Ensemble machine learning approaches for webshell detection in Internet of things environments

被引:55
作者
Yong, Binbin [1 ]
Wei, Wei [2 ]
Li, Kuan-Ching [3 ]
Shen, Jun [4 ]
Zhou, Qingguo [1 ]
Wozniak, Marcin [5 ]
Polap, Dawid [5 ]
Damasevicius, Robertas [6 ]
机构
[1] Lanzhou Univ, Sch Informat Sci & Engn, Lanzhou, Gansu, Peoples R China
[2] Xian Univ Technol, Sch Comp Sci & Engn, Xian, Peoples R China
[3] Providence Univ, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[4] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW, Australia
[5] Silesian Tech Univ, Inst Math, Gliwice, Poland
[6] Kaunas Univ Technol, Multimedia Engn Dept, Kaunas, Lithuania
基金
中国国家自然科学基金;
关键词
CLASSIFICATION; NAVIGATION; NETWORK; SECURE;
D O I
10.1002/ett.4085
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Internet of things (IoT), made up of a massive number of sensor devices interconnected, can be used for data exchange, intelligent identification, and management of interconnected "things." IoT devices are proliferating and playing a crucial role in improving the living quality and living standard of the people. However, the real IoT is more vulnerable to attack by countless cyberattacks from the Internet, which may cause privacy data leakage, data tampering and also cause significant harm to society and individuals. Network security is essential in the IoT system, and Web injection is one of the most severe security problems, especially the webshell. To develop a safe IoT system, in this article, we apply essential machine learning models to detect webshell to build secure solutions for IoT network. Future, ensemble methods including random forest (RF), extremely randomized trees (ET), and Voting are used to improve the performances of these machine learning models. We also discuss webshell detection in lightweight and heavyweight computing scenarios for different IoT environments. Extensive experiments have been conducted on these models to verify the validity of webshell intrusion. Simulation results show that RF and ET are suitable for lightweight IoT scenarios, and Voting method is effective for heavyweight IoT scenarios.
引用
收藏
页数:12
相关论文
共 50 条
[31]   A Survey of Machine and Deep Learning Methods for Privacy Protection in the Internet of Things [J].
Rodriguez, Eva ;
Otero, Beatriz ;
Canal, Ramon .
SENSORS, 2023, 23 (03)
[32]   Classification of Agriculture Farm Machinery Using Machine Learning and Internet of Things [J].
Waleed, Muhammad ;
Um, Tai-Won ;
Kamal, Tariq ;
Usman, Syed Muhammad .
SYMMETRY-BASEL, 2021, 13 (03) :1-16
[33]   Machine Learning Methods for Detecting Internet-of-Things (IoT) Malware [J].
Yaokumah, Winfred ;
Appati, Justice Kwame ;
Kumah, Daniel .
INTERNATIONAL JOURNAL OF COGNITIVE INFORMATICS AND NATURAL INTELLIGENCE, 2021, 15 (04)
[34]   A Survey of Deep Learning Technologies for Intrusion Detection in Internet of Things [J].
Liao, Han ;
Murah, Mohd Zamri ;
Hasan, Mohammad Kamrul ;
Aman, Azana Hafizah Mohd ;
Fang, Jin ;
Hu, Xuting ;
Khan, Atta Ur Rehman .
IEEE ACCESS, 2024, 12 :4745-4761
[35]   Collaborative Anomaly Detection for Internet of Things based on Federated Learning [J].
Kim, Seongwoo ;
Cai, He ;
Hua, Cunqing ;
Gu, Pengwenlong ;
Xu, Wenchao ;
Park, Jeonghyeok .
2020 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2020, :623-628
[36]   Universal Adversarial Perturbations Against Machine-Learning-Based Intrusion Detection Systems in Industrial Internet of Things [J].
Zhang, Sicong ;
Xu, Yang ;
Xie, Xiaoyao .
IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (02) :1867-1889
[37]   Analysis of machine learning approaches to packing detection [J].
Van Ouytsel, Charles-Henry Bertrand ;
Dam, Khanh Huu The ;
Legay, Axel .
COMPUTERS & SECURITY, 2024, 136
[38]   Towards an effective deep learning-based intrusion detection system in the internet of things [J].
Pampapathi, B. M. ;
Guptha, M. Nageswara ;
Hema, M. S. .
TELEMATICS AND INFORMATICS REPORTS, 2022, 7
[39]   Deep learning-empowered intrusion detection framework for the Internet of Medical Things environment [J].
Shambharkar, Prashant Giridhar ;
Sharma, Nikhil .
KNOWLEDGE AND INFORMATION SYSTEMS, 2024, 66 (10) :6001-6050
[40]   A review on machine learning–based approaches for Internet traffic classification [J].
Ola Salman ;
Imad H. Elhajj ;
Ayman Kayssi ;
Ali Chehab .
Annals of Telecommunications, 2020, 75 :673-710