IOT-BASED cyber security identification model through machine learning technique

被引:0
|
作者
Lal B. [1 ]
Ravichandran S. [2 ]
Kavin R. [3 ]
Anil Kumar N. [4 ]
Bordoloi D. [5 ,6 ]
Ganesh Kumar R. [7 ]
机构
[1] Dept. of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur Dist, A.P
[2] Department of Computer Science and Engineering, School of Technology, GITAM University, Rudraram, Telangana, Hyderabad
[3] Department of Electrical and Electronics Engineering, Sri Krishna College of Engineering and Technology, Tamil Nadu, Coimbatore
[4] Department of Electronics & Communication Engineering, School of Engineering & Technology, Mohan Babu University (Erst while Sree Vidyanikethan Engineering College), Andhra Pradesh, Tirupati
[5] Computer Science and Engineering, Graphic Era Hill University, Dehradun
[6] R/S, CSE, Graphic Era Deemed To Be University, Uttarakhand, Dehradun
[7] Department of Computer Science and Engineering, CHRIST (Deemed to be University), School of Engineering and Technology, Kengeri Campus, Kumbalgodu, Bangalore
来源
Measurement: Sensors | 2023年 / 27卷
关键词
Cyber security; Internet of things; Machine learning algorithms; Meta-classifier methods; Repositories; Security;
D O I
10.1016/j.measen.2023.100791
中图分类号
学科分类号
摘要
Manual vulnerability evaluation tools produce erroneous data and lead to difficult analytical thinking. Such security concerns are exacerbated by the variety, imperfection, and redundancies of modern security repositories. These problems were common traits of producers and public vulnerability disclosures, which make it more difficult to identify security flaws through direct analysis through the Internet of Things (IoT). Recent breakthroughs in Machine Learning (ML) methods promise new solutions to each of these infamous diversification and asymmetric information problems throughout the constantly increasing vulnerability reporting databases. Due to their varied methodologies, those procedures themselves display varying levels of performance. The authors provide a method for cognitive cybersecurity that enhances human cognitive capacity in two ways. To create trustworthy data sets, initially reconcile competing vulnerability reports and then pre-process advanced embedded indicators. This proposed methodology's full potential has yet to be fulfilled, both in terms of its execution and its significance for security evaluation in application software. The study shows that the recommended mental security methodology works better when addressing the above inadequacies and the constraints of variation among cybersecurity alert mechanisms. Intriguing trade-offs are presented by the experimental analysis of our program, in particular the ensemble method that detects tendencies of computational security defects on data sources. © 2023 The Authors
引用
收藏
相关论文
共 50 条
  • [21] Security and Privacy Challenges in IoT-Based Machine-to-Machine Collaborative Scenarios
    Chen, Hsin Chung
    Al Faruque, Mohammad Abdullah
    Chou, Pai H.
    [J]. 2016 INTERNATIONAL CONFERENCE ON HARDWARE/SOFTWARE CODESIGN AND SYSTEM SYNTHESIS (CODES+ISSS), 2016,
  • [22] IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model
    Sarker, Iqbal H.
    Abushark, Yoosef B.
    Alsolami, Fawaz
    Khan, Asif Irshad
    [J]. SYMMETRY-BASEL, 2020, 12 (05):
  • [23] Cyber Security: Threat Detection Model based on Machine learning Algorithm
    Dalal, Kushal Rashmikant
    Rele, Mayur
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES 2018), 2018, : 239 - 243
  • [24] Cyber Security on the Edge: Efficient Enabling of Machine Learning on IoT Devices
    Kumari, Swati
    Tulshyan, Vatsal
    Tewari, Hitesh
    [J]. INFORMATION, 2024, 15 (03)
  • [25] Machine learning and cyber security
    Karius, Sebastian
    Knoechel, Mandy
    Hesse, Sascha
    Reiprich, Tim
    [J]. IT-INFORMATION TECHNOLOGY, 2023, 65 (4-5): : 142 - 154
  • [26] Identification of cyber attacks using machine learning in smart IoT networks
    Malathi C.
    Padmaja I.N.
    [J]. Materials Today: Proceedings, 2023, 80 : 2518 - 2523
  • [27] Managing IoT Cyber-Security Using Programmable Telemetry and Machine Learning
    Sivanathan, Arunan
    Gharakheili, Hassan Habibi
    Sivaraman, Vijay
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (01): : 60 - 74
  • [28] IoT-based Security Alarm Protocol
    Velastegui, Homero J.
    Acurio, Santiago M.
    [J]. 2021 7TH INTERNATIONAL CONFERENCE ON ENGINEERING AND EMERGING TECHNOLOGIES (ICEET 2021), 2021, : 649 - 654
  • [29] IoT-Based Women Security System
    Kannan, Megalingam Rajesh
    Jyothsna, K.
    Aparna, T. S.
    Anjali, T.
    Meera, M.
    Amrutha, S. D.
    [J]. INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 1369 - 1378
  • [30] Enhanced IDS with Deep Learning for IoT-Based Smart Cities Security
    Hazman, Chaimae
    Guezzaz, Azidine
    Benkirane, Said
    Azrour, Mourade
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2024, 29 (04) : 929 - 947