利用机器学习和人工神经网络检测物联网网络中的恶意节点

Kazi Kutubuddin Sayyad Liyakat
{"title":"利用机器学习和人工神经网络检测物联网网络中的恶意节点","authors":"Kazi Kutubuddin Sayyad Liyakat","doi":"10.1109/ESCI56872.2023.10099544","DOIUrl":null,"url":null,"abstract":"Thanks to a relatively new technology known as the Internet of Things, devices can now easily and wirelessly share data with one another over the internet or other networked systems (IoT). Despite these benefits, IoT systems are now more vulnerable to hacker attacks, which could have neg-ative consequences. This is due to the ongoing expansion of the IoT ecosystem. These incursions have the potential to cause fi-nancial and physical harm. The IoT is a network that config-ures itself automatically. This network is susceptible to a varie-ty of attacks, all of which can be started by rogue nodes. For instance, during a denial of service attack, a malicious node bombards a targeted node with a large number of packets. For the purpose of locating these malicious nodes in a network, a threshold-based procedure utilising cutting-edge machine learning techniques is launched. By checking the path latency and alerting on it if it exceeds a set threshold value, the sug-gested method can help identify an attacker node. The NS2 programme will be used to mimic the suggested method. We evaluate the suggested methodology and demonstrate that our system performs well in terms of a number of measures, such as throughput, latency, and packet loss.","PeriodicalId":441215,"journal":{"name":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Detecting Malicious Nodes in IoT Networks Using Machine Learning and Artificial Neural Networks\",\"authors\":\"Kazi Kutubuddin Sayyad Liyakat\",\"doi\":\"10.1109/ESCI56872.2023.10099544\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Thanks to a relatively new technology known as the Internet of Things, devices can now easily and wirelessly share data with one another over the internet or other networked systems (IoT). Despite these benefits, IoT systems are now more vulnerable to hacker attacks, which could have neg-ative consequences. This is due to the ongoing expansion of the IoT ecosystem. These incursions have the potential to cause fi-nancial and physical harm. The IoT is a network that config-ures itself automatically. This network is susceptible to a varie-ty of attacks, all of which can be started by rogue nodes. For instance, during a denial of service attack, a malicious node bombards a targeted node with a large number of packets. For the purpose of locating these malicious nodes in a network, a threshold-based procedure utilising cutting-edge machine learning techniques is launched. By checking the path latency and alerting on it if it exceeds a set threshold value, the sug-gested method can help identify an attacker node. The NS2 programme will be used to mimic the suggested method. We evaluate the suggested methodology and demonstrate that our system performs well in terms of a number of measures, such as throughput, latency, and packet loss.\",\"PeriodicalId\":441215,\"journal\":{\"name\":\"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)\",\"volume\":\"84 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ESCI56872.2023.10099544\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ESCI56872.2023.10099544","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

由于物联网这一相对较新的技术,设备现在可以通过互联网或其他网络系统(IoT)轻松地无线共享数据。尽管有这些好处,物联网系统现在更容易受到黑客攻击,这可能会产生负面后果。这是由于物联网生态系统的不断扩展。这些入侵有可能造成经济和人身伤害。物联网是一个自动配置自身的网络。该网络容易受到各种攻击,所有这些攻击都可以由恶意节点启动。例如,在拒绝服务攻击中,恶意节点向目标节点发送大量数据包。为了在网络中定位这些恶意节点,我们启动了一个基于阈值的程序,该程序利用了尖端的机器学习技术。通过检查路径延迟并在超过设置的阈值时发出警报,建议的方法可以帮助识别攻击者节点。NS2程序将用于模拟建议的方法。我们评估了建议的方法,并证明我们的系统在吞吐量、延迟和数据包丢失等许多度量方面表现良好。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Detecting Malicious Nodes in IoT Networks Using Machine Learning and Artificial Neural Networks
Thanks to a relatively new technology known as the Internet of Things, devices can now easily and wirelessly share data with one another over the internet or other networked systems (IoT). Despite these benefits, IoT systems are now more vulnerable to hacker attacks, which could have neg-ative consequences. This is due to the ongoing expansion of the IoT ecosystem. These incursions have the potential to cause fi-nancial and physical harm. The IoT is a network that config-ures itself automatically. This network is susceptible to a varie-ty of attacks, all of which can be started by rogue nodes. For instance, during a denial of service attack, a malicious node bombards a targeted node with a large number of packets. For the purpose of locating these malicious nodes in a network, a threshold-based procedure utilising cutting-edge machine learning techniques is launched. By checking the path latency and alerting on it if it exceeds a set threshold value, the sug-gested method can help identify an attacker node. The NS2 programme will be used to mimic the suggested method. We evaluate the suggested methodology and demonstrate that our system performs well in terms of a number of measures, such as throughput, latency, and packet loss.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信