Abstract
Identifying the malicious traffic flows in Internet of things (IOT) is very important to monitor and avoid unwanted errors or the unwanted flows in the network. So, for a security to this network various machine learning algorithms (ML) has been introduced by various analyst to avoid this flow of error in the network. But, owing to the unsuitable selection of features, the ML models which introduced previously suffer from misclassify errors. So, there arises a need to study the problem of feature selection more depth to predict the accurate traffic flow observation in the network. To overcome this problem, a new structure in machine learning (ML) is introduced. So, for thisa novel features selection metric CorrAUC is suggested. So, based on this metric approach, a new feature selection algorithm CorrAUC is develop and design, it is based on wrapper technique to get features accurately by filtering to predict flow of traffic is suggested. Then, we applied multicriteria decision method called VIKOR which is used for validating the features selected for recognition the flow of traffic errors in the network. We estimate our approach by using the NSL-KDD dataset and three different ML algorithms.
Highlights
Introduction devicesmany researchers in this IOTNowadays, our daily life is being well organized technology field introduced numerous cyber by using internet of things (IOT) technology
Correlation Based Metrics In process to overcome the IoT attack detection problem of selecting effective features in IoT network Galton has proposed a simple idea as Pearson Moment Correlation in his year of 1880’s .This technique is detailed more for the identification of relationship between class features and independent
Attack detection in the Internet of Things (IOT) network is critical for IOT security, as it keeps an eye on and blocks unwanted traffic flows
Summary
Our daily life is being well organized technology field introduced numerous cyber by using internet of things (IOT) technology. The security systems and have implemented these internet of things (IOT) technology is methods to protect their data’s and information interconnected with our daily needs such as from the cyber-attacks. Due to vast security .For this purpose, many analyzer tried development of this technology the data finest of their own and presented various cyber collection, transferring and retrieving are getting security systems. These cyber security systems are numerous in various fields. IOT has become deploy for the safety of important details to more essential for our life which saves time and protect it from prohibited access in the network
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Research Journal on Advanced Science Hub
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.