Machine Learning-Based Detection for Unauthorized Access to IoT Devices
نویسندگان
چکیده
The Internet of Things (IoT) has become widely adopted in businesses, organizations, and daily lives. They are usually characterized by transferring processing sensitive data. Attackers have exploited this prospect IoT devices to compromise user data’s integrity confidentiality. Considering the dynamic nature attacks, artificial intelligence (AI)-based techniques incorporating machine learning (ML) promising for identifying such attacks. However, dataset being utilized features engineering techniques, kind classifiers play significant roles how accurate AI-based predictions are. Therefore, environment, there is a need contribute more context evaluating different on datasets that effectively capture environment’s properties. In paper, we evaluated various ML models with consideration both binary multiclass classification validated new dedicated dataset. Moreover, investigated impact including correlation analysis information gain. experimental work conducted bagging, k-nearest neighbor (KNN), J48, random forest (RF), logistic regression (LR), multi-layer perceptron (MLP) revealed RF achieved highest performance across all experiment sets, receiver operating characteristic (ROC) 99.9%.
منابع مشابه
Detection of Unauthorized IoT Devices Using Machine Learning Techniques
Security experts have demonstrated numerous risks imposed by Internet of Things (IoT) devices on organizations. Due to the widespread adoption of such devices, their diversity, standardization obstacles, and inherent mobility, organizations require an intelligent mechanism capable of automatically detecting suspicious IoT devices connected to their networks. In particular, devices not included ...
متن کاملIoT Security Techniques Based on Machine Learning
Internet of things (IoT) that integrate a variety of devices into networks to provide advanced and intelligent services have to protect user privacy and address attacks such as spoofing attacks, denial of service attacks, jamming and eavesdropping. In this article, we investigate the attack model for IoT systems, and review the IoT security solutions based on machine learning techniques includi...
متن کاملRobust Detection of Unauthorized Wireless Access Points
Unauthorized 802.11 wireless access points (APs), or rogue APs, such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secured. An attacker in the vicinity may easily get onto the internal network through a rogue AP, bypassing all perimeter security measures. Existing detection solutions do not work well for detecting r...
متن کاملLearning-Based Computation Offloading for IoT Devices with Energy Harvesting
Internet of Things (IoT) devices can apply mobileedge computing (MEC) and energy harvesting (EH) to provide the satisfactory quality of experiences for computation intensive applications and prolong the battery lifetime. In this article, we investigate the computation offloading for IoT devices with energy harvesting in wireless networks with multiple MEC devices such as base stations and acces...
متن کاملA Hybrid Machine Learning Method for Intrusion Detection
Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Sensor and Actuator Networks
سال: 2023
ISSN: ['2224-2708']
DOI: https://doi.org/10.3390/jsan12020027