IoTTPS: Ensemble RKSVM Model-Based Internet of Things Threat Protection System

被引:3
作者
Akram, Urooj [1 ]
Sharif, Wareesa [1 ]
Shahroz, Mobeen [1 ]
Mushtaq, Muhammad Faheem [1 ]
Aray, Daniel Gavilanes [2 ,3 ,4 ]
Thompson, Ernesto Bautista [2 ,5 ,6 ]
Diez, Isabel de la Torre [7 ]
Djuraev, Sirojiddin [8 ]
Ashraf, Imran [9 ]
机构
[1] Islamia Univ Bahawalpur, Dept Artificial Intelligence, Bahawalpur 63100, Punjab, Pakistan
[2] Univ Europea Atlantico, Higher Polytech Sch, Isabel Torres 21, Santander 39011, Spain
[3] Univ Int Cuanza, Dept Projects, EN250, Cuito, Bie, Angola
[4] Fdn Univ Int Colombia, Res Grp Foods Nutr Biochem & Hlth, Bogota, Colombia
[5] Univ Int Iberoamer, Campeche 24560, Mexico
[6] Univ Int Iberoamer Arecibo, Puerto R, Arecibo, PR 00613 USA
[7] Univ Valladolid, Dept Signal Theory Commun & Telemat Engn, Paseo Belen 15, Valladolid 47011, Spain
[8] New Uzbekistan Univ, Dept Software Engn, Tashkent 100007, Uzbekistan
[9] Yeungnam Univ, Dept Informat & Commun Engn, Gyongsan 38541, South Korea
关键词
threat protection system; privacy; confidentiality; Internet of Things; machine learning; INTRUSION DETECTION; CLASSIFICATION; SECURITY;
D O I
10.3390/s23146379
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
An Internet of Things (IoT) network is prone to many ways of threatening individuals. IoT sensors are lightweight, lack complicated security protocols, and face threats to privacy and confidentiality. Hackers can attack the IoT network and access personal information and confidential data for blackmailing, and negatively manipulate data. This study aims to propose an IoT threat protection system (IoTTPS) to protect the IoT network from threats using an ensemble model RKSVM, comprising a random forest (RF), K nearest neighbor (KNN), and support vector machine (SVM) model. The software-defined networks (SDN)-based IoT network datasets such as KDD cup 99, NSL-KDD, and CICIDS are used for threat detection based on machine learning. The experimental phase is conducted by using a decision tree (DT), logistic regression (LR), Naive Bayes (NB), RF, SVM, gradient boosting machine (GBM), KNN, and the proposed ensemble RKSVM model. Furthermore, performance is optimized by adding a grid search hyperparameter optimization technique with K-Fold cross-validation. As well as the NSL-KDD dataset, two other datasets, KDD and CIC-IDS 2017, are used to validate the performance. Classification accuracies of 99.7%, 99.3%, 99.7%, and 97.8% are obtained for DoS, Probe, U2R, and R2L attacks using the proposed ensemble RKSVM model using grid search and cross-fold validation. Experimental results demonstrate the superior performance of the proposed model for IoT threat detection.
引用
收藏
页数:24
相关论文
共 74 条
[51]   Modelling Behavioural Dynamics for Asymmetric Application Layer DDoS Detection [J].
Praseed, Amit ;
Thilagam, P. Santhi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 (16) :617-626
[52]   A deep learning based intelligent framework to mitigate DDoS attack in fog environment [J].
Priyadarshini, Rojalina ;
Barik, Rabindra Kumar .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (03) :825-831
[53]   A metric focused performance assessment of fog computing environments: A critical review [J].
Rathi, Sugandha ;
Nagpal, Renuka ;
Mehrotra, Deepti ;
Srivastava, Gautam .
COMPUTERS & ELECTRICAL ENGINEERING, 2022, 103
[54]  
Revathi S., 2013, INT JORNAL ENG RES T, V2, P1848
[55]   IoT-based platform for environment data sharing in smart cities [J].
Rubi, Jesus Noel Suarez ;
de Lira Gondim, Paulo Roberto .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (02)
[56]   Man-in-the-Middle Attack Mitigation in Internet of Medical Things [J].
Salem, Osman ;
Alsubhi, Khalid ;
Shaafi, Aymen ;
Gheryani, Mostafa ;
Mehaoua, Ahmed ;
Boutaba, Raouf .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (03) :2053-2062
[57]   Machine learning algorithms to detect DDoS attacks in SDN [J].
Santos, Reneilson ;
Souza, Danilo ;
Santo, Walter ;
Ribeiro, Admilson ;
Moreno, Edward .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (16)
[58]  
Sen Gupta Sudhriti, 2019, 2019 3rd International Conference on Electronics, Communication and Aerospace Technology (ICECA). Proceedings, P382, DOI 10.1109/ICECA.2019.8822178
[59]   Software Defined Machine Learning Based Anomaly Detection in Fog Based IoT Network [J].
Shafi, Qaisar ;
Qaisar, Saad ;
Basit, Abdul .
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, ICCSA 2019, PT IV, 2019, 11622 :611-621
[60]   A novel optimization based deep learning with artificial intelligence approach to detect intrusion attack in network system [J].
Shankar, S. Siva ;
Hung, Bui Thanh ;
Chakrabarti, Prasun ;
Chakrabarti, Tulika ;
Parasa, Gayatri .
EDUCATION AND INFORMATION TECHNOLOGIES, 2024, 29 (04) :3859-3883