An Intrusion Detection and Classification System for IoT Traffic with Improved Data Engineering

نویسندگان

چکیده

Nowadays, the Internet of Things (IoT) devices and applications have rapidly expanded worldwide due to their benefits in improving business environment, industrial people’s daily lives. However, IoT are not immune malicious network traffic, which causes potential negative consequences sabotages operating devices. Therefore, developing a method for screening traffic is necessary detect classify activity mitigate its impacts. This research proposes predictive machine learning model an system. Specifically, our distinguishes between normal anomaly activity. Furthermore, it classifies into five categories: normal, Mirai attack, denial service (DoS) Scan man-in-the-middle (MITM) attack. Five supervised models were implemented characterize performance detecting classifying activities systems. includes following models: shallow neural networks (SNN), decision trees (DT), bagging (BT), k-nearest neighbor (kNN), support vector (SVM). The evaluated on new broad dataset attacks, IoTID20 dataset. Besides, deep feature engineering process was used improve models’ accuracy. Our experimental evaluation exhibited accuracy 100% recorded detection using all 99.4–99.9% classification process.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

P2P Traffic classification for Intrusion Detection Systems

Multiple approaches have been taken to study the classification of peer-to-peer (P2P) traffic and to study the impact of P2P on IDS/IPS systems. Majority of the approaches have used rule based or a mix of rule based and anomaly based detection algorithms. Physical setup is generally a firewall and SNORT or similar IDS/IPS solution on the WAN/ISP interface from the organization. In this paper we...

متن کامل

Industrial Control System Traffic Data Sets for Intrusion Detection Research

Supervisory control and data acquisition (SCADA) systems monitor and control physical processes associated with the critical infrastructure. Weaknesses in the application layer protocols, however, leave SCADA networks vulnerable to attack. In response, cyber security researchers have developed myriad intrusion detection systems. Researchers primarily rely on unique threat models and the corresp...

متن کامل

An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection

We have been using fuzzy data mining techniques to extract patterns that represent normal behavior for intrusion detection. In this paper we describe a variety of modifications that we have made to the data mining algorithms in order to improve accuracy and efficiency. We use sets of fuzzy association rules that are mined from network audit data as models of " normal behavior. " To detect anoma...

متن کامل

Intrusion Detection in IOT based Networks Using Double Discriminant Analysis

Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...

متن کامل

an improved intrusion detection system utilizing a new mix of bp and som neural networks

high processing loads, need for complicated and frequent updating, and high false alarm are some of the challenges in designing anomaly detection and misuse detection systems. we propose a new network-based intrusion detection system (ids) that resolves such shortcomings. our scheme fuses anomaly detection and misuse detection systems, which has not been utilized so far in existing systems. in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied sciences

سال: 2022

ISSN: ['2076-3417']

DOI: https://doi.org/10.3390/app122312336