MITIGATING MALICIOUS INSIDER ATTACKS IN THE INTERNET OF THINGS USING SUPERVISED MACHINE LEARNING TECHNIQUES

被引:4
|
作者
Ahmad, Mir Shahnawaz [1 ]
Shah, Shahid Mehraj [1 ]
机构
[1] Natl Inst Technol, Dept Elect & Commun Engn, Commun Control & Learning Lab, Srinagar, J&K, India
来源
关键词
Internet of Things; attack detection; security; malicious insider; supervised machine learning; SECURITY; SUPPORT; TECHNOLOGIES; REGRESSION; SELECTION; THREATS;
D O I
10.12694/scpe.v22i1.1818
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The interconnection of large number of smart devices and sensors for critical information gathering and analysis over the internet has given rise to the Internet of Things (IoT) network. In recent times, IoT has emerged as a prime field for solving diverse real-life problems by providing a smart and affordable solutions. The IoT network has various constraints like: limited computational capacity of sensors, heterogeneity of devices, limited energy resource and bandwidth etc. These constraints restrict the use of high-end security mechanisms, thus making these type of networks more vulnerable to various security attacks including malicious insider attacks. Also, it is very difficult to detect such malicious insiders in the network due to their unpredictable behaviour and the ubiquitous nature of IoT network makes the task more difficult. To solve such problems machine learning techniques can be used as they have the ability to learn the behaviour of the system and predict the particular anomaly in the system. So, in this paper we have discussed various security requirements and challenges in the IoT network. We have also applied various supervised machine learning techniques on available IoT dataset to deduce which among them is best suited to detect the malicious insider attacks in the IoT network.
引用
收藏
页码:13 / 28
页数:16
相关论文
共 50 条
  • [31] Secure Location of Things (SLOT): Mitigating Localization Spoofing Attacks in the Internet of Things
    Zhang, Pengfei
    Nagarajan, Sai Ganesh
    Nevat, Ido
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06): : 2199 - 2206
  • [32] Analysis of internet of things malware using image texture features and machine learning techniques
    Evanson, Mwangi Karanja
    Shedden, Masupe
    Jeffrey, Mandu Gasennelwe
    INTERNET OF THINGS, 2020, 9
  • [33] Internet of things and intrusion detection fog computing architectures using machine learning techniques
    Helal, Maha
    Kashmeery, Tariq
    Zakariah, Mohammed
    Shishah, Wesam
    DECISION SCIENCE LETTERS, 2024, 13 (04) : 767 - 782
  • [34] Industrial Internet of Things Intrusion Detection Method Using Machine Learning and Optimization Techniques
    Gaber T.
    Awotunde J.B.
    Folorunso S.O.
    Ajagbe S.A.
    Eldesouky E.
    Wireless Communications and Mobile Computing, 2023, 2023
  • [35] Experimental Analysis of Classification for Different Internet of Things (IoT) Network Attacks Using Machine Learning and Deep learning
    Tasnim, Anika
    Hossain, Nigah
    Parvin, Nazia
    Tabassum, Sabrina
    Rahman, Rafeed
    Hossain, Muhammad Iqbal
    2022 INTERNATIONAL CONFERENCE ON DECISION AID SCIENCES AND APPLICATIONS (DASA), 2022, : 406 - 410
  • [36] Mitigating Attacks in the Internet of Things with a Self-protecting Architecture
    Mello, Ruan de A. C.
    Ribeiro, Admilson de R. L.
    de Almeida, Fernando M.
    Moreno, Edward D.
    THIRTEENTH ADVANCED INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (AICT 2017), 2017, : 14 - 19
  • [37] Detection analysis of malicious cyber attacks using machine learning algorithms
    Karthika, R. A.
    Maheswari, M.
    MATERIALS TODAY-PROCEEDINGS, 2022, 68 : 26 - 34
  • [38] Detecting Internet of Things attacks using distributed deep learning
    Parra, Gonzalo De La Torre
    Rad, Paul
    Choo, Kim-Kwang Raymond
    Beebe, Nicole
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 163 (163)
  • [39] Mitigating On-Off Attacks in the Internet of Things Using a Distributed Trust Management Scheme
    Mendoza, Carolina V. L.
    Kleinschmidt, Joao H.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [40] A Federated Learning Mechanism for Mitigating Selective Forwarding Attacks in RPL-based Internet of Things
    Tariq, Noshina
    Khan, Rabia
    Almufareh, Maram Fahaad
    Humayun, Mamoona
    Shaheen, Momina
    2024 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS, ICC WORKSHOPS 2024, 2024, : 871 - 877