Anomaly Detection for Internet of Things Cyberattacks

被引:30
作者
Alanazi, Manal [1 ]
Aljuhani, Ahamed [1 ]
机构
[1] Univ Tabuk, Coll Comp & Informat Technol, Tabuk 71491, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 72卷 / 01期
关键词
Anomaly detection; anomaly-based IDS; cybersecurity; feature selection; Internet of Things (IoT); intrusion detection; NETWORKS; MODEL;
D O I
10.32604/cmc.2022.024496
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has been deployed in diverse critical sectors with the aim of improving quality of service and facilitating human lives. The IoT revolution has redefined digital services in different domains by improving efficiency, productivity, and cost-effectiveness. Many service providers have adapted IoT systems or plan to integrate them as integral parts of their systems' operation; however, IoT security issues remain a significant challenge. To minimize the risk of cyberattacks on IoT networks, anomaly detection based on machine learning can be an effective security solution to overcome a wide range of IoT cyberattacks. Although various detection techniques have been proposed in the literature, existing detection methods address limited cyberattacks and utilize outdated datasets for evaluations. In this paper, we propose an intelligent, effective, and lightweight detection approach to detect several IoT attacks. Our proposed model includes a collab-orative feature selection method that selects the best distinctive features and eliminates unnecessary features to build an effective and efficient detection model. In the detection phase, we also proposed an ensemble of learning techniques to improve classification for predicting several different types of IoT attacks. The experimental results show that our proposed method can effectively and efficiently predict several IoT attacks with a higher accuracy rate of 99.984%, a precision rate of 99.982%, a recall rate of 99.984%, and an F1-score of 99.983%.
引用
收藏
页码:261 / 279
页数:19
相关论文
共 36 条
[1]  
Abbasi Fereshteh, 2021, 2021 5th International Conference on Internet of Things and Applications (IoT), DOI 10.1109/IoT52625.2021.9469605
[2]  
Agustin M. J. E., 2020, STRATOSPHERE LAB APO
[3]   Intrusion detection in internet of things using supervised machine learning based on application and transport layer features using UNSW-NB15 data-set [J].
Ahmad, Muhammad ;
Riaz, Qaiser ;
Zeeshan, Muhammad ;
Tahir, Hasan ;
Haider, Syed Ali ;
Khan, Muhammad Safeer .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
[4]   Identification of malicious activities in industrial internet of things based on deep learning models [J].
AL-Hawawreh, Muna ;
Moustafa, Nour ;
Sitnikova, Elena .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 :1-11
[5]   Machine Learning Approaches for Combating Distributed Denial of Service Attacks in Modern Networking Environments [J].
Aljuhani, Ahamed .
IEEE ACCESS, 2021, 9 (42236-42264) :42236-42264
[6]  
Alrashdi I, 2019, 2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P305, DOI 10.1109/CCWC.2019.8666450
[7]  
Althubiti SA, 2018, 2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), P293
[8]  
[Anonymous], 2020, Hacker News
[9]   A Fully Automatic Player Detection Method Based on One-Class SVM [J].
Bai, Xuefeng ;
Zhang, Tiejun ;
Wang, Chuanjun ;
Abd El Latif, Ahmed A. ;
Niu, Xiamu .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2013, E96D (02) :387-391
[10]  
Bakhshi Z, 2018, IEEE WIREL COMMUNN, P173, DOI 10.1109/WCNCW.2018.8368997