of the 2nd IEEE Symposium on Computational Intelligence for Security and Defence Applications, pp. 1–6, IEEE, July 2009. View at: Publisher Site  Google Scholar
 M. Hasan, M. Nasser, B. Pal, and S. Ahmad, “Support Vector Machine and Random Forest Modeling for Intrusion Detection System (IDS),” Journal of Intelligent Learning Systems and Applications, Article ID 9601233, pp. 45–52, 2014, http://file.scirp.org/Html/59601233_42869.htm. View at: Google Scholar
 P. G. Nieto, J. A. Fernández, F. S. Lasheras, F. de Cos, and C. D. Juez, “A new improved study of cyanotoxins presence from experimental cyanobacteria concentrations in the trasona reservoir (northern spain) using the mars technique,” Science of the total environment, vol. 430, pp. 88–92, 2012. View at: Google Scholar
 B. Chakrabarty, O. Chanda, and M. Saiful, “Anomaly based intrusion detection system using genetic algorithm and Kcentroid clustering,” International Journal of Computer Applications, vol. 163, no. 11, pp. 13–17, 2017. View at: Publisher Site  Google Scholar
 J.h. Seo and Y.h. Kim, MachineLearning Approach to Optimize SMOTE Ratio in Class Imbalance Dataset for Intrusion Detection, 2018.
 R. A. R. Ashfaq, X. Z. Wang, J. Z. Huang, H. Abbas, and Y. L. He, “Fuzziness based semisupervised learning approach for intrusion detection system,” Information Sciences, vol. 378, pp. 484–497, 2017. View at: Publisher Site  Google Scholar
 R. Singh, H. Kumar, and R. K. Singla, “An intrusion detection system using network traffic profiling and online sequential extreme learning machine,” Expert Systems with Applications, vol. 42, no. 22, pp. 8609–8624, 2015. View at: Publisher Site  Google Scholar
 D. Kwon, H. Kim, J. Kim, S. C. Suh, I. Kim, and K. J. Kim, “A survey of deep learningbased network anomaly detection,” Cluster Computing. View at: Publisher Site  Google Scholar
 Y. Li, R. Ma, and R. Jiao, “A Hybrid Malicious Code Detection Method based on Deep Learning,” International Journal of Security and Its Applications, vol. 9, no. 5, pp. 205–216, 2015. View at: Publisher Site  Google Scholar
 P. García Nieto, J. Martínez Torres, F. de Cos Juez, and F. Sánchez Lasheras, “Using multivariate adaptive regression splines and multilayer perceptron networks to evaluate paper manufactured using Eucalyptus globulus,” Applied Mathematics and Computation, vol. 219, no. 2, pp. 755–763, 2012. View at: Publisher Site  Google Scholar
 X. Tao, D. Kong, Y. Wei, and Y. Wang, “A Big Network Traffic Data Fusion Approach Based on Fisher and Deep AutoEncoder,” Information, vol. 7, no. 2, p. 20, 2016. View at: Publisher Site  Google Scholar
 J. Kim, H. L. T. Thu, and H. Kim, “Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection,” in Proceedings of the International Conference on Platform Technology and Service (PlatCon, 2016), pp. 1–5, 2016, http://ieeexplore.ieee.org/document/7456805/. View at: Google Scholar
 Xingshuo An, Xianwei Zhou, Xing Lü, Fuhong Lin, and Lei Yang, “Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC,” Wireless Communications and Mobile Computing, vol. 2018, Article ID 7472095, 10 pages, 2018. View at: Publisher Site  Google Scholar
 F. Lu and L. Wang, “Intrusion Detection System Based on Integration of Neural Network for Wireless Sensor Network,” Journal of Software Engineering, vol. 8, no. 4, pp. 225–238, 2014. View at: Publisher Site  Google Scholar
 B. B. Zarpelão, R. S. Miani, C. T. Kawakani, and S. C. de Alvarenga, “A survey of intrusion detection in Internet of Things,” Journal of Network and Computer Applications, vol. 84, pp. 25–37, 2017. View at: Publisher Site  Google Scholar
 C. Kolias, G. Kambourakis, A. Stavrou, and S. Gritzalis, “Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset,” IEEE Communications Surveys & Tutorials, vol. 18, no. 1, pp. 184–208, 2016. View at: Publisher Site  Google Scholar
 M. E. Aminanto, H. C. Tanuwidjaja, P. D. Yoo, and K. Kim, “WiFi intrusion detection using weightedfeature selection for neural networks classifier,” in Proceedings of the 2017 International Workshop on Big Data and Information Security (IWBIS), pp. 99–104, Jakarta, September 2017. View at: Publisher Site  Google Scholar
 ids2017@www.unb.ca, https://www.unb.ca/cic/datasets/ids2017.html, 2017.
