Light Weight Gradient Ensemble Model for detecting network attack at the edge of the IoT network

被引:0
作者
Santhadevi D. [1 ]
Janet B. [1 ]
机构
[1] Department of Computer Applications, National Institute of Technology, Tiruchirappalli
关键词
IoT security; LGBM; NetFlow malware classification; Network anomaly detection;
D O I
10.1007/s41870-022-01140-3
中图分类号
学科分类号
摘要
An intelligent malware prediction system is needed for monitoring the network traffic of traditional and future network attacks. The Internet of Things (IoT) is fully connected and remotely monitored in many places. These devices are more vulnerable and easier to attack remotely. Securing and monitoring the activities of these devices must be done at the edge level. Machine Learning (ML) models are broadly used for supervising defence purposes, and these models are computationally expensive. Light Weight Gradient Ensemble Machine (LWGEM) with voting-based feature selection techniques and tuning the hyper-parameter are used to enhance the model accuracy and reduce the computational expenses. Performance of the model was evaluated with benchmark dataset UNSW_NB15 which shows the prominent result over the existing model and state of art models. The proposed model performs better in predicting unknown abnormalities in the IoT network. © 2022, The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:29 / 38
页数:9
相关论文
共 25 条
[1]  
Cecchinel C., Jimenez M., Mosser S., Riveill M., An architecture to support the collection of big data in the internet of things, Proceedings—2014 IEEE 10Th World Congress on Services, SERVICES 2014, pp. 442-449, (2014)
[2]  
SonicWall Cyber Threat Report. 2020 SonicWall, no, Sonicwall, (2020)
[3]  
Rawat R.S., Diwakar M., Verma P., ZeroAccess botnet investigation and analysis, Int J Inf Technol (Singapore), 13, 5, pp. 2091-2099, (2021)
[4]  
Snehi M., Bhandari A., Apprehending mirai botnet philosophy and smart learning models for IoT-DDoS detection, Proceedings of the 2021 8Th International Conference on Computing for Sustainable Global Development, Indiacom, 2021, pp. 501-505, (2021)
[5]  
Kolias C., Kambourakis G., Stavrou A., Voas J., DDoS in the IoT: Mirai and other botnets, Comput IEEE Comput Soc, 50, 7, pp. 80-84, (2017)
[6]  
Kalnoor G., Gowrishankar S., A model for intrusion detection system using hidden Markov and variational Bayesian model for IoT based wireless sensor network, Int J Inf Technol (Singapore), 14, 4, pp. 2021-2033, (2022)
[7]  
Mohammed M.M., Alheeti K.M.A., Evaluating machine learning algorithms to detect and classify attacks in IoT, International Conference on Communication and Information Technology, ICICT, 2021, pp. 180-184, (2021)
[8]  
Keim Y., Mohapatra A.K., Cyber threat intelligence framework using advanced malware forensics, Int J Inf Technol (Singapore), 14, 1, pp. 521-530, (2022)
[9]  
Kasongo S.M., Sun Y., Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset, J Big Data, (2020)
[10]  
Sha K., Yang T.A., Wei W., Davari S., A survey of edge computing-based designs for IoT security, Digit Commun Netw, 6, 2, pp. 195-202, (2020)