The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment

Main Article Content

Sawsan H. Jadoaa
Rasha H. Ali
Wisal Hashim Abdulsalam
Emad M. Alsaedi

Abstract

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities.


This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tree (DT) and mutual information (MI). For classification, adaptive boosting (AdaBoost), XGBoost and categorical boosting (CatBoosting) are used to categorize incoming data as normal or spoofing. The experimental results indicate the efficiency of the suggested approach for correctly identifying spoofing attacks with high accuracy, fewer false positives, and reduced time needed. By utilizing feature importance and robust classification algorithms, the system can accurately differentiate between legitimate and malicious IoT traffic, thereby improving the overall security of IoT networks. The CatBoost classifier outperformed the AdaBoost and XGBoost classifiers in terms of accuracy.


 

Article Details

Section

Articles

How to Cite

The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment (S. H. . Jadoaa, R. H. Ali, W. H. . Abdulsalam, & E. M. . Alsaedi , Trans.). (2025). Mesopotamian Journal of CyberSecurity, 5(1), 240-255. https://doi.org/10.58496/MJCS/2025/016

References

[1] Z. Abou El Houda, B. Brik, and S.-M. Senouci, "A novel iot-based explainable deep learning framework for intrusion detection systems," IEEE Internet of Things Magazine, vol. 5, pp. 20-23, 2022. https://doi.org/10.1109/IOTM.005.2200028

[2] S. Abbas, A. Al Hejaili, G. A. Sampedro, M. Abisado, A. Almadhor, T. Shahzad, et al., "A Novel Federated Edge Learning Approach for Detecting Cyberattacks in IoT Infrastructures," IEEE Access, 2023. https://doi.org/10.1109/ACCESS.2023.3318866

[3] W. H. Abdulsalam, S. Mashhadani, S. S. Hussein, and A. A. Hashim, "Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition," International Journal of Mathematics and Computer Science, vol. 20, no. 1, pp. 165-171, 2025. doi:10.69793/ijmcs/01.2025/abdulsalam

[4] S. Mashhadani, W. H. Abdulsalam, I. Alhakam, O. A. Hassen, and S. M. Darwish, "An enhanced document source identification system for printer forensic applications based on the boosted quantum KNN classifier," Eng. Technol. Appl. Sci. Res., vol. 15, no. 1, pp. 19983–19991, 2025, doi: 10.48084/etasr.9420.

[5] A. S. Wisam, K. J. Khalid,, and K. Q. Luheb, "A Proposed Hybrid Text Cryptographic Method Using Circular Queue," IJCET, vol. 9, no. 7, pp. 1123-1132, 2018.

[6] R. H. Ali and W. H. Abdulsalam, "Attention-Deficit Hyperactivity Disorder Prediction by Artificial Intelligence Techniques," Iraqi Journal of Science, vol. 65, no. 9, pp. 5281-5294, 2024. doi:10.24996/ijs.2024.65.9.39

[7] W. H. Abdulsalam, R. S. Alhamdani, and M. N. Abdullah, "Speech Emotion Recognition Using Minimum Extracted Features," 1st Annual International Conference on Information and Sciences (AiCIS), pp. 58-61, 2018. https://doi.org/10.1109/AiCIS.2018.00023

[8] R. H. Ali, "Artificial intelligence techniques to predict the performance of teachers for kindergarten: Iraq as a case study," Evolutionary Intelligence, vol. 17, pp. 313-325, 2024. https://doi.org/10.1007/s12065-022-00731-0

[9] F. Khan, A. A. Al-Atawi, A. Alomari, A. Alsirhani, M. M. Alshahrani, J. Khan, et al., "Development of a Model for Spoofing Attacks in Internet of Things," Mathematics, vol. 10, no. 19, 2022. https://doi.org/10.3390/math10193686

[10] A. B. Altamimi, M. Ahmed, W. Khan, M. Alsaffar, A. Ahmad, Z. H. Khan, et al., "PhishCatcher: Client-Side Defense Against Web Spoofing Attacks Using Machine Learning," IEEE Access, 2023.

