Detect-IoT: A Comparative Analysis of Machine Learning Algorithms for Detecting Compromised IoT Devices

被引:2
作者
Siwakoti, Yuba R. [1 ]
Rawat, Danda B. [1 ]
机构
[1] Howard Univ, Dept Elect Engn & Comp Sci, Washington, DC 20059 USA
来源
PROCEEDINGS OF THE 2023 INTERNATIONAL SYMPOSIUM ON THEORY, ALGORITHMIC FOUNDATIONS, AND PROTOCOL DESIGN FOR MOBILE NETWORKS AND MOBILE COMPUTING, MOBIHOC 2023 | 2023年
基金
美国国家科学基金会;
关键词
Security and Privacy; IoT security; Detect Compromised IoT Infrastructure; Computing Methodologies; Machine Learning; Network Behavioral Data; Enhanced IoT data;
D O I
10.1145/3565287.3616529
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid expansion of IoT brings unmatched convenience and connectivity, but it also raises significant security concerns. The prioritization of functionality over security in IoT devices exposes vulnerabilities like default credentials, outdated components, and insecure interfaces. To mitigate risks and combat cyberattacks effectively, it is crucial to identify and isolate compromised IoT infrastructures. In this paper, we present a curated dataset for IoT security research, which combines 40 recent IoT behavior datasets using class balancing and feature reduction techniques. This curated dataset serves as a valuable resource for future research in the field. Additionally, we compare machine learning techniques to detect compromised IoT devices, leveraging preprocessed and SMOTE-balanced network data. Our ensemble model surpasses other methods, achieving an impressive up to 98 percent F1-score, thus highlighting its efficacy in predicting compromised IoT devices and emphasizing the significance of our dataset and methodology contributions.
引用
收藏
页码:370 / 375
页数:6
相关论文
共 17 条
  • [1] iDetect for vulnerability detection in internet of things operating systems using machine learning
    Al-Boghdady, Abdullah
    El-Ramly, Mohammad
    Wassif, Khaled
    [J]. SCIENTIFIC REPORTS, 2022, 12 (01)
  • [2] [Anonymous], 2020, Amnesia:33 Identify and Mitigate the Risk From Vulnerabilities Lurking in Millions of IoT, OT and IT Device
  • [3] [Anonymous], 2021, Data extraction laboratory-variot
  • [4] Phishing Attack Detection with ML-Based Siamese Empowered ORB Logo Recognition and IP Mapper
    Bhurtel, Manish
    Siwakoti, Yuba R.
    Rawat, Danda B.
    [J]. IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2022,
  • [5] SMOTE: Synthetic minority over-sampling technique
    Chawla, Nitesh V.
    Bowyer, Kevin W.
    Hall, Lawrence O.
    Kegelmeyer, W. Philip
    [J]. 2002, American Association for Artificial Intelligence (16)
  • [6] Detecting Compromised IoT Devices Through XGBoost
    da Cruz, Mauro A. A.
    Abbade, Lucas R.
    Lorenz, Pascal
    Mafra, Samuel B.
    Rodrigues, Joel J. P. C.
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (12) : 15392 - 15399
  • [7] Automated Security Assessment for the Internet of Things
    Duan, Xuanyu
    Ge, Mengmeng
    Triet Huynh Minh Le
    Ullah, Faheem
    Gao, Shang
    Lu, Xuequan
    Babar, M. Ali
    [J]. 2021 IEEE 26TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2021), 2021, : 47 - 56
  • [8] FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm
    Fang, Yong
    Liu, Yongcheng
    Huang, Cheng
    Liu, Liang
    [J]. PLOS ONE, 2020, 15 (02):
  • [9] Gartner Research, 2020, Technical Report
  • [10] VARIoT - Vulnerability and Attack Repository for the Internet of Things
    Janiszewski, Marek
    Rytel, Marcin
    Lewandowski, Piotr
    Romanowski, Hubert
    [J]. 2022 22ND IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2022), 2022, : 752 - 755