Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT

被引:12
|
作者
Rose, Joseph R. [1 ]
Swann, Matthew [1 ]
Bendiab, Gueltoum [1 ]
Shiaeles, Stavros [1 ]
Kolokotronis, Nicholas [2 ]
机构
[1] Univ Portsmouth, Cyber Secur Res Grp, Portsmouth PO1 2UP, Hants, England
[2] Univ Peloponnese, Dept Informat & Telecommun, Tripolis 22131, Greece
关键词
Machine Learning; Intrusion Detection System; Security; Internet of Things; network profiling; INTERNET; THINGS;
D O I
10.1109/NetSoft51509.2021.9492685
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid increase in the use of IoT devices brings many benefits to the digital society, ranging from improved efficiency to higher productivity. However, the limited resources and the open nature of these devices make them vulnerable to various cyber threats. A single compromised device can have an impact on the whole network and lead to major security and physical damages. This paper explores the potential of using network profiling and machine learning to secure IoT against cyber attacks. The proposed anomaly-based intrusion detection solution dynamically and actively profiles and monitors all networked devices for the detection of IoT device tampering attempts as well as suspicious network transactions. Any deviation from the defined profile is considered to be an attack and is subject to further analysis. Raw traffic is also passed on to the machine learning classifier for examination and identification of potential attacks. Performance assessment of the proposed methodology is conducted on the Cyber-Trust testbed using normal and malicious network traffic. The experimental results show that the proposed anomaly detection system delivers promising results with an overall accuracy of 98.35% and 0.98% of false-positive alarms.
引用
收藏
页码:409 / 415
页数:7
相关论文
共 50 条
  • [1] Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT
    Ben Slimane, Jihane
    Abd-Elkawy, Eman H.
    Maqbool, Albia
    [J]. JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (03) : 2140 - 2149
  • [2] An intrusion detection system using network traffic profiling and online sequential extreme learning machine
    Singh, Raman
    Kumar, Harish
    Singla, R. K.
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (22) : 8609 - 8624
  • [3] Intrusion Detection in IoT Network Traffic Using Markov Model
    Liu, I-Hsien
    Huang, Hsiao-Ching
    Lee, Meng-Huan
    Li, Jung-Shian
    [J]. SENSORS AND MATERIALS, 2024, 36 (03) : 1127 - 1134
  • [4] IoT Bonet and Network Intrusion Detection using Dimensionality Reduction and Supervised Machine Learning
    Desai, Madhuri Gurunathrao
    Shi, Yong
    Suo, Kun
    [J]. 2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 316 - 322
  • [5] Black box attack and network intrusion detection using machine learning for malicious traffic
    Zhu, Yiran
    Cui, Lei
    Ding, Zhenquan
    Li, Lun
    Liu, Yongji
    Hao, Zhiyu
    [J]. COMPUTERS & SECURITY, 2022, 123
  • [6] Intrusion Detection of Imbalanced Network Traffic Based on Machine Learning and Deep Learning
    Liu, Lan
    Wang, Pengcheng
    Lin, Jun
    Liu, Langzhou
    [J]. IEEE Access, 2021, 9 : 7550 - 7563
  • [7] Intrusion Detection of Imbalanced Network Traffic Based on Machine Learning and Deep Learning
    Liu, Lan
    Wang, Pengcheng
    Lin, Jun
    Liu, Langzhou
    [J]. IEEE ACCESS, 2021, 9 : 7550 - 7563
  • [8] Machine learning approaches to network intrusion detection for contemporary internet traffic
    Ilyas, Muhammad U.
    Alharbi, Soltan Abed
    [J]. COMPUTING, 2022, 104 (05) : 1061 - 1076
  • [9] Machine learning approaches to network intrusion detection for contemporary internet traffic
    Muhammad U. Ilyas
    Soltan Abed Alharbi
    [J]. Computing, 2022, 104 : 1061 - 1076
  • [10] Network Intrusion Detection using Machine Learning Approaches
    Hossain, Zakir
    Sourov, Md Mahmudur Rahman
    Khan, Musharrat
    Rahman, Parves
    [J]. PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 303 - 307