MITIGATING MALICIOUS INSIDER ATTACKS IN THE INTERNET OF THINGS USING SUPERVISED MACHINE LEARNING TECHNIQUES

被引:4
|
作者
Ahmad, Mir Shahnawaz [1 ]
Shah, Shahid Mehraj [1 ]
机构
[1] Natl Inst Technol, Dept Elect & Commun Engn, Commun Control & Learning Lab, Srinagar, J&K, India
来源
关键词
Internet of Things; attack detection; security; malicious insider; supervised machine learning; SECURITY; SUPPORT; TECHNOLOGIES; REGRESSION; SELECTION; THREATS;
D O I
10.12694/scpe.v22i1.1818
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The interconnection of large number of smart devices and sensors for critical information gathering and analysis over the internet has given rise to the Internet of Things (IoT) network. In recent times, IoT has emerged as a prime field for solving diverse real-life problems by providing a smart and affordable solutions. The IoT network has various constraints like: limited computational capacity of sensors, heterogeneity of devices, limited energy resource and bandwidth etc. These constraints restrict the use of high-end security mechanisms, thus making these type of networks more vulnerable to various security attacks including malicious insider attacks. Also, it is very difficult to detect such malicious insiders in the network due to their unpredictable behaviour and the ubiquitous nature of IoT network makes the task more difficult. To solve such problems machine learning techniques can be used as they have the ability to learn the behaviour of the system and predict the particular anomaly in the system. So, in this paper we have discussed various security requirements and challenges in the IoT network. We have also applied various supervised machine learning techniques on available IoT dataset to deduce which among them is best suited to detect the malicious insider attacks in the IoT network.
引用
收藏
页码:13 / 28
页数:16
相关论文
共 50 条
  • [1] MITIGATING MALICIOUS INSIDER ATTACKS IN THE INTERNET OF THINGS USING SUPERVISED MACHINE LEARNING TECHNIQUES
    Ahmad M.S.
    Shah S.M.
    Scalable Computing, 2021, 22 (01): : 13 - 28
  • [2] Mitigating Malicious Adversaries Evasion Attacks in Industrial Internet of Things
    Rafiq, Husnain
    Aslam, Nauman
    Ahmed, Usman
    Lin, Jerry Chun-Wei
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) : 960 - 968
  • [3] Traffic Fingerprinting Attacks on Internet of Things Using Machine Learning
    Skowron, Monika
    Janicki, Artur
    Mazurczyk, Wojciech
    IEEE ACCESS, 2020, 8 : 20386 - 20400
  • [4] Internet of Things Cyber Attacks Detection using Machine Learning
    Alsamiri, Jadel
    Alsubhi, Khalid
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (12) : 627 - 634
  • [5] IoT Attacks Detection Using Supervised Machine Learning Techniques
    Aljabri, Malak
    Shaahid, Afrah
    Alnasser, Fatima
    Saleh, Asalah
    Alomari, Dorieh
    Aboulnour, Menna
    Al-Eidarous, Walla
    Althubaity, Areej
    HighTech and Innovation Journal, 2024, 5 (03): : 534 - 550
  • [6] Mitigating Webshell Attacks through Machine Learning Techniques
    Guo, You
    Marco-Gisbert, Hector
    Keir, Paul
    FUTURE INTERNET, 2020, 12 (01):
  • [7] Adversarial Machine Learning Attacks in Internet of Things Systems
    Kone, Rachida
    Toutsop, Otily
    Thierry, Ketchiozo Wandji
    Kornegay, Kevin
    Falaye, Joy
    2022 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP, AIPR, 2022,
  • [8] A Novel Insider Attack and Machine Learning Based Detection for the Internet of Things
    Chowdhury, Morshed
    Ray, Biplob
    Chowdhury, Sujan
    Rajasegarar, Sutharshan
    ACM TRANSACTIONS ON INTERNET OF THINGS, 2021, 2 (04):
  • [9] Research on internet traffic classification techniques using supervised machine learning
    Information Networking Institute, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
    不详
    High Technol Letters, 2009, 4 (369-377):
  • [10] Research on internet traffic classification techniques using supervised machine learning
    李君
    High Technology Letters, 2009, 15 (04) : 369 - 377