JOURNAL ARTICLE

Ensembling PCA-based Feature Selection with Random Tree Classifier for Intrusion Detection on IoT Network

Abstract

Technologies, applications and services of Internet of Things (IoT) are growing tremendously. This IoT blast provides an extensive choice of opportunities for consumers and manufacturer, but at the same time carriages major risks with regards to security. As more appliances and sensors become interconnected, securing them will be the major challenge. In order to make IoT objects work efficiently, hardware, software and connectivity require being secured. Less consideration on security for IoT, the connected objects may degrade the performance of services provided by the IoT network. One significant type of attack is denial of service attack (DoS) caused by manipulating handshake Transmission Control Protocol (TCP) mechanism, i.e.: TCP SYN flooding. To solve the DoS attack on IoT networks, ones use Intrusion detection system (IDS) as a potential solution. This paper proposes IDS by combining principle component analysis (PCA) feature selection technique with 3 classifier algorithms, i.e.: Random Tree (RT), K-Means, and Naïve Bayes (NB). Experimental results on IoT tesbed networks traffic dataset show that the proposed IDS using Random Tree classifier achieves the best performance in term of accuracy and energy consumption.

Keywords:
Computer science Denial-of-service attack Naive Bayes classifier Computer network Internet of Things Intrusion detection system Feature selection Network packet Random tree Flooding (psychology) Random forest Classifier (UML) Firewall (physics) Computer security Data mining Machine learning Artificial intelligence The Internet Support vector machine Entropy (arrow of time)

Metrics

8
Cited By
0.83
FWCI (Field Weighted Citation Impact)
26
Refs
0.74
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Anomaly Detection Techniques and Applications
Physical Sciences →  Computer Science →  Artificial Intelligence
© 2026 ScienceGate Book Chapters — All rights reserved.