Shalini K B Devi, Sanjay Kumar, Jambi Ratna Raja Kumar
{"title":"Machine Learning Methods for Secure Internet of Things Against Cyber Threats","authors":"Shalini K B Devi, Sanjay Kumar, Jambi Ratna Raja Kumar","doi":"10.1109/GCAT55367.2022.9971859","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) connects billions of devices that can communicate with each other with little human input. IoT is the rapid-growth segment of computing, but it is also one of the most susceptible to cyber-attacks. Practical countermeasures to safeguard IoT networks, for instance network anomaly monitoring, must be devised. While attacks cannot be completely prevented, early identification is critical for effective protection. Because IoT devices have limited storage and processing power, typical most sophisticated security solutions are ineffective. Also, IoT devices now connect automatically for longer durations. This necessitates clever network-based security solutions like machine learning. Although numerous studies have recently examined the use of Machine Learning (ML) techniques in attacks detection, a small attention is to be paid for detecting the attacks in IoT networks. We want to add to the field by testing several machine learning techniques for detecting IoT network attacks. The Bot-IoT dataset is used to test detection methods. For implementing the system, various machine learning algorithms are deployed, most of which performed well. During deployment, additional characteristics were collected from the Bot-IoT dataset and compared to existing research, with superior results.","PeriodicalId":133597,"journal":{"name":"2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT)","volume":"37 5","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GCAT55367.2022.9971859","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Internet of Things (IoT) connects billions of devices that can communicate with each other with little human input. IoT is the rapid-growth segment of computing, but it is also one of the most susceptible to cyber-attacks. Practical countermeasures to safeguard IoT networks, for instance network anomaly monitoring, must be devised. While attacks cannot be completely prevented, early identification is critical for effective protection. Because IoT devices have limited storage and processing power, typical most sophisticated security solutions are ineffective. Also, IoT devices now connect automatically for longer durations. This necessitates clever network-based security solutions like machine learning. Although numerous studies have recently examined the use of Machine Learning (ML) techniques in attacks detection, a small attention is to be paid for detecting the attacks in IoT networks. We want to add to the field by testing several machine learning techniques for detecting IoT network attacks. The Bot-IoT dataset is used to test detection methods. For implementing the system, various machine learning algorithms are deployed, most of which performed well. During deployment, additional characteristics were collected from the Bot-IoT dataset and compared to existing research, with superior results.