MITIGATING MALICIOUS INSIDER ATTACKS IN THE INTERNET OF THINGS USING SUPERVISED MACHINE LEARNING TECHNIQUES

被引:4
|
作者
Ahmad, Mir Shahnawaz [1 ]
Shah, Shahid Mehraj [1 ]
机构
[1] Natl Inst Technol, Dept Elect & Commun Engn, Commun Control & Learning Lab, Srinagar, J&K, India
来源
关键词
Internet of Things; attack detection; security; malicious insider; supervised machine learning; SECURITY; SUPPORT; TECHNOLOGIES; REGRESSION; SELECTION; THREATS;
D O I
10.12694/scpe.v22i1.1818
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The interconnection of large number of smart devices and sensors for critical information gathering and analysis over the internet has given rise to the Internet of Things (IoT) network. In recent times, IoT has emerged as a prime field for solving diverse real-life problems by providing a smart and affordable solutions. The IoT network has various constraints like: limited computational capacity of sensors, heterogeneity of devices, limited energy resource and bandwidth etc. These constraints restrict the use of high-end security mechanisms, thus making these type of networks more vulnerable to various security attacks including malicious insider attacks. Also, it is very difficult to detect such malicious insiders in the network due to their unpredictable behaviour and the ubiquitous nature of IoT network makes the task more difficult. To solve such problems machine learning techniques can be used as they have the ability to learn the behaviour of the system and predict the particular anomaly in the system. So, in this paper we have discussed various security requirements and challenges in the IoT network. We have also applied various supervised machine learning techniques on available IoT dataset to deduce which among them is best suited to detect the malicious insider attacks in the IoT network.
引用
收藏
页码:13 / 28
页数:16
相关论文
共 50 条
  • [41] Intrusion detection based on machine learning in the internet of things, attacks and counter measures
    Rehman, Eid
    Haseeb-ud-Din, Muhammad
    Malik, Arif Jamal
    Khan, Tehmina Karmat
    Abbasi, Aaqif Afzaal
    Kadry, Seifedine
    Khan, Muhammad Attique
    Rho, Seungmin
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (06): : 8890 - 8924
  • [42] Literature Review of Machine Learning Models on Intrusion Detection for Internet of Things Attacks
    Eriza, Aminanto Achmad
    Suryadi, M. T.
    INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND ENERGY TECHNOLOGIES (ICECET 2021), 2021, : 1094 - 1098
  • [43] Malicious Query Recognition Using Chosen Machine Learning Techniques
    Comfort Yetunde Daramola
    Samson Adebisi Akinpelu
    Ezekiel Olajuwon Akinyemi
    Sunday Adeola Ajagbe
    Gabriel Akinyemi Akinpelu
    Mathew Olusegun Adigun
    SN Computer Science, 6 (3)
  • [44] Privacy Preservation Using Machine Learning in the Internet of Things
    El-Gendy, Sherif
    Elsayed, Mahmoud Said
    Jurcut, Anca
    Azer, Marianne A.
    MATHEMATICS, 2023, 11 (16)
  • [45] Survey On Applications Of Internet Of Things Using Machine Learning
    Majumdar, Namrata
    Shukla, Shipra
    Bhatnagar, Anisha
    2019 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2019), 2019, : 562 - 566
  • [46] Detecting malicious IoT traffic using Machine Learning techniques
    Jayaraman, Bhuvana
    Thai, Mirnalinee T. H. A. N. G. A. N. A. D. A. R. T. H. A. N. G. A.
    Anand, Anirudh
    Nadar, Sri Sivasubramaniya
    ROMANIAN JOURNAL OF INFORMATION TECHNOLOGY AND AUTOMATIC CONTROL-REVISTA ROMANA DE INFORMATICA SI AUTOMATICA, 2023, 33 (04): : 47 - 58
  • [47] Internet of Things Anomaly Detection using Machine Learning
    Njilla, Laruent
    Pearlstein, Larry
    Wu, Xin-Wen
    Lutz, Adam
    Ezekiel, Soundararajan
    2019 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP (AIPR), 2019,
  • [48] DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING
    Jiang, Jianguo
    Song, Nan
    Yu, Min
    Chow, Kam-Pui
    Li, Gang
    Liu, Chao
    Huang, Weiqing
    ADVANCES IN DIGITAL FORENSICS XVII, 2021, 612 : 135 - 155
  • [49] Demonstrating the Effect of Insider Attacks on Perception Layer of Internet of Things (IoT) Systems
    Tukur, Yusuf Muhammad
    Ali, Yusuf Sahabi
    2019 15TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION (ICECCO), 2019,
  • [50] Detection of DoS attacks using machine learning techniques
    Kumar D.
    Kukreja V.
    Kadyan V.
    Mittal M.
    International Journal of Vehicle Autonomous Systems, 2020, 15 (3-4): : 256 - 270