Enhancing IoT Device Security through Network Attack Data Analysis Using Machine Learning Algorithms

被引:4
作者
Koirala, Ashish [1 ]
Bista, Rabindra [1 ]
Ferreira, Joao C. [2 ,3 ]
机构
[1] Kathmandu Univ, Dept Comp Sci & Engn, Dhulikhel 45200, Nepal
[2] Inov Inesc Inovacao Inst Novas Tecnol, P-1000029 Lisbon, Portugal
[3] Inst Univ Lisboa ISCTE IUL, ISTAR, P-1649026 Lisbon, Portugal
关键词
Internet of Things (IoT); botnet; pearson coefficient; random forest; ensemble learning; INTERNET; THINGS;
D O I
10.3390/fi15060210
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) shares the idea of an autonomous system responsible for transforming physical computational devices into smart ones. Contrarily, storing and operating information and maintaining its confidentiality and security is a concerning issue in the IoT. Throughout the whole operational process, considering transparency in its privacy, data protection, and disaster recovery, it needs state-of-the-art systems and methods to tackle the evolving environment. This research aims to improve the security of IoT devices by investigating the likelihood of network attacks utilizing ordinary device network data and attack network data acquired from similar statistics. To achieve this, IoT devices dedicated to smart healthcare systems were utilized, and botnet attacks were conducted on them for data generation. The collected data were then analyzed using statistical measures, such as the Pearson coefficient and entropy, to extract relevant features. Machine learning algorithms were implemented to categorize normal and attack traffic with data preprocessing techniques to increase accuracy. One of the most popular datasets, known as BoT-IoT, was cross-evaluated with the generated dataset for authentication of the generated dataset. The research provides insight into the architecture of IoT devices, the behavior of normal and attack networks on these devices, and the prospects of machine learning approaches to improve IoT device security. Overall, the study adds to the growing body of knowledge on IoT device security and emphasizes the significance of adopting sophisticated strategies for detecting and mitigating network attacks.
引用
收藏
页数:30
相关论文
共 33 条
[1]   Real time dataset generation framework for intrusion detection systems in IoT [J].
Al-Hadhrami, Yahya ;
Hussain, Farookh Khadeer .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 :414-423
[2]   X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of Things [J].
Al-Hawawreh, Muna ;
Sitnikova, Elena ;
Aboutorab, Neda .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) :3962-3977
[3]  
Al-Othman Z, 2020, Arxiv, DOI arXiv:2010.13852
[4]   Systematic Literature Review on IoT-Based Botnet Attack [J].
Ali, Ihsan ;
Ahmed, Abdelmuttlib Ibrahim Abdalla ;
Almogren, Ahmad ;
Raza, Muhammad Ahsan ;
Shah, Syed Attique ;
Khan, Anwar ;
Gani, Abdullah .
IEEE ACCESS, 2020, 8 :212220-212232
[5]  
[Anonymous], WIRESHARK DOWNLOAD
[6]  
Awadelkarim Mohamed A.M., 2020, 2020 International Conference on Computing and Information Technology, ICCIT 2020, DOI [10.1109/iccit-144147971.2020.9213715, DOI 10.1109/ICCIT144147971.2020.9213715]
[7]  
Benesty J., 2009, Dictionary of pharmaceutical medicine, P1
[8]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[9]   Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices [J].
Dinculeana, Dan ;
Cheng, Xiaochun .
APPLIED SCIENCES-BASEL, 2019, 9 (05)
[10]  
Patro SGK, 2015, Arxiv, DOI [arXiv:1503.06462, DOI 10.17148/IARJSET.2015.2305]