Abstract

IoT network is a promising technology, IoT implementation is growing rapidly but cybersecurity is still a loophole, detection of attacks in IOT infrastructures is a growing concern in the field of IoT. With the increased use of Internet of Things in different areas, cyber-attacks are also increasing proportionately and can cause failures in the system. IDS becomes the leading security solution. Anomaly based network intrusion detection (IDS) detection plays a major role in protecting networks against various malicious activities. Improving the security of loT networks has become one of the most critical issues. This is due to the large-scale development and deployment of loT devices and the insufficiency of Intrusion Detection Systems (IDS) to be deployed for the use of special purpose networks. In this article, the performance of several machine learning models has been compared to accurately predict attacks on IoT systems, the case of imbalanced classes was subsequently treated using the SMOTE technique. The Nystrom based kernel SVM is the first time used to detect attacks in the IoT network and the results are promising. The evaluation metrics used in the performance comparison are accuracy, precision, recall, f1 score, and auc-roc curve.

Highlights

  • With and the growth of the IoT network system due to increasing demand, Internet of Thing is the latest promising emerging technology that connects everything in the world through the Internet

  • The IoT is a network of smart objects around the world through the internet without any human interference, which is great, but it is susceptible to cyber-attacks like any other network. research is geared towards machine learning based applications alongside IoT

  • The raw network packets of the UNSW-NB15 dataset was created by the IXIA Perfect Storm tool in the Cyber Range Lab of the Australian Centre for Cyber Security (ACCS) for generating a hybrid of real modern normal activities and synthetic contemporary attack behaviours. -The total number of records: 2,540,044. -The number of records in the training set:175,341 -The number of records in the testing: 82,332 -Number of features: 49. -Response Features. -Attack class: This dataset has nine types of attacks, namely, Fuzzers, Analysis, Backdoors, Denial of Service (DoS), Exploits, Generic, Reconnaissance, Shellcode and Worms. -Label: attack or normal behavior

Read more

Summary

Introduction

With and the growth of the IoT network system due to increasing demand, Internet of Thing is the latest promising emerging technology that connects everything in the world through the Internet. A large number of IoT devices and networks have been used in recent years for different areas of use [5]. Health [3], smart cities [4], supply chain [1] and agriculture [2]. With this extended use of IoT, new protocols are being deployed [6]. The IoT is a network of smart objects around the world through the internet without any human interference, which is great, but it is susceptible to cyber-attacks like any other network. Most of the latest IDS are based on a machine learning algorithm for the detection of cyber-attacks in the network. Most of the latest IDS are based on a machine learning algorithm for the detection of cyber-attacks in the network. currently their use is in all areas of human life [9]

Objectives
Methods
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call