Enhancing IoT Device Security: A Comparative Analysis of Machine Learning Algorithms for Attack Detection

被引:0
作者
Alzahrani, Abdulaziz [1 ]
Alshammari, Abdulaziz [1 ]
机构
[1] Imam Mohammad Ibn Saud Islamic Univ, Riyadh, Saudi Arabia
来源
FORTHCOMING NETWORKS AND SUSTAINABILITY IN THE AIOT ERA, VOL 1, FONES-AIOT 2024 | 2024年 / 1035卷
关键词
Machine Learning; Logistic Regression; Decision Tree; Random Forest;
D O I
10.1007/978-3-031-62871-9_7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This study sought to compare the effectiveness, efficiency, and scalability of supervised learning algorithms; logistic regression, decision tree, and random forest in IoT networks' attack detection and evaluate the effectiveness of these algorithms in adapting to evolving attack techniques in IoT networks. The study deployed data from a Telecom company encompassing a dataset with a total of 10,000 records and 8 attributes. Furthermore, the dataset comprised both normal and malicious traffic, with 3,000 records classified as attacks and 6,000 records classified as normal traffic. To ensure the creation of reliable and predictive models, a statistical sampling technique called Synthetic Minority OverSampling Technique (SMOTE) was employed. Based on the experiments, the logistic regression algorithm proved to be the most accurate, followed by random forest, and lastly the decision tree algorithm. In the context of IoT device security, the research contributed to an understanding of data preprocessing techniques, feature engineering, and model evaluation. The correlation analysis and heatmap visualization provide valuable insights into the relationships between various variables and highlight potential patterns and trends in the data. This study provides significant knowledge on the improvement of IoT devices' security via machine learning algorithms.
引用
收藏
页码:71 / 91
页数:21
相关论文
共 19 条
[1]   Security in Internet of Things: issues, challenges, taxonomy, and architecture [J].
Adat, Vipindev ;
Gupta, B. B. .
TELECOMMUNICATION SYSTEMS, 2018, 67 (03) :423-441
[2]   Neural networks versus Logistic regression for 30 days all-cause readmission prediction [J].
Allam, Ahmed ;
Nagy, Mate ;
Thoma, George ;
Krauthammer, Michael .
SCIENTIFIC REPORTS, 2019, 9
[3]   Internet of Things (IoT) Security Requirements: Issues Related to Sensors [J].
Alqarni, Hussain ;
Alnahari, Wael ;
Quasim, Mohammad Tabrez .
2021 IEEE NATIONAL COMPUTING COLLEGES CONFERENCE (NCCC 2021), 2021, :29-34
[4]  
Arshad A., 2023, Decis. Anal. J, V8, P100307, DOI [10.1016/J.DAJOUR.2023.100307, DOI 10.1016/J.DAJOUR.2023.100307]
[5]   A Comparative Analysis of Machine Learning Algorithms to Predict Alzheimer's Disease [J].
Bari Antor, Morshedul ;
Jamil, A. H. M. Shafayet ;
Mamtaz, Maliha ;
Monirujjaman Khan, Mohammad ;
Aljahdali, Sultan ;
Kaur, Manjit ;
Singh, Parminder ;
Masud, Mehedi .
JOURNAL OF HEALTHCARE ENGINEERING, 2021, 2021
[6]  
Bernard S, 2009, IEEE IJCNN, P790, DOI 10.1109/IJCNN.2009.5178693
[7]  
Bharadiya J., 2023, Eur. J. Technol., V7, P1, DOI [10.47672/ejt.1486, DOI 10.47672/EJT.1486]
[8]  
Boateng E. Y., 2019, J Data Anal Inf Process, V7, P190, DOI [10.4236/jdaip.2019.74012, DOI 10.4236/JDAIP.2019.74012]
[9]   Using Random Forest Algorithm for Breast Cancer Diagnosis [J].
Dai, Bin ;
Chen, Rung-Ching ;
Zhu, Shun-Zhi ;
Zhang, Wei-Wei .
2018 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2018), 2018, :449-452
[10]  
Farid D.M., 2014, 2014 INT C INF EL VI, P1