Abstract

In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices. The participating devices in IoT networks can be problematic due to their resource-constrained nature, and integrating security on these devices is often overlooked. This has resulted in attackers having an increased incentive to target IoT devices. As the number of attacks possible on a network increases, it becomes more difficult for traditional intrusion detection systems (IDS) to cope with these attacks efficiently. In this paper, we highlight several machine learning (ML) methods such as k-nearest neighbour (KNN), support vector machine (SVM), decision tree (DT), naive Bayes (NB), random forest (RF), artificial neural network (ANN), and logistic regression (LR) that can be used in IDS. In this work, ML algorithms are compared for both binary and multi-class classification on Bot-IoT dataset. Based on several parameters such as accuracy, precision, recall, F1 score, and log loss, we experimentally compared the aforementioned ML algorithms. In the case of HTTP distributed denial-of-service (DDoS) attack, the accuracy of RF is 99%. Furthermore, other simulation results-based precision, recall, F1 score, and log loss metric reveal that RF outperforms on all types of attacks in binary classification. However, in multi-class classification, KNN outperforms other ML algorithms with an accuracy of 99%, which is 4% higher than RF.

Highlights

  • Introduction affiliationsThe Internet of Things (IoT) offers a vision where devices with the help of sensors can understand the context and through networking functions can connect with each other [1].The devices in the IoT network can be employed for collecting information based on the use cases

  • The results show that decision tree (DT) was one of the better models along with naive Bayes (NB) when compared to artificial neural network (ANN)’s which dominate intrusion detection systems (IDS) research

  • Our study provides a comprehensive evaluation for both real attack and simulated attack data that were created by simulating a realistic network at the University of New South Wales where real attacks on IoT networks were recorded

Read more

Summary

Background and Related Work

We present the background and examines current literature that would clear up the picture for the reader about the design of the experiments conducted in this paper. We discuss IDS including the use of ML used in attack detection and the related work which would help with selecting the algorithms to be used as well as identifying any datasets that could be utilized for testing the models. Each algorithm is explored with further research into the suitability of the algorithm for use in an IDS. The IoT is described including the attacks that are used in the dataset that has been selected

Intrusion Detection System
IoT Intrusion Detection Using Machine Learning
K-Nearest Neighbor
Support Vector Machine
Decision Tree
Random Forest
Naive Bayes
Logistic Regression
Internet of Things Attacks
Data Exfiltration
DoS and DDoS
Keylogging
OS Scan and Service Scan
Benchmark Data
Confusion Matrix
Accuracy
F1 Score
Log Loss
Cohen’s Kappa Coefficient
Dataset Description
Tools Used
Feature Extraction
Feature Scaling
Multi-Class Dataset
Training Data
Test Data
Binary Classification
Model Comparison
Multiclass Classification
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call