A hybrid approach using support vector machine rule-based system: detecting cyber threats in internet of things

被引:7
作者
Ashraf, M. Wasim Abbas [1 ]
Singh, Arvind R. [2 ]
Pandian, A. [3 ]
Rathore, Rajkumar Singh [4 ]
Bajaj, Mohit [5 ,6 ,7 ]
Zaitsev, Ievgen [8 ,9 ]
机构
[1] Hanjiang Normal Univ, Sch Math & Comp Sci, Shiyan 442000, Hubei, Peoples R China
[2] Hanjiang Normal Univ, Sch Phys & Elect Engn, Dept Elect Engn, Shiyan 442000, Hubei, Peoples R China
[3] Koneru Lakshmaiah Educ Fdn, Guntur, AP, India
[4] Cardiff Metropolitan Univ, Sch Technol, Cardiff CF5 2YB, Wales
[5] Graph Era, Dept Elect Engn, Dehra Dun 248002, India
[6] Al Ahliyya Amman Univ, Hourani Ctr Appl Sci Res, Amman, Jordan
[7] Univ Business & Technol, Coll Engn, Jeddah 21448, Saudi Arabia
[8] Natl Acad Sci Ukraine, Inst Electrodynam, Dept Theoret Elect Engn & Diagnost Elect Equipment, Beresteyskiy 56,Kyiv 57, UA-03680 Kyiv, Ukraine
[9] Natl Acad Sci Ukraine, Ctr Informat Analyt & Tech Support Nucl Power Faci, Akad Palladina Ave 34-A, Kyiv, Ukraine
关键词
Internet of things; Cyber threats detection; Integrating; Machine learning; Anomaly Detection; Heuristic algorithms; Transfer learning; Hybrid; Support Vector Machine; IOT; FRAMEWORK; DESIGN; MODEL;
D O I
10.1038/s41598-024-78976-1
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
While the proliferation of the Internet of Things (IoT) has revolutionized several industries, it has also created severe data security concerns. The security of these network devices and the dependability of IoT networks depend on efficient threat detection. Device heterogeneity, computing resource constraints, and the ever-changing nature of cyber threats are a few of the obstacles that make detecting cyber threats in IoT systems difficult. Complex threats often go undetected by conventional security measures, requiring more sophisticated, adaptive detection methods. Therefore, this study presents the Hybrid approach based on the Support Vector Machines Rule-Based Detection (HSVMR-D) method for an all-encompassing approach to identifying cyber threats to the IoT. The HSVMR-D employs SVM to categorize known and unknown threats using attributes acquired from IoT data. Identifying known attack signatures and patterns using rule-based approaches improves detection efficiency without retraining by adapting pre-trained models to new IoT contexts. Moreover, protecting vital infrastructure and sensitive data, HSVMR-D provides a thorough and adaptable solution to improve the security posture of IoT deployments. Comprehensive experiment analysis and simulation results compared to the baseline study have confirmed the efficiency of the proposed HSVMR-D. Furthermore, increased resilience to completely novel changing threats, fewer false positives, and improved accuracy in threat detection are all outcomes that show the proposed work outperforms others. The HSVMR-D approach is helpful where the primary objective is a secure environment in the Internet of Things (IoT) when resources are limited.
引用
收藏
页数:19
相关论文
共 67 条
[1]   An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning [J].
Abu Alghanam, Orieb ;
Almobaideen, Wesam ;
Saadeh, Maha ;
Adwan, Omar .
EXPERT SYSTEMS WITH APPLICATIONS, 2023, 213
[2]  
Abualigah L, 2024, Multimedia Tools Appl, P1
[3]  
Ahmad Dzaky Raihan, 2024, 2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems (ICETSIS), P269, DOI 10.1109/ICETSIS61505.2024.10459523
[4]   Design and performance of an AI-enabled threat intelligence framework for IoT-enabled autonomous vehicles [J].
Akhunzada, Adnan ;
Al-Shamayleh, Ahmad Sami ;
Zeadally, Sherali ;
Almogren, Ahmad ;
Abu-Shareha, Ahmad Adel .
COMPUTERS & ELECTRICAL ENGINEERING, 2024, 119
[5]  
Al-Amiedy TA, 2024, 2024 4 INT C EM SMAR, P1
[6]  
Al-Attabi K., 2024, INT C INT CIRC COMM, P1, DOI [10.1109/ICICACS60521.2024.10498403, DOI 10.1109/ICICACS60521.2024.10498403]
[7]  
Al-Mimi H, 2023, 2023 10 INT C ELECT, P241, DOI DOI 10.1109/ICEEE59925.2023.00051
[8]  
Al-Sarayrah N, 2024, Indonesian Journal of Electrical Engineering and Computer Science, V34, P1304, DOI [10.11591/ijeecs.v34.i2.pp1304-1314, 10.11591/ijeecs.v34.i2.pp1304-1314]
[9]   DeepIIoT: An Explainable Deep Learning Based Intrusion Detection System for Industrial IOT [J].
Alani, Mohammed M. ;
Damiani, Ernesto ;
Ghosh, Uttam .
2022 IEEE 42ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2022, :169-174
[10]  
Alhija MA, 2024, Indonesian Journal of Electrical Engineering and Computer Science, V35, P1773, DOI [10.11591/ijeecs.v35.i3.pp1773-1785, DOI 10.11591/IJEECS.V35.I3.PP1773-1785]