Ng Yee Jien, Mohammad Tahir, M. Dabbagh, K. Yap, Ali Farooq
{"title":"Performance Evaluation of Machine Learning Algorithms for Intrusion Detection in IoT Applications","authors":"Ng Yee Jien, Mohammad Tahir, M. Dabbagh, K. Yap, Ali Farooq","doi":"10.1109/IICAIET55139.2022.9936863","DOIUrl":null,"url":null,"abstract":"It is estimated that the number of IoT devices will reach 50 billion by 2030, with its wide range of applications and ease of use. However, in recent years, it has been established that there are numerous attacks targeting IoT devices and various challenges to securing them due to their limited computing capacity. One of the main problems that need to be solved is detecting and reporting malicious packets that are attempting to enter the IoT device before they are executed, also known as intrusion detection. An Intrusion Detection System (IDS) is a tool that monitors the network for potentially malicious packets and raises an alert when one is detected. With the usage of technologies such as machine learning and published datasets of IoT traffic that contain malicious traffic and normal traffic, an optimal approach to intrusion detection can be identified. This paper provides an overview of existing machine learning approaches for intrusion detection and evaluates different approaches using multiple datasets. The available datasets were evaluated on several machine learning models based on accuracy, F1-score, and efficiency.","PeriodicalId":142482,"journal":{"name":"2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IICAIET55139.2022.9936863","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
It is estimated that the number of IoT devices will reach 50 billion by 2030, with its wide range of applications and ease of use. However, in recent years, it has been established that there are numerous attacks targeting IoT devices and various challenges to securing them due to their limited computing capacity. One of the main problems that need to be solved is detecting and reporting malicious packets that are attempting to enter the IoT device before they are executed, also known as intrusion detection. An Intrusion Detection System (IDS) is a tool that monitors the network for potentially malicious packets and raises an alert when one is detected. With the usage of technologies such as machine learning and published datasets of IoT traffic that contain malicious traffic and normal traffic, an optimal approach to intrusion detection can be identified. This paper provides an overview of existing machine learning approaches for intrusion detection and evaluates different approaches using multiple datasets. The available datasets were evaluated on several machine learning models based on accuracy, F1-score, and efficiency.