Anomaly Based Intrusion Detection on IOT Devices using Logistic Regression

K. Sasikala, S. Vasuhi
{"title":"Anomaly Based Intrusion Detection on IOT Devices using Logistic Regression","authors":"K. Sasikala, S. Vasuhi","doi":"10.1109/ICNWC57852.2023.10127375","DOIUrl":null,"url":null,"abstract":"The collecting and exchange of information without human intervention will soon be possible thanks to the Internet of Things. Numerous conflicts with IOT technology are emerging due to the fast increase in connected devices, including those related to diversity, expansibility, service quality, security requirements, and many more. IOT technology has advanced as a result oftechnological developments like machine learning. To reduce learning difficulty by computing features, factor selection, also called feature selection, is crucial, especially for a large, huge data set like network traffic. Despite the ease of the new selection approaches, it is actually not an easy task to do feature selection properly. The Internet of Things will soon make it feasible to gather and transmit information without human involvement. Due to the rapid growth in connected devices, a number of conflicts with IOT technologies are arising. These conflicts include those involving diversity, expansibility, quality of service, security needs, and many more. As a consequence of technical advancements like machine learning, IOT technology has improved. Factor selection, also known as feature selection, is essential to lessen the complexity of learning by computing features, especially for a massive, enormous data set like internet traffic. Even though the new selection methods are simple, selecting features correctly is a difficult undertaking. Systems that detect and prevent intrusions are the most popular technology for spotting suspicious behaviour and defending diverse infrastructures against network intrusions (IDPSs). On the UNSW (University of New South Wales) -NBl5 data set, our suggested logistic regression algorithm makes predictions of anomalies with an accuracy of 98% using the automated feature selection approach since the accuracy of the model depends on the feature. The dimensionality reduction approach is used to reduce the misleading data.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Networking and Communications (ICNWC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNWC57852.2023.10127375","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The collecting and exchange of information without human intervention will soon be possible thanks to the Internet of Things. Numerous conflicts with IOT technology are emerging due to the fast increase in connected devices, including those related to diversity, expansibility, service quality, security requirements, and many more. IOT technology has advanced as a result oftechnological developments like machine learning. To reduce learning difficulty by computing features, factor selection, also called feature selection, is crucial, especially for a large, huge data set like network traffic. Despite the ease of the new selection approaches, it is actually not an easy task to do feature selection properly. The Internet of Things will soon make it feasible to gather and transmit information without human involvement. Due to the rapid growth in connected devices, a number of conflicts with IOT technologies are arising. These conflicts include those involving diversity, expansibility, quality of service, security needs, and many more. As a consequence of technical advancements like machine learning, IOT technology has improved. Factor selection, also known as feature selection, is essential to lessen the complexity of learning by computing features, especially for a massive, enormous data set like internet traffic. Even though the new selection methods are simple, selecting features correctly is a difficult undertaking. Systems that detect and prevent intrusions are the most popular technology for spotting suspicious behaviour and defending diverse infrastructures against network intrusions (IDPSs). On the UNSW (University of New South Wales) -NBl5 data set, our suggested logistic regression algorithm makes predictions of anomalies with an accuracy of 98% using the automated feature selection approach since the accuracy of the model depends on the feature. The dimensionality reduction approach is used to reduce the misleading data.
基于逻辑回归的物联网设备异常入侵检测
由于物联网,无需人工干预的信息收集和交换将很快成为可能。由于连接设备的快速增加,包括与多样性、可扩展性、服务质量、安全要求等相关的设备,与物联网技术的许多冲突正在出现。物联网技术的进步是机器学习等技术发展的结果。为了通过计算特征来降低学习难度,因素选择,也称为特征选择,是至关重要的,特别是对于像网络流量这样的大型数据集。尽管新的选择方法很容易,但正确地进行特征选择实际上并不是一件容易的事情。物联网将很快使无需人工参与的信息收集和传输成为可能。由于连接设备的快速增长,与物联网技术的一些冲突正在出现。这些冲突包括那些涉及多样性、可扩展性、服务质量、安全需求等等的冲突。由于机器学习等技术进步,物联网技术得到了改进。因子选择,也被称为特征选择,对于通过计算特征来减少学习的复杂性是必不可少的,特别是对于像互联网流量这样庞大的数据集。尽管新的选择方法很简单,但正确选择特征是一项艰巨的任务。检测和防止入侵的系统是发现可疑行为和保护各种基础设施免受网络入侵(idps)的最流行的技术。在UNSW(新南威尔士大学)-NBl5数据集上,我们建议的逻辑回归算法使用自动特征选择方法对异常进行预测,准确率达到98%,因为模型的准确性取决于特征。采用降维方法对误导数据进行降维处理。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信