{"title":"Detecting Malicious Nodes in IoT Networks Using Machine Learning and Artificial Neural Networks","authors":"Kazi Kutubuddin Sayyad Liyakat","doi":"10.1109/ESCI56872.2023.10099544","DOIUrl":null,"url":null,"abstract":"Thanks to a relatively new technology known as the Internet of Things, devices can now easily and wirelessly share data with one another over the internet or other networked systems (IoT). Despite these benefits, IoT systems are now more vulnerable to hacker attacks, which could have neg-ative consequences. This is due to the ongoing expansion of the IoT ecosystem. These incursions have the potential to cause fi-nancial and physical harm. The IoT is a network that config-ures itself automatically. This network is susceptible to a varie-ty of attacks, all of which can be started by rogue nodes. For instance, during a denial of service attack, a malicious node bombards a targeted node with a large number of packets. For the purpose of locating these malicious nodes in a network, a threshold-based procedure utilising cutting-edge machine learning techniques is launched. By checking the path latency and alerting on it if it exceeds a set threshold value, the sug-gested method can help identify an attacker node. The NS2 programme will be used to mimic the suggested method. We evaluate the suggested methodology and demonstrate that our system performs well in terms of a number of measures, such as throughput, latency, and packet loss.","PeriodicalId":441215,"journal":{"name":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ESCI56872.2023.10099544","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Thanks to a relatively new technology known as the Internet of Things, devices can now easily and wirelessly share data with one another over the internet or other networked systems (IoT). Despite these benefits, IoT systems are now more vulnerable to hacker attacks, which could have neg-ative consequences. This is due to the ongoing expansion of the IoT ecosystem. These incursions have the potential to cause fi-nancial and physical harm. The IoT is a network that config-ures itself automatically. This network is susceptible to a varie-ty of attacks, all of which can be started by rogue nodes. For instance, during a denial of service attack, a malicious node bombards a targeted node with a large number of packets. For the purpose of locating these malicious nodes in a network, a threshold-based procedure utilising cutting-edge machine learning techniques is launched. By checking the path latency and alerting on it if it exceeds a set threshold value, the sug-gested method can help identify an attacker node. The NS2 programme will be used to mimic the suggested method. We evaluate the suggested methodology and demonstrate that our system performs well in terms of a number of measures, such as throughput, latency, and packet loss.