Enhancing SIoT Security Through Advanced Machine Learning Techniques for Intrusion Detection

被引:0
作者
Divya, S. [1 ]
Tanuja, R. [1 ]
机构
[1] Bangalore Univ, Univ Visvesvaraya Coll Engn, Dept Comp Sci & Engn, Bengaluru, India
来源
COMMUNICATION AND INTELLIGENT SYSTEMS, VOL 1, ICCIS 2023 | 2024年 / 967卷
关键词
SIoT security; Intrusion detection; Machine learning techniques; Advanced security;
D O I
10.1007/978-981-97-2053-8_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study delves into the intricacies of SIoT networks, characterized by diverse data modalities, sensor data, device interactions, and social connections. In order to address evolving threats, a comprehensive approach is proposed, integrating advanced ML models-Convolutional Neural Network (CNN), Generative Adversarial Network (GAN), Logistic Regression (LR)- in order to detect intrusions in SIoT environments. The method encompasses rigorous data collection, preprocessing, feature selection, and model training. Performance evaluation reveals CNN + GAN's superiority with an 85% accuracy, surpassing other models. Detailed metrics include precision, accuracy, recall, ROC AUC, and F1-score, emphasizing the effectiveness of the proposed approach. This research significantly advances SIoT security, offering insights crucial for designing secure and resilient networks in the increasingly interconnected landscape.
引用
收藏
页码:105 / 116
页数:12
相关论文
共 21 条
  • [1] Distinctive Measurement Scheme for Security and Privacy in Internet of Things Applications Using Machine Learning Algorithms
    Alhalabi, Wadee
    Al-Rasheed, Amal
    Manoharan, Hariprasath
    Alabdulkareem, Eatedal
    Alduailij, Mai
    Alduailij, Mona
    Selvarajan, Shitharth
    [J]. ELECTRONICS, 2023, 12 (03)
  • [2] SIDS: A federated learning approach for intrusion detection in IoT using Social Internet of Things
    Amiri-Zarandi, Mohammad
    Dara, Rozita A.
    Lin, Xiaodong
    [J]. COMPUTER NETWORKS, 2023, 236
  • [3] Decentralized Self-Enforcing Trust Management System for Social Internet of Things
    Azad, Muhammad Ajmal
    Bag, Samiran
    Hao, Feng
    Shalaginov, Andrii
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) : 2690 - 2703
  • [4] Disarming visualization-based approaches in malware detection systems
    Fasci, Lara Saidia
    Fisichella, Marco
    Lax, Gianluca
    Qian, Chenyi
    [J]. COMPUTERS & SECURITY, 2023, 126
  • [5] Datasets are not enough: Challenges in labeling network traffic
    Guerra, Jorge Luis
    Catania, Carlos
    Veas, Eduardo
    [J]. COMPUTERS & SECURITY, 2022, 120
  • [6] Label noise analysis meets adversarial training: A defense against label poisoning in federated learning
    Hallaji, Ehsan
    Razavi-Far, Roozbeh
    Saif, Mehrdad
    Herrera-Viedma, Enrique
    [J]. KNOWLEDGE-BASED SYSTEMS, 2023, 266
  • [7] Development of a Machine-Learning Intrusion Detection System and Testing of Its Performance Using a Generative Adversarial Network
    Mari, Andrei-Grigore
    Zinca, Daniel
    Dobrota, Virgil
    [J]. SENSORS, 2023, 23 (03)
  • [8] Big IoT Data Analytics: Architecture, Opportunities, and Open Research Challenges
    Marjani, Mohsen
    Nasaruddin, Fariza
    Gani, Abdullah
    Karim, Ahmad
    Hashem, Ibrahim Abaker Targio
    Siddiqa, Aisha
    Yaqoob, Ibrar
    [J]. IEEE ACCESS, 2017, 5 : 5247 - 5261
  • [9] Detecting Zero-Day Intrusion Attacks Using Semi-Supervised Machine Learning Approaches
    Mbona, Innocent
    Eloff, Jan H. P.
    [J]. IEEE ACCESS, 2022, 10 : 69822 - 69838
  • [10] CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment
    Neto, Euclides Carlos Pinto
    Dadkhah, Sajjad
    Ferreira, Raphael
    Zohourian, Alireza
    Lu, Rongxing
    Ghorbani, Ali A.
    [J]. SENSORS, 2023, 23 (13)