Identification of cyber attacks using machine learning in smart IoT networks

被引:8
|
作者
Malathi C. [1 ]
Padmaja I.N. [2 ]
机构
[1] Department of Computer Science, Sri Padmavathi Mahila Visvavidyalayam, AP, Tirupati
[2] Department of Information Technology, RVR&JC College of Engineering, Chowdavaram, AP, Guntur
来源
关键词
BoT-IoT metadata; Cyber attacks; Cyber security; Internet of Things (IoT); Machine-learning (ML); Network abnormal detection;
D O I
10.1016/j.matpr.2021.06.400
中图分类号
学科分类号
摘要
The Internet of Things (IoT) combines billions of physical objects that can communicate with each device without minimal human interaction. IoT has grown to be one of the most popular technologies and an attractive field of interest in the business world. The demand and usage of IoT are expanding rapidly. Several organizations are funding in this domain for their business use and giving it as a service for other organizations. The result of IoT development is the rise of different security difficulties to both organizations and buyers. Cyber Security gives excellent services to preserve internet privacy and business interventions such as disguising communication intrusions, denial of service interventions, blocked, and unauthorized real-time communication. Performing safety measures, such as authentication, encryption, network protection, access power, and application protection to IoT devices and their natural vulnerabilities are less effective. Therefore, security should improve to protect the IoT ecosystem efficiently. Machine Learning algorithms are proposed to secure the data from cyber security risks. Machine-learning algorithms that can apply in different ways to limit and identify the outbreaks and security gaps in networks. The main goal of this article ability to understand the efficiency of machine learning (ML) algorithms in opposing Network-related cyber security Assault, with a focus on Denial of Service (DoS) attacks. We also address the difficulties that require to be discussed to implement these Machine Learning (ML) security schemes in practical physical object (IoT) systems. In this research, our main aim is to provide security by multiple machine-learning (ML) algorithms that are mostly used to recognise the interrelated (IoT) network Assault immediately. Unique metadata, Bot-IoT, is accustomed to estimate different recognition algorithms. In this execution stage, several kinds of Machine-Learning (ML) algorithms were handled and mostly reached extraordinary achievement. Novel factors were gathered from the Bot-IoT metadata while implementation and the latest features contributed more reliable outcomes. © 2021
引用
收藏
页码:2518 / 2523
页数:5
相关论文
共 50 条
  • [11] Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning
    Lee, Seungjin
    Abdullah, Azween
    Jhanjhi, Nz
    Kok, Sh
    PEERJ COMPUTER SCIENCE, 2021,
  • [12] Multiple Classification of Cyber Attacks Using Machine Learning
    Guven, Ebu Yusuf
    Gulgun, Sueda
    Manav, Ceyda
    Bakir, Behice
    Aydin, Zeynep Gurkas
    ELECTRICA, 2022, 22 (02): : 313 - 320
  • [13] Detection of cyber attacks in smart grids using SVM-boosted machine learning models
    Hathal Salamah Alwageed
    Service Oriented Computing and Applications, 2022, 16 : 313 - 326
  • [14] Detection of cyber attacks in smart grids using SVM-boosted machine learning models
    Alwageed, Hathal Salamah
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2022, 16 (04) : 313 - 326
  • [15] Cyber Threat Intelligence for IoT Using Machine Learning
    Mishra, Shailendra
    Albarakati, Aiman
    Sharma, Sunil Kumar
    PROCESSES, 2022, 10 (12)
  • [16] A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks
    Khazane, Hassan
    Ridouani, Mohammed
    Salahdine, Fatima
    Kaabouch, Naima
    FUTURE INTERNET, 2024, 16 (01)
  • [17] Smart Agriculture Using Iot and Machine Learning
    David, Shiela
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (06): : 326 - 329
  • [18] Predicting Cyber-Attacks on IoT Networks Using Deep-Learning and Different Variants of SMOTE
    Akash, Bathini Sai
    Yannam, Pavan Kumar Reddy
    Ruthvik, Bokkasam Venkata Sai
    Kumar, Lov
    Murthy, Lalita Bhanu
    Krishna, Aneesh
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, AINA-2022, VOL 2, 2022, 450 : 243 - 255
  • [19] Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods
    Mazhar, Tehseen
    Irfan, Hafiz Muhammad
    Khan, Sunawar
    Haq, Inayatul
    Ullah, Inam
    Iqbal, Muhammad
    Hamam, Habib
    FUTURE INTERNET, 2023, 15 (02)
  • [20] Internet of Things Cyber Attacks Detection using Machine Learning
    Alsamiri, Jadel
    Alsubhi, Khalid
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (12) : 627 - 634