Please use this identifier to cite or link to this item:
http://bura.brunel.ac.uk/handle/2438/28660
Title: | Denial of Service Detection for IoT Networks Using Machine Learning |
Authors: | Abdulla, H Al-Raweshidy, HS Awad, W |
Keywords: | intrusion detection system;IoT;machine learning;security;anomaly detection |
Issue Date: | 22-Feb-2023 |
Publisher: | SciTePress (Science and Technology Publications) |
Citation: | Abdulla, H., Al-Raweshidy, H.S. and Awad, W. (2023) 'Denial of Service Detection for IoT Networks Using Machine Learning', Proceedings of the 15th International Conference on Agents and Artificial Intelligence ICAART, Lisbon, Portugal, 22-24 February, volume 3 pp. 996 - 1003. doi: 10.5220/0011885700003393. |
Abstract: | The Internet of Things (IoT) is considered one of the trending technologies today. IoT affects a variety of industries, including logistics tracking, healthcare, automotive and smart cities. A rising number of cyberattacks and breaches are rapidly targeting networks equipped with IoT devices. Due to the resource-constrained nature of the IoT devices, one of the Internet security issues impacting IoT devices is the Denial-of-Service (DoS). This encourages the development of new techniques for automatically detecting DoS in IoT networks. In this paper, we test the performance of the following Machine Learning (ML) algorithms in detecting IoT DoS attacks using packet analysis at regular time intervals: Neural Networks (NN), Gaussian Naive Bayes (NB), Decision Trees (DT), and Support Vector Machine (SVM). We were able to achieve 98% accuracy in intrusion detection for IoT devices. We have created a novel way of detecting the attacks using only six attributes, which significantly reduces the time to train the ML Models by 58% on average. This research is based on data collected from actual IoT attacks on IoT networks. This paper shows that using the DT or NN; we can detect attacks on IoT devices. Furthermore, it shows that NB and SVM are poor in detecting IoT attacks. In addition, it proves that middle boxes embedded with ML Models can be utilized to detect attacks in places such as houses, manufactures, and plants. |
URI: | https://bura.brunel.ac.uk/handle/2438/28660 |
DOI: | https://doi.org/10.5220/0011885700003393 |
ISBN: | 978-989-758-623-1 |
ISSN: | 2184-3589 |
Other Identifiers: | ORCiD: Hamed S. Al-Raweshidy https://orcid.org/0000-0002-3702-8192 |
Appears in Collections: | Dept of Electronic and Electrical Engineering Research Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
FullText.pdf | Copyright © 2023 by SCITEPRESS – Science and Technology Publications, Lda. This is an Open Access article distributed under the terms of the Creative Commons (CC BY-NC-ND 4.0) Attribution License (https://creativecommons.org/licenses/by-nc-nd/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. | 493.04 kB | Adobe PDF | View/Open |
This item is licensed under a Creative Commons License