 Z.Q. Qin, X.K. Ma, and Y.J. Wang, “Attentional Payload Anomaly Detector for Web Applications,” in Proceedings of the Neural Information Processing, L. Cheng, A. C. S. Leung, and S. Ozawa, Eds., Springer, pp. 588–599, Cham, Switzerland, 2018. View at: Google Scholar
 P. Sethi and S. R. Sarangi, Internet of Things: Architectures, Protocols, and Applications, 2017.
 T. Halabi and M. Bellaiche, “How to evaluate the defense against dos and ddos attacks in cloud computing: a survey and taxonomy,” International Journal of Computer Science and Information Security (IJCSIS), vol. 14, no. 12, pp. 1–10, 2016. View at: Google Scholar
 K. Palsson, mqttmalaria@github.com (2018). https://github.com/remakeelectric/mqttmalaria.
 S. Andy, B. Rahardjo, and B. Hanindhito, “Attack Scenarios and Security Analysis of MQTT Communication Protocol in IoT System,” in Proceedings of the 4th International Conference on Electrical Engineering, Computer Science and Informatics, EECSI 2017, pp. 19–21, IEEE, Yogyakarta, Indonesia, 2017. View at: Google Scholar
 M. Ahmadi, D. Ulyanov, S. Semenov, M. Trofimov, and G. Giacinto, “Novel feature extraction, selection and fusion for effective malware family classification,” in Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, CODASPY ’16, pp. 183–194, ACM, New York, NY, USA, 2016, http://doi.acm.org/10.1145/2857705.2857713. View at: Google Scholar
 D. Barradas, N. Santos, and L. Rodrigues, “Effective detection of multimedia protocol tunneling using machine learning,” in Proceedings of the 27th USENIX Security Symposium (USENIX Security 18), pp. 169–185, USENIX Association, Baltimore, MD, USA, 2018, https://www.usenix.org/conference/usenixsecurity18/presentation/barradas. View at: Google Scholar
 Y. Meidan, M. Bohadana, A. Shabtai et al., “Profiliot: A machine learning approach for iot device identification based on network traffic analysis,” in Symposium on Applied Computing, SAC '17, pp. 506–509, ACM, New York, NY, USA, 2017, http://doi.acm.org/10.1145/3019612.doi:10.1145/3019612. View at: Google Scholar
 J. H. Friedman, “Greedy function approximation: a gradient boosting machine,” Annals of Statistics, vol. 29, no. 5, pp. 1189–1232, 2001. View at: Publisher Site  Google Scholar  MathSciNet
 T. Chen and C. Guestrin, “XGBoost: A Scalable Tree Boosting System,” in Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2016, pp. 785–794, 2016, https://arxiv.org/abs/1603.02754. View at: Google Scholar
 XGBoost library, https://xgboost.readthedocs.io/en/latest/tutorials/index.html.
 R. Pascanu, T. Mikolov, and Y. Bengio, “On the difficulty of training Recurrent Neural Networks,” https://arxiv.org/abs/1211.5063, 2012. View at: Google Scholar
 T. U. Munich, “Framewise Phoneme Classification with Bidirectional LSTM and Other Neural Network Architectures,” Neural Networks, vol. 18, no. 5, Article ID 7647316, pp. 602–610, 2004. View at: Google Scholar
 S. Hochreiter and J. Schmidhuber, “Long shortterm memory,” Neural Computation, vol. 9, no. 8, pp. 1735–1780, 1997. View at: Publisher Site  Google Scholar
 F. Chollet et al., “Keras: The Python Deep Learning library,” https://keras.io. View at: Google Scholar
 K. Cho, B. van Merrienboer, C. Gulcehre et al., “Learning Phrase Representations using RNN EncoderDecoder for Statistical Machine Translation,” https://arxiv.org/abs/1406.1078, 2014. View at: Google Scholar
 J. Chung, C. Gulcehre, K. Cho, and Y. Bengio, “Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling,” https://arxiv.org/abs/1412.3555, p. 1–9, 2014. View at: Google Scholar
 K. Cho, B. van Merrienboer, D. Bahdanau, and Y. Bengio, “On the Properties of Neural Machine Translation: Encoder–Decoder Approaches,” https://arxiv.org/abs/1409.1259, 2014. View at: Google Scholar
 D. P. Kingma and J. Ba, Adam: A Method for Stochastic Optimization, https://arxiv.org/abs/1412.6980v8, p. 15, 2015. View at: MathSciNet
 G. E. Dahl, T. N. Sainath, and G. E. Hinton, “Improving deep neural networks for LVCSR using rectified linear units and dropout,” in Proceedings of the 38th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '13), pp. 8609–8613, May 2013. View at: Publisher Site  Google Scholar
 S. Ioffe and C. Szegedy, Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift, http://arxiv.org/abs/1502.03167.
 A. Agarwal, S. Negahban, and M. J. Wainwright, “Noisy matrix decomposition via convex relaxation: Optimal rates in high dimensions,” The Annals of Statistics, vol. 40, no. 2, pp. 1171–1197, 2012. View at: Publisher Site  Google Scholar
 F. Pedregosa, G. Varoquaux, A. Gramfort et al., “Scikitlearn: machine learning in Python,” Journal of Machine Learning Research (JMLR), vol. 12, pp. 2825–2830, 2011. View at: Google Scholar  MathSciNet
 R. Mitchell and E. Frank, “Accelerating the XGBoost algorithm using GPU computing,” PeerJ Computer Science, vol. 3, 2017, https://peerj.com/articles/cs127. View at: Google Scholar
Copyright
Copyright © 2019 Hector AlaizMoreton et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.