5
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices. The participating devices in IoT networks can be problematic due to their resource-constrained nature, and integrating security on these devices is often overlooked. This has resulted in attackers having an increased incentive to target IoT devices. As the number of attacks possible on a network increases, it becomes more difficult for traditional intrusion detection systems (IDS) to cope with these attacks efficiently. In this paper, we highlight several machine learning (ML) methods such as k-nearest neighbour (KNN), support vector machine (SVM), decision tree (DT), naive Bayes (NB), random forest (RF), artificial neural network (ANN), and logistic regression (LR) that can be used in IDS. In this work, ML algorithms are compared for both binary and multi-class classification on Bot-IoT dataset. Based on several parameters such as accuracy, precision, recall, F1 score, and log loss, we experimentally compared the aforementioned ML algorithms. In the case of HTTP distributed denial-of-service (DDoS) attack, the accuracy of RF is 99%. Furthermore, other simulation results-based precision, recall, F1 score, and log loss metric reveal that RF outperforms on all types of attacks in binary classification. However, in multi-class classification, KNN outperforms other ML algorithms with an accuracy of 99%, which is 4% higher than RF.

          Related collections

          Most cited references54

          • Record: found
          • Abstract: found
          • Article: not found

          What is a support vector machine?

          Support vector machines (SVMs) are becoming popular in a wide variety of biological applications. But, what exactly are SVMs and how do they work? And what are their most promising applications in the life sciences?
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            DDoS in the IoT: Mirai and Other Botnets

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset

                Bookmark

                Author and article information

                Journal
                Sensors (Basel)
                Sensors (Basel)
                sensors
                Sensors (Basel, Switzerland)
                MDPI
                1424-8220
                10 January 2021
                January 2021
                : 21
                : 2
                : 446
                Affiliations
                [1 ]School of Computing, Edinburgh Napier University, Edinburgh EH10 5DT, UK; 40344090@ 123456live.napier.ac.uk (A.C.); jawadkhattak@ 123456ieee.org (J.A.); mandar.gogate@ 123456napier.ac.uk (M.G.); B.Buchanan@ 123456napier.ac.uk (W.J.B.)
                [2 ]School of Electronics, Electrical Engineering and Computer Science, Queen’s University, Belfast BT9 5BN, UK
                [3 ]Department of Computer Science, Namal Institute, Mianwali 42250, Pakistan; sadaqat.rehman@ 123456namal.edu.pk
                [4 ]College of Information Engineering, Yangzhou University, Yangzhou 225127, China; fawadmasood09@ 123456mail.ist.edu.pk
                [5 ]Department of Computer Science, King Fahad Naval Academy, Al Jubail 35512, Saudi Arabia; f-alqahtani@ 123456rsnf.gov.sa
                [6 ]School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China; n.boubakr@ 123456bit.edu.cn
                Author notes
                [* ]Correspondence: r.ullah@ 123456qub.ac.uk ; Tel.: +44-7459-408406
                Author information
                https://orcid.org/0000-0003-1687-3749
                https://orcid.org/0000-0002-6475-2434
                https://orcid.org/0000-0001-6289-8248
                https://orcid.org/0000-0001-7823-3814
                https://orcid.org/0000-0001-9564-6653
                https://orcid.org/0000-0001-5609-856X
                https://orcid.org/0000-0003-0809-3523
                Article
                sensors-21-00446
                10.3390/s21020446
                7827441
                33435202
                50d364cb-d3e2-4992-ae95-70451e794c02
                © 2021 by the authors.

                Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license ( http://creativecommons.org/licenses/by/4.0/).

                History
                : 12 December 2020
                : 07 January 2021
                Categories
                Article

                Biomedical engineering
                internet of things (iot),iot attacks,security,intrusion detection systems,privacy,machine learning,ml models,multi-class classification

                Comments

                Comment on this article