Detecting malicious IoT traffic using Machine Learning techniques

被引:6
作者
Jayaraman, Bhuvana [1 ]
Thai, Mirnalinee T. H. A. N. G. A. N. A. D. A. R. T. H. A. N. G. A. [1 ]
Anand, Anirudh [1 ]
Nadar, Sri Sivasubramaniya [1 ]
机构
[1] Sri Sivasubramaniya Nadar Coll Engn, Chennai, Tamil Nadu, India
来源
ROMANIAN JOURNAL OF INFORMATION TECHNOLOGY AND AUTOMATIC CONTROL-REVISTA ROMANA DE INFORMATICA SI AUTOMATICA | 2023年 / 33卷 / 04期
关键词
Deep Learning; Exploratory Data Analysis; IoT Security; Machine Learning; Traffic Classification;
D O I
10.33436/v33i4y202304
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Internet of Things (IoT) generates huge amount of data, that needs to communicate between the IoT enabled devices. These communications are vulnerable to security attacks and are malicious enough to cause harm to connected devices. The invasive communication and security breaches have to be identified and should be dealt with in order not to cause further damage and consequences. The objective of this work is to distinguish intentional communications from insecure communications between the IoT devices. The intentional communications can be different from the insecure communications in their patterns. Artificial intelligencebased machine learning approaches have the technologies to identify patterns of the intentional or insecure communications. In this paper, Random Forest, Decision Tree, SVM and 1DCNN have been used to discriminate patterns belonging to intended and unintended messages. To evaluate this technique, IoT-23 dataset is used, the proposed machine learning based approach obtaining a performance of 99.25% accuracy with the benchmark dataset. The proposed approach is compared with the state-of-the-art methods. It is observed that the proposed Random Forest method outperforms the existing ones with sufficient patterns to identify. To enhance the performance of the poorly performing classifiers on the imbalanced dataset, a potential solution to be applied on this dataset is also explored and proposed.
引用
收藏
页码:47 / 58
页数:12
相关论文
共 18 条
[1]   Generative Deep Learning to Detect Cyberattacks for the IoT-23 Dataset [J].
Abdalgawad, N. ;
Sajun, A. ;
Kaddoura, Y. ;
Zualkernan, I. A. ;
Aloul, F. .
IEEE ACCESS, 2022, 10 :6430-6441
[2]   Towards the design of real-time autonomous IoT NIDS [J].
Alhowaide, Alaa ;
Alsmadi, Izzat ;
Tang, Jian .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (05) :2489-2502
[3]  
Austin M., 2021, Graduate Theses, Dissertations, V8024
[4]   A Comparative Analysis of Machine Learning Techniques for Botnet Detection [J].
Bansal, Ankit ;
Mahapatra, Sudipta .
SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, :91-98
[5]   IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey [J].
Burhan, Muhammad ;
Rehman, Rana Asif ;
Khan, Bilal ;
Kim, Byung-Seo .
SENSORS, 2018, 18 (09)
[6]   IoT Secure Communication using ANN Classification Algorithms [J].
Fatayer, Tamer S. ;
Azara, Mohammed N. .
2019 INTERNATIONAL CONFERENCE ON PROMISING ELECTRONIC TECHNOLOGIES (ICPET 2019), 2019, :142-146
[7]   Investigating class rarity in big data [J].
Hasanin, Tawfiq ;
Khoshgoftaar, Taghi M. ;
Leevy, Joffrey L. ;
Bauder, Richard A. .
JOURNAL OF BIG DATA, 2020, 7 (01)
[8]   Severely imbalanced Big Data challenges: investigating data sampling approaches [J].
Hasanin, Tawfiq ;
Khoshgoftaar, Taghi M. ;
Leevy, Joffrey L. ;
Bauder, Richard A. .
JOURNAL OF BIG DATA, 2019, 6 (01)
[9]   Investigating Random Undersampling and Feature Selection on Bioinformatics Big Data [J].
Hasanin, Tawfiq ;
Khoshgoftaar, Taghi M. ;
Leevy, Joffrey ;
Seliya, Naeem .
2019 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2019), 2019, :346-356
[10]   IoTHunter: IoT network traffic classification using device specific keywords [J].
Khandait, Pratibha ;
Hubballi, Neminath ;
Mazumdar, Bodhisatwa .
IET NETWORKS, 2021, 10 (02) :59-75