Innovative Machine Learning Model Design for Predictive IoT Security Attacks

被引:0
作者
Buja, Atdhe [1 ]
Pacolli, Melinda [2 ]
Bajrami, Donika [1 ]
Polstra, Philip [3 ]
Mutoh, Akihiko [4 ]
机构
[1] ICT Acad, Prishtina, Kosovo
[2] ECPD, Prishtina, Kosovo
[3] Bloomsburg Univ Penn, Bloomsburg, PA USA
[4] Tsukijihongwanji, Tokyo, Japan
来源
ADVANCES IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING | 2024年 / 4卷 / 02期
关键词
IoT Security; Predictive model; Machine learning; Data science; Cyber-attacks;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The research focuses on designing a predictive model for Internet of Things (IoT) attack identification using historical IoT data from the Global Cyber Alliance's (GCA) Automated IoT Defense Ecosystem (AIDE). This research goes into the design of an enhanced machine-learning model, to predict potential security breaches. The process involved a thorough data science lifecycle, overall data preprocessing, feature selection, and engineering. The study's main objective is to design a model to classify IoT activities and events, distinctive among normal operations and indicators of potential cyber-attacks. The model design incorporates distinct features like command frequency, login success, geo-distance calculations, credentials tried, and protocol encodings to enhance predictive accuracy. The model uses algorithms like logistic regression and random forests to explore their efficacy in binary and multiclass classifications. The research emphasizes the critical role of the model's capability to proactively address IoT security challenges. Offering early alerts is crucial in allowing timely countermeasures, herein strengthening IoT ecosystems against cyber threats. The model's accuracy in predicting IoT attacks, reduces the likelihood of successful breaches, thus safeguarding sensitive data and infrastructure. Furthermore, it assists as a key tool for policymakers and security professionals, providing insight into occurring threat patterns and enabling the development of robust defense strategies.
引用
收藏
页数:13
相关论文
共 20 条
[1]  
[Anonymous], ABOUT US
[2]  
[Anonymous], ABOUT US
[3]   Security and privacy in the Internet of Things: threats and challenges [J].
Badr, Youakim ;
Zhu, Xiaoyang ;
Alraja, Mansour Naser .
SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2021, 15 (04) :257-271
[4]  
Buja A, 2023, 12 MED C EMB COMP ME
[5]  
Buja A, 2022, INT C HUM COMP INT O
[6]  
Buja A, 2024, ADV ARTIF INTELL MAC, V4, P2233
[7]  
Dalal S, 2023, J CLOUD COMPUT-ADV S, V12, DOI 10.1186/s13677-023-00517-4
[8]   A novel method to detect cyber-attacks in IoT/IIoT devices on the modbus protocol using deep learning [J].
Gueye, Thierno ;
Wang, Yanen ;
Rehman, Mudassar ;
Mushtaq, Ray Tahir ;
Zahoor, Sadaf .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (05) :2947-2973
[9]   C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks [J].
Haider, Raja Zeeshan ;
Aslam, Baber ;
Abbas, Haider ;
Iqbal, Zafar .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (04) :2531-2545
[10]   A Systematic Review of Data-Driven Attack Detection Trends in IoT [J].
Haque, Safwana ;
El-Moussa, Fadi ;
Komninos, Nikos ;
Muttukrishnan, Rajarajan .
SENSORS, 2023, 23 (16)