2021
DOI: 10.18280/ria.350102
|View full text |Cite
|
Sign up to set email alerts
|

Attack and Anomaly Detection in IoT Networks Using Supervised Machine Learning Approaches

Abstract: IoT is characterized by communication between things (devices) that constantly share data, analyze, and make decisions while connected to the internet. This interconnected architecture is attracting cyber criminals to expose the IoT system to failure. Therefore, it becomes imperative to develop a system that can accurately and automatically detect anomalies and attacks occurring in IoT networks. Therefore, in this paper, an Intrsuion Detection System (IDS) based on extracted novel feature set synthesizing BoT-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
21
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(21 citation statements)
references
References 20 publications
0
21
0
Order By: Relevance
“…Popoola et al [ 21 ] proposed Stacked RNN (SRNN), which involves cascading multiple layers of RNN. Tyagi and Kumar [ 37 ] recommended the RF model because it performed better than the k-Nearest Neighbour (kNN), Logistic Regression (LR), SVM, Multi-Layer Perceptron (MLP) and Decision Tree (DT) models. Lo et al [ 38 ] proposed the Edge-based Graph Sample and Aggregate (E-GraphSAGE) model and it outperformed the Extreme Gradient Boosting (XGBoost) and DT models.…”
Section: Review Of Related Workmentioning
confidence: 99%
“…Popoola et al [ 21 ] proposed Stacked RNN (SRNN), which involves cascading multiple layers of RNN. Tyagi and Kumar [ 37 ] recommended the RF model because it performed better than the k-Nearest Neighbour (kNN), Logistic Regression (LR), SVM, Multi-Layer Perceptron (MLP) and Decision Tree (DT) models. Lo et al [ 38 ] proposed the Edge-based Graph Sample and Aggregate (E-GraphSAGE) model and it outperformed the Extreme Gradient Boosting (XGBoost) and DT models.…”
Section: Review Of Related Workmentioning
confidence: 99%
“…Tyagi et al [ 15 ] developed an IDS based on extracted novel feature sets synthesizing the BoT-IoT dataset that can accurately and automatically distinguish benign and malicious traffic in real-time. An IoT-specific lightweight feature set consisting of seven lightweight features was developed instead of using existing feature reduction techniques such as principal component analysis (PCA), which can change the core meaning of variables.…”
Section: Existing Workmentioning
confidence: 99%
“…Because of their exceptional ability to anticipate assaults and mitigate them, machine learning and deep learning [67] techniques been widely employed in a number of real-world applications [68][69][70][71][72][73][74][75][76]. The current machine learning methods are low-cost and computationally cheap, and they support the growth of Big Data.…”
Section: And DL Algorithms In Detecting and Mitigating The Attacks In...mentioning
confidence: 99%