Abdul Hanan K. Mohammed, Hrag-Harout Jebamikyous, Dina Nawara, R. Kashef
{"title":"物联网网络攻击检测:比较分析","authors":"Abdul Hanan K. Mohammed, Hrag-Harout Jebamikyous, Dina Nawara, R. Kashef","doi":"10.1145/3460620.3460742","DOIUrl":null,"url":null,"abstract":"A cyber-attack is precautious manipulation of computer systems and networks using malware to conciliate data or restrict processes or operations. These types of attacks are vastly growing over the years. This increase in structure and complexity calls for advanced innovation in defensive strategies and detection. Traditional approaches for detecting cyber-attacks suffer from low efficiency, especially with the high demands of increasing security threats. With the substitutional increase of computational power, machine learning and deep learning methods are considered significant solutions for defending and detecting those threats or attacks. In this paper, we performed a comparative analysis of IoT cyberattack detection methods. We utilized six different algorithms including, Random Forest, Logistic Regression, SVM, NB, KNN, and MLP. Each model is evaluated using precision, recall, F-score, and ROC.","PeriodicalId":36824,"journal":{"name":"Data","volume":"40 1","pages":""},"PeriodicalIF":2.2000,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"IoT Cyber-Attack Detection: A Comparative Analysis\",\"authors\":\"Abdul Hanan K. Mohammed, Hrag-Harout Jebamikyous, Dina Nawara, R. Kashef\",\"doi\":\"10.1145/3460620.3460742\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A cyber-attack is precautious manipulation of computer systems and networks using malware to conciliate data or restrict processes or operations. These types of attacks are vastly growing over the years. This increase in structure and complexity calls for advanced innovation in defensive strategies and detection. Traditional approaches for detecting cyber-attacks suffer from low efficiency, especially with the high demands of increasing security threats. With the substitutional increase of computational power, machine learning and deep learning methods are considered significant solutions for defending and detecting those threats or attacks. In this paper, we performed a comparative analysis of IoT cyberattack detection methods. We utilized six different algorithms including, Random Forest, Logistic Regression, SVM, NB, KNN, and MLP. Each model is evaluated using precision, recall, F-score, and ROC.\",\"PeriodicalId\":36824,\"journal\":{\"name\":\"Data\",\"volume\":\"40 1\",\"pages\":\"\"},\"PeriodicalIF\":2.2000,\"publicationDate\":\"2021-04-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Data\",\"FirstCategoryId\":\"90\",\"ListUrlMain\":\"https://doi.org/10.1145/3460620.3460742\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Data","FirstCategoryId":"90","ListUrlMain":"https://doi.org/10.1145/3460620.3460742","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
IoT Cyber-Attack Detection: A Comparative Analysis
A cyber-attack is precautious manipulation of computer systems and networks using malware to conciliate data or restrict processes or operations. These types of attacks are vastly growing over the years. This increase in structure and complexity calls for advanced innovation in defensive strategies and detection. Traditional approaches for detecting cyber-attacks suffer from low efficiency, especially with the high demands of increasing security threats. With the substitutional increase of computational power, machine learning and deep learning methods are considered significant solutions for defending and detecting those threats or attacks. In this paper, we performed a comparative analysis of IoT cyberattack detection methods. We utilized six different algorithms including, Random Forest, Logistic Regression, SVM, NB, KNN, and MLP. Each model is evaluated using precision, recall, F-score, and ROC.