Evaluating Machine Learning Methods for Intrusion Detection in IoT

Mathew Nicho, S. Girija
{"title":"Evaluating Machine Learning Methods for Intrusion Detection in IoT","authors":"Mathew Nicho, S. Girija","doi":"10.1145/3551690.3551692","DOIUrl":null,"url":null,"abstract":"Cyber-attacks in IoT enabled devices have grown at an alarming rate since the start of the Covid-19 pandemic due to cyber physical digital transformation enabled through widespread deployment of low cost sensor embedded IoT devices in consumer and industrial IOT, as well as increase in computing power. Consequently, this adoption trend had led to 1.51 billion breaches on IoT devices during the first half of 2021 alone. This highlights the critical importance of being prepared for IoT vulnerabilities (IoT manufacturing and deployment sector) and attacks (malicious actors). In this respect machine learning (ML) especially deep learning (DL) strategies has emerged as the preferred methods to secure IoT devices from attacks. In this paper, we propose three deep learning algorithms for IoT intrusion detection based on mapping of IoT attacks to ML/DL methods. Our paper thus provides two contributions. First, we present a model that maps extant research on the application of ML/DL to specific IoT attacks. Second, through an optimal selection of the mapping, we present three algorithms (naïve Bayes, convolutional neural network and autoencoder) for detection of intrusion in IoT attacks. This provides a review of research opportunities and research gaps in the IoT IDS domain.","PeriodicalId":112679,"journal":{"name":"Proceedings of the 12th International Conference on Information Communication and Management","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 12th International Conference on Information Communication and Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3551690.3551692","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Cyber-attacks in IoT enabled devices have grown at an alarming rate since the start of the Covid-19 pandemic due to cyber physical digital transformation enabled through widespread deployment of low cost sensor embedded IoT devices in consumer and industrial IOT, as well as increase in computing power. Consequently, this adoption trend had led to 1.51 billion breaches on IoT devices during the first half of 2021 alone. This highlights the critical importance of being prepared for IoT vulnerabilities (IoT manufacturing and deployment sector) and attacks (malicious actors). In this respect machine learning (ML) especially deep learning (DL) strategies has emerged as the preferred methods to secure IoT devices from attacks. In this paper, we propose three deep learning algorithms for IoT intrusion detection based on mapping of IoT attacks to ML/DL methods. Our paper thus provides two contributions. First, we present a model that maps extant research on the application of ML/DL to specific IoT attacks. Second, through an optimal selection of the mapping, we present three algorithms (naïve Bayes, convolutional neural network and autoencoder) for detection of intrusion in IoT attacks. This provides a review of research opportunities and research gaps in the IoT IDS domain.
评估物联网入侵检测的机器学习方法
自2019冠状病毒病大流行开始以来,由于在消费和工业物联网中广泛部署低成本嵌入式传感器物联网设备,以及计算能力的提高,实现了网络物理数字化转型,物联网设备中的网络攻击以惊人的速度增长。因此,仅在2021年上半年,这种采用趋势就导致物联网设备发生了15.1亿次违规行为。这凸显了为物联网漏洞(物联网制造和部署部门)和攻击(恶意行为者)做好准备的重要性。在这方面,机器学习(ML)尤其是深度学习(DL)策略已成为保护物联网设备免受攻击的首选方法。在本文中,我们提出了三种基于物联网攻击映射到ML/DL方法的物联网入侵检测深度学习算法。因此,我们的论文提供了两个贡献。首先,我们提出了一个模型,该模型将ML/DL应用于特定物联网攻击的现有研究进行了映射。其次,通过对映射的优化选择,我们提出了三种算法(naïve贝叶斯、卷积神经网络和自动编码器)来检测物联网攻击中的入侵。本文回顾了物联网IDS领域的研究机会和研究差距。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信