Abstract

Identifying the malicious traffic flows in Internet of things (IOT) is very important to monitor and avoid unwanted errors or the unwanted flows in the network. So, for a security to this network various machine learning algorithms (ML) has been introduced by various analyst to avoid this flow of error in the network. But, owing to the unsuitable selection of features, the ML models which introduced previously suffer from misclassify errors. So, there arises a need to study the problem of feature selection more depth to predict the accurate traffic flow observation in the network. To overcome this problem, a new structure in machine learning (ML) is introduced. So, for thisa novel features selection metric CorrAUC is suggested. So, based on this metric approach, a new feature selection algorithm CorrAUC is develop and design, it is based on wrapper technique to get features accurately by filtering to predict flow of traffic is suggested. Then, we applied multicriteria decision method called VIKOR which is used for validating the features selected for recognition the flow of traffic errors in the network. We estimate our approach by using the NSL-KDD dataset and three different ML algorithms.

Highlights

  • Introduction devicesmany researchers in this IOTNowadays, our daily life is being well organized technology field introduced numerous cyber by using internet of things (IOT) technology

  • Correlation Based Metrics In process to overcome the IoT attack detection problem of selecting effective features in IoT network Galton has proposed a simple idea as Pearson Moment Correlation in his year of 1880’s .This technique is detailed more for the identification of relationship between class features and independent

  • Attack detection in the Internet of Things (IOT) network is critical for IOT security, as it keeps an eye on and blocks unwanted traffic flows

Read more

Summary

Introduction

Our daily life is being well organized technology field introduced numerous cyber by using internet of things (IOT) technology. The security systems and have implemented these internet of things (IOT) technology is methods to protect their data’s and information interconnected with our daily needs such as from the cyber-attacks. Due to vast security .For this purpose, many analyzer tried development of this technology the data finest of their own and presented various cyber collection, transferring and retrieving are getting security systems. These cyber security systems are numerous in various fields. IOT has become deploy for the safety of important details to more essential for our life which saves time and protect it from prohibited access in the network

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call