IoTTPS: Ensemble RKSVM Model-Based Internet of Things Threat Protection System

被引:3
作者
Akram, Urooj [1 ]
Sharif, Wareesa [1 ]
Shahroz, Mobeen [1 ]
Mushtaq, Muhammad Faheem [1 ]
Aray, Daniel Gavilanes [2 ,3 ,4 ]
Thompson, Ernesto Bautista [2 ,5 ,6 ]
Diez, Isabel de la Torre [7 ]
Djuraev, Sirojiddin [8 ]
Ashraf, Imran [9 ]
机构
[1] Islamia Univ Bahawalpur, Dept Artificial Intelligence, Bahawalpur 63100, Punjab, Pakistan
[2] Univ Europea Atlantico, Higher Polytech Sch, Isabel Torres 21, Santander 39011, Spain
[3] Univ Int Cuanza, Dept Projects, EN250, Cuito, Bie, Angola
[4] Fdn Univ Int Colombia, Res Grp Foods Nutr Biochem & Hlth, Bogota, Colombia
[5] Univ Int Iberoamer, Campeche 24560, Mexico
[6] Univ Int Iberoamer Arecibo, Puerto R, Arecibo, PR 00613 USA
[7] Univ Valladolid, Dept Signal Theory Commun & Telemat Engn, Paseo Belen 15, Valladolid 47011, Spain
[8] New Uzbekistan Univ, Dept Software Engn, Tashkent 100007, Uzbekistan
[9] Yeungnam Univ, Dept Informat & Commun Engn, Gyongsan 38541, South Korea
关键词
threat protection system; privacy; confidentiality; Internet of Things; machine learning; INTRUSION DETECTION; CLASSIFICATION; SECURITY;
D O I
10.3390/s23146379
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
An Internet of Things (IoT) network is prone to many ways of threatening individuals. IoT sensors are lightweight, lack complicated security protocols, and face threats to privacy and confidentiality. Hackers can attack the IoT network and access personal information and confidential data for blackmailing, and negatively manipulate data. This study aims to propose an IoT threat protection system (IoTTPS) to protect the IoT network from threats using an ensemble model RKSVM, comprising a random forest (RF), K nearest neighbor (KNN), and support vector machine (SVM) model. The software-defined networks (SDN)-based IoT network datasets such as KDD cup 99, NSL-KDD, and CICIDS are used for threat detection based on machine learning. The experimental phase is conducted by using a decision tree (DT), logistic regression (LR), Naive Bayes (NB), RF, SVM, gradient boosting machine (GBM), KNN, and the proposed ensemble RKSVM model. Furthermore, performance is optimized by adding a grid search hyperparameter optimization technique with K-Fold cross-validation. As well as the NSL-KDD dataset, two other datasets, KDD and CIC-IDS 2017, are used to validate the performance. Classification accuracies of 99.7%, 99.3%, 99.7%, and 97.8% are obtained for DoS, Probe, U2R, and R2L attacks using the proposed ensemble RKSVM model using grid search and cross-fold validation. Experimental results demonstrate the superior performance of the proposed model for IoT threat detection.
引用
收藏
页数:24
相关论文
共 74 条
[1]  
Abrar Iram, 2020, 2020 International Conference on Smart Electronics and Communication (ICOSEC), P919, DOI 10.1109/ICOSEC49089.2020.9215232
[2]  
AHMED S., 2020, Innovation in Health Informatics, Next Gen Tech Driven Personalized MedSmart Healthcare, P375, DOI DOI 10.1016/B978-0-12-819043-2.00016-2
[3]   A novel mechanism to handle address spoofing attacks in SDN based IoT [J].
Aldabbas, Hamza ;
Amin, Rashid .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (04) :3011-3026
[4]   Consumer IoT: Security Vulnerability Case Studies and Solutions [J].
Alladi, Tejasvi ;
Chamola, Vinay ;
Sikdar, Biplab ;
Choo, Kim-Kwang Raymond .
IEEE CONSUMER ELECTRONICS MAGAZINE, 2020, 9 (02) :17-25
[5]   Internet of Things: A survey on the security of IoT frameworks [J].
Ammar, Mahmoud ;
Russello, Giovanni ;
Crispo, Bruno .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 :8-27
[6]   Internet of Things: Evolution and technologies from a security perspective [J].
Ande, Ruth ;
Adebisi, Bamidele ;
Hammoudeh, Mohammad ;
Saleem, Jibran .
SUSTAINABLE CITIES AND SOCIETY, 2020, 54
[7]   Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks [J].
Anthi, Eirini ;
Williams, Lowri ;
Laved, Amir ;
Burnap, Pete .
COMPUTERS & SECURITY, 2021, 108
[8]  
ANYANWU M.N., 2009, J COMPUTER SCI, V3, P230
[9]   A Survey on Cyber Security Threats in IoT-Enabled Maritime Industry [J].
Ashraf, Imran ;
Park, Yongwan ;
Hur, Soojung ;
Kim, Sung Won ;
Alroobaea, Roobaea ;
Bin Zikria, Yousaf ;
Nosheen, Summera .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (02) :2677-2690
[10]   A Deep Learning-Based Smart Framework for Cyber-Physical and Satellite System Security Threats Detection [J].
Ashraf, Imran ;
Narra, Manideep ;
Umer, Muhammad ;
Majeed, Rizwan ;
Sadiq, Saima ;
Javaid, Fawad ;
Rasool, Nouman .
ELECTRONICS, 2022, 11 (04)