Machine Learning-Based Detection for Unauthorized Access to IoT Devices

被引:7
|
作者
Aljabri, Malak [1 ]
Alahmadi, Amal A. [2 ]
Mohammad, Rami Mustafa A. [3 ]
Alhaidari, Fahd [2 ]
Aboulnour, Menna [4 ]
Alomari, Dorieh M. [5 ]
Mirza, Samiha [4 ]
机构
[1] Umm Al Qura Univ, Coll Comp & Informat Syst, Dept Comp Sci, Mecca 21955, Saudi Arabia
[2] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Networks & Commun, POB 1982, Dammam 31441, Saudi Arabia
[3] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Informat Syst, POB 1982, Dammam 31441, Saudi Arabia
[4] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, SAUDI ARAMCO Cybersecur Chair, Dept Comp Sci, POB 1982, Dammam 31441, Saudi Arabia
[5] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, SAUDI ARAMCO Cybersecur Chair, Dept Comp Engn, POB 1982, Dammam 31441, Saudi Arabia
关键词
internet of things; machine learning; deep learning; network security;
D O I
10.3390/jsan12020027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has become widely adopted in businesses, organizations, and daily lives. They are usually characterized by transferring and processing sensitive data. Attackers have exploited this prospect of IoT devices to compromise user data's integrity and confidentiality. Considering the dynamic nature of the attacks, artificial intelligence (AI)-based techniques incorporating machine learning (ML) are promising techniques for identifying such attacks. However, the dataset being utilized features engineering techniques, and the kind of classifiers play significant roles in how accurate AI-based predictions are. Therefore, for the IoT environment, there is a need to contribute more to this context by evaluating different AI-based techniques on datasets that effectively capture the environment's properties. In this paper, we evaluated various ML models with the consideration of both binary and multiclass classification models validated on a new dedicated IoT dataset. Moreover, we investigated the impact of different features engineering techniques including correlation analysis and information gain. The experimental work conducted on bagging, k-nearest neighbor (KNN), J48, random forest (RF), logistic regression (LR), and multi-layer perceptron (MLP) models revealed that RF achieved the highest performance across all experiment sets, with a receiver operating characteristic (ROC) of 99.9%.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] Machine Learning-based Malicious Users Detection in Blockchain-Enabled CR-IoT Network for Secured Spectrum Access
    Miah, Md Sipon
    Hossain, Md Shamim
    Armada, Ana Garcia
    2022 IEEE INTERNATIONAL SYMPOSIUM ON BROADBAND MULTIMEDIA SYSTEMS AND BROADCASTING (BMSB), 2022,
  • [22] BrainShield: A Hybrid Machine Learning-Based Malware Detection Model for Android Devices
    Rodrigo, Corentin
    Pierre, Samuel
    Beaubrun, Ronald
    El Khoury, Franjieh
    ELECTRONICS, 2021, 10 (23)
  • [23] Machine learning-based malware detection on Android devices using behavioral features
    Urmila, T. S.
    MATERIALS TODAY-PROCEEDINGS, 2022, 62 : 4659 - 4664
  • [24] Simple Heuristics as a Viable Alternative to Machine Learning-Based Anomaly Detection in Industrial IoT
    Bicski B.
    Farkas K.
    Pekar A.
    IEEE Internet of Things Magazine, 2023, 6 (03): : 104 - 109
  • [25] A Review on Machine Learning-based Malware Detection Techniques for Internet of Things (IoT) Environments
    S. Sasikala
    Sengathir Janakiraman
    Wireless Personal Communications, 2023, 132 (3) : 1961 - 1974
  • [26] Comparison of Multiple Feature Selection Techniques for Machine Learning-Based Detection of IoT Attacks
    Viet Anh Phan
    Jerabek, Jan
    Malina, Lukas
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [27] A Review on Machine Learning-based Malware Detection Techniques for Internet of Things (IoT) Environments
    Sasikala, S.
    Janakiraman, Sengathir
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 132 (03) : 1961 - 1974
  • [28] Learning-Based Computation Offloading for IoT Devices With Energy Harvesting
    Min, Minghui
    Xiao, Liang
    Chen, Ye
    Cheng, Peng
    Wu, Di
    Zhuang, Weihua
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (02) : 1930 - 1941
  • [29] Deep Learning-Based Detection for Moderate-Density Code Multiple Access in IoT Networks
    Han, Yu
    Wang, Zhenyong
    Guo, Qing
    Xiang, Wei
    IEEE COMMUNICATIONS LETTERS, 2020, 24 (01) : 122 - 125
  • [30] Deep Learning-based Intrusion Detection for IoT Networks
    Ge, Mengmeng
    Fu, Xiping
    Syed, Naeem
    Baig, Zubair
    Teo, Gideon
    Robles-Kelly, Antonio
    2019 IEEE 24TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2019), 2019, : 256 - 265