[11] X. Cheng, J. Zhou, X. Zhao, H. Wang, and Y. Li, "A presentation attack detection network based on dynamic convolution and multilevel feature fusion with security and reliability," Future Generation Computer Systems, vol. 146, pp. 114-121, 2023. https://doi.org/10.1016/j.future.2023.04.012

[12] X. Wei, M. N. Aman, and B. Sikdar, "A Light-Weight Technique to Detect GPS Spoofing Using Attenuated Signal Envelopes," IEEE Open Journal of the Computer Society, 2023. https://doi.org/10.1109/OJCS.2023.3278496

[13] M. Shabbir, M. Kamal, Z. Ullah, and M. M. Khan, "Securing Autonomous Vehicles Against GPS Spoofing Attacks: A Deep Learning Approach," IEEE Access, 2023. https://doi.org/10.1109/ACCESS.2023.3319514

[14] H. H. Htun, M. Biehl, and N. Petkov, "Survey of feature selection and extraction techniques for stock market prediction," Financial Innovation, vol. 9, pp. 26, 2023. https://doi.org/10.1186/s40854-022-00441-7

[15] D. K. Ghurkan and A. A. Abdulrahman, "Construct an Efficient DDoS Attack Detection System Based on RF-C4. 5-GridSearchCV," pp. 120-124, 2022. https://doi.org/10.1109/IICCIT55816.2022.10010645

[16] B. H. Majeed, W. H. Abdulsalam, Z. H. Ibrahim, R. H. Ali, and S. Mashhadani, "Digital Intelligence for University Students Using Artificial Intelligence Techniques," International Journal of Computing and Digital Systems, vol. 17, no. 1, pp. 1–16, 2024. http://dx.doi.org/10.12785/ijcds/1571029446

[17] T. M. Cover and J. A. Thomas, Elements of Information Theory. New York, NY, USA: Wiley, 1991.

[18] A. Maslan, K. M. B. Mohamad, and F. B. M. Foozy, "Feature selection for DDoS detection using classification machine learning techniques," IAES International Journal of Artificial Intelligence, vol. 9, pp. 137, 2020. https://doi.org/10.11591/ijai.v9.i1.pp137-145

[19] V. C.P. and A. A. Chikkamannur, "Feature Selection: An Empirical Study," International Journal of Engineering Trends and Technology, vol. 69, no. 2, pp. 165-170, 2021. https://doi.org/10.14445/22315381/IJETT-V69I2P223

[20] A. S. S. Abinayaa et al., "Securing the edge: Catboost classifier optimized by the Lyrebird algorithm to detect denial of service attacks in Internet of Things-based wireless sensor networks," Future Internet, vol. 16, no. 10, 2024, doi: 10.3390/fi16100381.

[21] R. M. Zaki and I. S. Naser, "Hybrid classifier for detecting zero-day attacks on IoT networks," Mesopotamian J. CyberSecurity, vol. 4, no. 3, pp. 59–74, 2024, doi: 10.58496/MJCS/2024/016.

[22] W. H. Abdulsalam, R. H. Ali, S. H. Jadooa, and S. S. Hussein, "Automated glaucoma detection techniques: A literature review," Eng. Technol. Appl. Sci. Res., vol. 15, no. 1, pp. 19891–19897, 2025, doi: 10.48084/etasr.9316.

[23] K. K.Ruma et al., "The optimization problems for public key cryptosystem," AIP Conf. Proc., vol. 3264, no. 1, 2025, doi: 10.1063/5.0259007.

[24] E. C. P. Neto, S. Dadkhah, R. Ferreira, A. Zohourian, R. Lu, and A. A. Ghorbani, "CICIoT2023: A real-time dataset and benchmark for large-scale attacks in IoT environment," 2023. https://doi.org/10.20944/preprints202305.0443.v1

[25] I. A. F. Alzuabidi et al., "Deep learning for the recognition of skin cancer," in Proc. 2nd Int. Conf. Adv. Comput. Appl. (ACA), 2023, pp. 1–6, doi: 10.1109/ACA57612.2023.10346847.

[26] A. M. Salman et al., "Enhancing cybersecurity with machine learning: A hybrid approach for anomaly detection and threat prediction," Mesopotamian J. CyberSecurity, vol. 5, no. 1, pp. 202–215, 2025, doi: 10.58496/MJCS/2025/014.

[27] A. Alsajri, A. Steiti, and H. A. Salman , Trans., “Enhancing IoT Security to Leveraging ML for DDoS Attack Prevention in Distributed Network Routing”, BJIoT, vol. 2023, pp. 74–84, Oct. 2023, doi: 10.58496/BJIoT/2023/010.

[28] L. Hussain, “Fortifying AI Against Cyber Threats Advancing Resilient Systems to Combat Adversarial Attacks”, EDRAAK, vol. 2024, pp. 26–31, Mar. 2024, doi: 10.70470/EDRAAK/2024/004.

Similar Articles

You may also start an advanced similarity search for this article.