Cited 17 time in
Generating Synthetic Dataset for ML-Based IDS Using CTGAN and Feature Selection to Protect Smart IoT Environments
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Alabdulwahab, Saleh | - |
| dc.contributor.author | Kim, Young-Tak | - |
| dc.contributor.author | Seo, Aria | - |
| dc.contributor.author | Son, Yunsik | - |
| dc.date.accessioned | 2024-08-08T08:30:50Z | - |
| dc.date.available | 2024-08-08T08:30:50Z | - |
| dc.date.issued | 2023-10 | - |
| dc.identifier.issn | 2076-3417 | - |
| dc.identifier.issn | 2076-3417 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/20424 | - |
| dc.description.abstract | Networks within the Internet of Things (IoT) have some of the most targeted devices due to their lightweight design and the sensitive data exchanged through smart city networks. One way to protect a system from an attack is to use machine learning (ML)-based intrusion detection systems (IDSs), significantly improving classification tasks. Training ML algorithms require a large network traffic dataset; however, large storage and months of recording are required to capture the attacks, which is costly for IoT environments. This study proposes an ML pipeline using the conditional tabular generative adversarial network (CTGAN) model to generate a synthetic dataset. Then, the synthetic dataset was evaluated using several types of statistical and ML metrics. Using a decision tree, the accuracy of the generated dataset reached 0.99, and its lower complexity reached 0.05 s training and 0.004 s test times. The results show that synthetic data accurately reflect real data and are less complex, making them suitable for IoT environments and smart city applications. Thus, the generated synthetic dataset can further train models to secure IoT networks and applications. © 2023 by the authors. | - |
| dc.format.extent | 20 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | MDPI | - |
| dc.title | Generating Synthetic Dataset for ML-Based IDS Using CTGAN and Feature Selection to Protect Smart IoT Environments | - |
| dc.type | Article | - |
| dc.publisher.location | 스위스 | - |
| dc.identifier.doi | 10.3390/app131910951 | - |
| dc.identifier.scopusid | 2-s2.0-85174190917 | - |
| dc.identifier.wosid | 001083747500001 | - |
| dc.identifier.bibliographicCitation | Applied Sciences, v.13, no.19, pp 1 - 20 | - |
| dc.citation.title | Applied Sciences | - |
| dc.citation.volume | 13 | - |
| dc.citation.number | 19 | - |
| dc.citation.startPage | 1 | - |
| dc.citation.endPage | 20 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | Y | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Chemistry | - |
| dc.relation.journalResearchArea | Engineering | - |
| dc.relation.journalResearchArea | Materials Science | - |
| dc.relation.journalResearchArea | Physics | - |
| dc.relation.journalWebOfScienceCategory | Chemistry, Multidisciplinary | - |
| dc.relation.journalWebOfScienceCategory | Engineering, Multidisciplinary | - |
| dc.relation.journalWebOfScienceCategory | Materials Science, Multidisciplinary | - |
| dc.relation.journalWebOfScienceCategory | Physics, Applied | - |
| dc.subject.keywordPlus | INTRUSION DETECTION | - |
| dc.subject.keywordPlus | PERFORMANCE | - |
| dc.subject.keywordPlus | INTERNET | - |
| dc.subject.keywordAuthor | advanced persistent threat | - |
| dc.subject.keywordAuthor | CTGAN | - |
| dc.subject.keywordAuthor | information security | - |
| dc.subject.keywordAuthor | intrusion detection system | - |
| dc.subject.keywordAuthor | IoT | - |
| dc.subject.keywordAuthor | machine learning | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
