Enhancing IoT Security Through User Categorization and Aberrant Behavior Detection Using RBAC and Machine Learning

被引:0
作者
Izzeddin, A. O. Alshawwa [1 ]
Bin Yahaya, Nor Adnan [1 ]
Mahmoud, Ahmed Y. [2 ]
机构
[1] Univ Malaysia Comp Sci & Engn UNIMY, Petaling Jaya, Malaysia
[2] Al Azhar Univ Gaza, Fac Engn & Informat Technol, Gaza, Palestine
关键词
Machine learning; classification; SVM; LOF; IF classification methods; aberrant user behavior; Role-Based Access Control (RBAC); IoT user dataset and user categorization; OUTLIER DETECTION; INTERNET;
D O I
10.14569/IJACSA.2024.0151265
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
proliferation of Internet of Things (IoT) technology in recent years has revolutionized several industries, providing customers with reliable and efficient IoT services. However, as the IoT ecosystem grows, attention has switched away from straightforward user access to the crucial topic of security. Among others, there is a need to categorize users according to the actions they conduct as well as according to aberrant user behavior. By utilizing Role-Based Access Control (RBAC) and merging the categorization of access rights with the identification of aberrant behavior, access points to the Internet of Things will be strengthened in terms of security and dependability. A system is proposed to identify security flaws and prompt rapid remediation, with the incorporation of a classification of aberrant user behaviors which, in turn, offers a thorough defense against any outside threats. Three classification methods which are Support Vector Machine (SVM), Local Outlier Factor (LOF), and Isolation Forest (IF), were utilized in the study and their accuracy were compared. The results demonstrate the effectiveness of machine learning approaches using a dataset for IoT users, achieving high accuracy in identifying anomalous user behavior and enabling prompt implementation of necessary actions.
引用
收藏
页码:638 / 647
页数:10
相关论文
共 27 条
[1]   Secure and dynamic access control for the Internet of Things (IoT) based traffic system [J].
Aftab, Muhammad Umar ;
Oluwasanmi, Ariyo ;
Alharbi, Abdullah ;
Sohaib, Osama ;
Nie, Xuyun ;
Qin, Zhiguang ;
Ngo, Son Tung .
PEERJ COMPUTER SCIENCE, 2021,
[2]  
Alagappan Annamalai, 2022, 2022 IEEE 7th International Conference on Recent Advances and Innovations in Engineering (ICRAIE), P154, DOI 10.1109/ICRAIE56454.2022.10054330
[3]   A Review of Local Outlier Factor Algorithms for Outlier Detection in Big Data Streams [J].
Alghushairy, Omar ;
Alsini, Raed ;
Soule, Terence ;
Ma, Xiaogang .
BIG DATA AND COGNITIVE COMPUTING, 2021, 5 (01) :1-24
[4]   A Comprehensive Security Framework for Asymmetrical IoT Network Environments to Monitor and Classify Cyberattack via Machine Learning [J].
Alqahtani, Ali ;
Alsulami, Abdulaziz A. ;
Alqahtani, Nayef ;
Alturki, Badraddin ;
Alghamdi, Bandar M. .
SYMMETRY-BASEL, 2024, 16 (09)
[5]   Outlier Detection in Indoor Localization and Internet of Things (IoT) using Machine Learning [J].
Bhatti, Mansoor Ahmed ;
Riaz, Rabia ;
Rizvi, Sanam Shahla ;
Shokat, Sana ;
Riaz, Farina ;
Kwon, Se Jin .
JOURNAL OF COMMUNICATIONS AND NETWORKS, 2020, 22 (03) :236-243
[6]   Using machine learning algorithms to enhance IoT system security [J].
El-Sofany, Hosam ;
El-Seoud, Samir A. ;
Karam, Omar H. ;
Bouallegue, Belgacem .
SCIENTIFIC REPORTS, 2024, 14 (01)
[7]   Dynamic Role-Based Access Control Policy for Smart Grid Applications: An Offline Deep Reinforcement Learning Approach [J].
Fragkos, Georgios ;
Johnson, Jay ;
Tsiropoulou, Eirini Eleni .
IEEE TRANSACTIONS ON HUMAN-MACHINE SYSTEMS, 2022, 52 (04) :761-773
[8]   Machine Learning in IoT Security: Current Solutions and Future Challenges [J].
Hussain, Fatima ;
Hussain, Rasheed ;
Hassan, Syed Ali ;
Hossain, Ekram .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1686-1721
[9]   Understanding User Behavior Through the Use of Unsupervised Anomaly Detection: Proof of Concept Using Internet of Things Smart Home Thermostat Data for Improving Public Health Surveillance [J].
Jalali, Niloofar ;
Sahu, Kirti Sundar ;
Oetomo, Arlene ;
Morita, Plinio Pelegrini .
JMIR MHEALTH AND UHEALTH, 2020, 8 (11)
[10]   Outlier Detection Approaches Based on Machine Learning in the Internet-of-Things [J].
Jiang, Jinfang ;
Han, Guangjie ;
Liu, Li ;
Shu, Lei ;
Guizani, Mohsen .
IEEE WIRELESS COMMUNICATIONS, 2020, 27 (03) :53-59