2022
DOI: 10.3390/pr10122673
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Threat Intelligence for IoT Using Machine Learning

Abstract: The Internet of Things (IoT) is a technological revolution that enables human-to-human and machine-to-machine communication for virtual data exchange. The IoT allows us to identify, locate, and access the various things and objects around us using low-cost sensors. The Internet of Things offers many benefits but also raises many issues, especially in terms of privacy and security. Appropriate solutions must be found to these challenges, and privacy and security are top priorities in the IoT. This study identif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…In a study by Mishra et al [ 31 ], anomalies in IoT networks were detected using message queuing telemetry transport (MQTT) and machine-learning algorithms, with a dataset of 4998 records and 34 features. Among the various classifiers employed, the random forest classifier demonstrated the highest level of accuracy at 99.94% [ 31 ].…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In a study by Mishra et al [ 31 ], anomalies in IoT networks were detected using message queuing telemetry transport (MQTT) and machine-learning algorithms, with a dataset of 4998 records and 34 features. Among the various classifiers employed, the random forest classifier demonstrated the highest level of accuracy at 99.94% [ 31 ].…”
Section: Resultsmentioning
confidence: 99%
“…Human identification of cyber threats is limited due to the cognitive limitations of humans., As highlighted in the literature [ 12 , 25 , 27 , 31 , 45 ], machine-learning and artificial intelligence tools can help to identify malicious network traffic. Therefore, the proposed detection models’ second layer includes applications that include these technologies for signature-based, anomaly-based, and behavior-based detection.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Detecting dangerous programs and protecting confidential information is always an urgent problem and a key asset for cybersecurity experts. The number of cybercriminals and types of threats [2] has grown significantly recently. Moreover, cyberattacks are becoming more challenging and complex than ever.…”
Section: Introductionmentioning
confidence: 99%
“…The parameters' uncertainty is modelled using probability distributions, and decisions are made based on maximizing the expected reward. [17]. Cyberattack predictions may be made in advance with the help of a virtual agent built using reinforcement learning.…”
Section: Introductionmentioning
confidence: 99%