Machine Learning-Based Detection for Unauthorized Access to IoT Devices

被引:7
|
作者
Aljabri, Malak [1 ]
Alahmadi, Amal A. [2 ]
Mohammad, Rami Mustafa A. [3 ]
Alhaidari, Fahd [2 ]
Aboulnour, Menna [4 ]
Alomari, Dorieh M. [5 ]
Mirza, Samiha [4 ]
机构
[1] Umm Al Qura Univ, Coll Comp & Informat Syst, Dept Comp Sci, Mecca 21955, Saudi Arabia
[2] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Networks & Commun, POB 1982, Dammam 31441, Saudi Arabia
[3] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Informat Syst, POB 1982, Dammam 31441, Saudi Arabia
[4] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, SAUDI ARAMCO Cybersecur Chair, Dept Comp Sci, POB 1982, Dammam 31441, Saudi Arabia
[5] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, SAUDI ARAMCO Cybersecur Chair, Dept Comp Engn, POB 1982, Dammam 31441, Saudi Arabia
关键词
internet of things; machine learning; deep learning; network security;
D O I
10.3390/jsan12020027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has become widely adopted in businesses, organizations, and daily lives. They are usually characterized by transferring and processing sensitive data. Attackers have exploited this prospect of IoT devices to compromise user data's integrity and confidentiality. Considering the dynamic nature of the attacks, artificial intelligence (AI)-based techniques incorporating machine learning (ML) are promising techniques for identifying such attacks. However, the dataset being utilized features engineering techniques, and the kind of classifiers play significant roles in how accurate AI-based predictions are. Therefore, for the IoT environment, there is a need to contribute more to this context by evaluating different AI-based techniques on datasets that effectively capture the environment's properties. In this paper, we evaluated various ML models with the consideration of both binary and multiclass classification models validated on a new dedicated IoT dataset. Moreover, we investigated the impact of different features engineering techniques including correlation analysis and information gain. The experimental work conducted on bagging, k-nearest neighbor (KNN), J48, random forest (RF), logistic regression (LR), and multi-layer perceptron (MLP) models revealed that RF achieved the highest performance across all experiment sets, with a receiver operating characteristic (ROC) of 99.9%.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices
    Guerar, Meriem
    Verderame, Luca
    Merlo, Alessio
    Palmieri, Francesco
    Migliardi, Mauro
    Vallerini, Luca
    ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2020, 4 (03)
  • [32] Machine Learning-Based Satellite Routing for SAGIN IoT Networks
    Yuan, Xueguang
    Liu, Jinlin
    Du, Hang
    Zhang, Yangan
    Li, Feisheng
    Kadoch, Michel
    ELECTRONICS, 2022, 11 (06)
  • [33] Machine Learning-based Gesture Recognition UsingWearable Devices
    Wu, Haoyu
    Qi, Jun
    Wang, Wei
    Chen, Jianjun
    2022 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, CYBERC, 2022, : 213 - 221
  • [34] A machine learning-based ensemble model for securing the IoT network
    Singh, Rohit
    Sharma, Krishna Pal
    Awasthi, Lalit Kumar
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (08): : 10883 - 10897
  • [35] Scalable machine learning-based intrusion detection system for IoT-enabled smart cities
    Rahman, Md Arafatur
    Asyhari, A. Taufiq
    Leong, L. S.
    Satrya, G. B.
    Tao, M. Hai
    Zolkipli, M. F.
    SUSTAINABLE CITIES AND SOCIETY, 2020, 61
  • [36] A Comprehensive Analysis of Machine Learning-Based Intrusion Detection System for IoT-23 Dataset
    Kim, Yang G.
    Ahmed, Kazi J.
    Lee, Myung J.
    Tsukamoto, Kazuya
    ADVANCES IN INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS, INCOS-2022, 2022, 527 : 475 - 486
  • [37] Machine learning-based early detection of IoT botnets using network-edge traffic
    Kumar, Ayush
    Shridhar, Mrinalini
    Swaminathan, Sahithya
    Lim, Teng Joon
    COMPUTERS & SECURITY, 2022, 117
  • [38] A Machine Learning-Based Intrusion Detection System for IoT Electric Vehicle Charging Stations (EVCSs)
    ElKashlan, Mohamed
    Elsayed, Mahmoud Said
    Jurcut, Anca Delia
    Azer, Marianne
    ELECTRONICS, 2023, 12 (04)
  • [39] In-Depth Feature Selection for the Statistical Machine Learning-Based Botnet Detection in IoT Networks
    Kalakoti, Rajesh
    Nomm, Sven
    Bahsi, Hayretdin
    IEEE ACCESS, 2022, 10 : 94518 - 94535
  • [40] Enhancing IoT Botnet Detection through Machine Learning-based Feature Selection and Ensemble Models
    Sharma, Ravi
    Din, Saika Mohi Ud
    Sharma, Nonita
    Kumar, Arun
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2024, 11 (02) : 1 - 6