Cyber Attacks Classification on Enriching IoT Datasets

Authors

DOI:

https://doi.org/10.4108/eetiot.v9i3.3030

Keywords:

IoT Security, Machine learning, security attack, Bot-IoT, Ton-IoT

Abstract

In the era of the 5.0 industry, the use of the Internet of Things (IoT) has increased. The data generates from sensors through IoT industrial systems, any fault in those systems affects their performance and leads to real disaster. Protecting them from any possible attacks is an essential task. to secure any system, it needs to predict in the first place possible attacks and faults that could happen in the future. Predicting and initiating the attack type and the accuracy of these predictions can be done with machine learning models nowadays on the datasets produced with IoT networks. This paper classifies several attacks type based on several criteria and techniques to enhance the performance of machine learning (ML) models such as Voting techniques beside six ML models; Random Forest (RF), Decision Tree (DT), K-nearest neighbor (KNN), Support Vector Machine (SVM), Logistic regression (LR), and eXtreme Gradient Boosting (XGBoost) using Enriching IoT dataset. The results showed that 100% accuracy was achieved in estimating process with the XGBoost model.

 

 

Downloads

Download data is not yet available.
<br data-mce-bogus="1"> <br data-mce-bogus="1">

References

Erfani, M., Shoeleh, F., Dadkhah, S., Kaur, B., Xiong, P., Iqbal, S., Ray, S. et al. (2021) A feature exploration approach for iot attack type classification. In 2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) (IEEE): 582–588. DOI: https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00101

Su, J., He, S. and Wu, Y. (2022) Features selection and prediction for iot attacks. High-Confidence Computing 2(2): 100047. DOI: https://doi.org/10.1016/j.hcc.2021.100047

Elsherif, A.A. (2020) Ddos botnets attacks detection in anomaly traffic: A comparative study. Journal of Information Security and Cybercrimes Research 3(1): 64– 74. DOI: https://doi.org/10.26735/ZRXN1433

Le, T.T.H., Kim, H., Kang, H. and Kim, H. (2022) Classification and explanation for intrusion detection system based on ensemble trees and shap method. Sensors 22(3): 1154. DOI: https://doi.org/10.3390/s22031154

Churcher, A., Ullah, R., Ahmad, J., Ur Rehman, S., Masood, F., Gogate, M., Alqahtani, F. et al. (2021) An experimental analysis of attack classification using machine learning in iot networks. Sensors 21(2): 446. DOI: https://doi.org/10.3390/s21020446

Neto, E., Dadkhah, S. and Ghorbani, A. (2022) Collaborative ddos detection in distributed multi-tenant iot using federated learning: 1–10. doi:10.1109/PST55820.2022.9851984. DOI: https://doi.org/10.1109/PST55820.2022.9851984

Gad, A.R., Nashat, A.A. and Barkat, T.M. (2021) Intrusion detection system using machine learning for vehicular ad hoc networks based on ton-iot dataset. IEEE Access 9: 142206–142217. DOI: https://doi.org/10.1109/ACCESS.2021.3120626

Ioannou, C. and Vassiliou, V. (2021) Network attack classification in iot using support vector machines. Journal of Sensor and Actuator Networks 10(3): 58. DOI: https://doi.org/10.3390/jsan10030058

Shahin, M., Chen, F., Bouzary, H., Hosseinzadeh, A. and Rashidifar, R., A novel fully convolutional neural network approach for detection and classification of attacks on industrial iot devices in smart manufacturing systems. doi:10.21203/rs.3.rs-1739779/v1. DOI: https://doi.org/10.21203/rs.3.rs-1739779/v1

Singh, D. and Singh, B. (2020) Investigating the impact of data normalization on classification performance. Applied Soft Computing 97: 105524. DOI: https://doi.org/10.1016/j.asoc.2019.105524

Mohammed, R., Rawashdeh, J. and Abdullah, M. (2020) Machine learning with oversampling and undersampling techniques: overview study and experimental results. In 2020 11th international conference on information and communication systems (ICICS) (IEEE): 243–248. DOI: https://doi.org/10.1109/ICICS49469.2020.239556

Hooker, S., Erhan, D., Kindermans, P.J. and Kim, B. (2019) A benchmark for interpretability methods in deep neural networks. Advances in neural information processing systems 32.

Domínguez-Almendros, S., Benítez-Parejo, N. and Gonzalez-Ramirez, A. (2011) Logistic regression models. Allergologia et Immunopathologia 39(5): 295– 305. doi:https://doi.org/10.1016/j.aller.2011.05.002, URL https://www.sciencedirect.com/science/ article/pii/S0301054611002011. DOI: https://doi.org/10.1016/j.aller.2011.05.002

Peppes, N., Daskalakis, E., Alexakis, T., Adamopoulou, E. and Demestichas, K. (2021) Performance of machine learning-based multi-model voting ensemble methods for network threat detection in agriculture 4.0. Sensors 21(22). URL https://www.mdpi.com/1424-8220/21/ 22/7475. DOI: https://doi.org/10.3390/s21227475

Özçift, A. (2020) Medical sentiment analysis based on soft voting ensemble algorithm. Yönetim Bilişim Sistemleri Dergisi 6(1): 42–50.

Downloads

Published

14-08-2023

How to Cite

[1]
A. Hasan Jarjis, N. Yousef Saleem Al Zubaidi, and M. Kurt Pehlivanoglu, “Cyber Attacks Classification on Enriching IoT Datasets”, EAI Endorsed Trans IoT, vol. 9, no. 3, p. e2, Aug. 2023.