Smart IoT Security: Lightweight Machine Learning Techniques for Multi-Class Attack Detection in IoT Networks
- URL: http://arxiv.org/abs/2502.04057v1
- Date: Thu, 06 Feb 2025 13:17:03 GMT
- Title: Smart IoT Security: Lightweight Machine Learning Techniques for Multi-Class Attack Detection in IoT Networks
- Authors: Shahran Rahman Alve, Muhammad Zawad Mahmud, Samiha Islam, Md. Asaduzzaman Chowdhury, Jahirul Islam,
- Abstract summary: In the growing terrain of the Internet of Things (IoT), it is vital that networks are secure to protect against a range of cyber threats.
This study proposes novel lightweight ensemble approaches for improving multi-class attack detection of IoT devices.
- Score: 0.0
- License:
- Abstract: In the growing terrain of the Internet of Things (IoT), it is vital that networks are secure to protect against a range of cyber threats. Based on the strong machine learning framework, this study proposes novel lightweight ensemble approaches for improving multi-class attack detection of IoT devices. Using the large CICIoT 2023 dataset with 34 attack types distributed amongst 10 attack categories, we systematically evaluated the performance of a wide variety of modern machine learning methods with the aim of establishing the best-performing algorithmic choice to secure IoT applications. In particular, we explore approaches based on ML classifiers to tackle the biocharges characterized by the challenging and heterogeneous nature of attack vectors in IoT environments. The method that performed best was the Decision Tree, with an accuracy of 99.56% and an F1 score of 99.62%, showing that this model is capable of accurately and reliably detecting threats.The Random Forest model was the next best-performing model with 98.22% and an F1 score of 98.24%, suggesting that ML methods are quite effective in a situation of high-dimensional data. Our results highlight the potential for using ML classifiers in bolstering security for IoT devices and also serve as motivations for future investigations targeting scalable, keystroke-based attack detection systems. We believe that our method provides a new path to develop complex machine learning algorithms for low-resource IoT devices, balancing both accuracy and time efficiency needs. In summary, these contributions enrich the state of the art of the IoT security literature, laying down solid ground and guidelines for the deployment of smart, adaptive security in IoT settings.
Related papers
- Learning in Multiple Spaces: Few-Shot Network Attack Detection with Metric-Fused Prototypical Networks [47.18575262588692]
We propose a novel Multi-Space Prototypical Learning framework tailored for few-shot attack detection.
By leveraging Polyak-averaged prototype generation, the framework stabilizes the learning process and effectively adapts to rare and zero-day attacks.
Experimental results on benchmark datasets demonstrate that MSPL outperforms traditional approaches in detecting low-profile and novel attack types.
arXiv Detail & Related papers (2024-12-28T00:09:46Z) - Optimized IoT Intrusion Detection using Machine Learning Technique [0.0]
Intrusion detection systems (IDSs) are essential for defending against a variety of attacks.
The functional and physical diversity of IoT IDS systems causes significant issues.
For peculiarity-based IDS, this study proposes and implements a novel component selection and extraction strategy.
arXiv Detail & Related papers (2024-12-03T21:23:54Z) - Lightweight CNN-BiLSTM based Intrusion Detection Systems for Resource-Constrained IoT Devices [38.16309790239142]
Intrusion Detection Systems (IDSs) have played a significant role in detecting and preventing cyber-attacks within traditional computing systems.
The limited computational resources available on Internet of Things (IoT) devices make it challenging to deploy conventional computing-based IDSs.
We propose a hybrid CNN architecture composed of a lightweight CNN and bidirectional LSTM (BiLSTM) to enhance the performance of IDS on the UNSW-NB15 dataset.
arXiv Detail & Related papers (2024-06-04T20:36:21Z) - FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids [53.2306792009435]
FaultGuard is the first framework for fault type and zone classification resilient to adversarial attacks.
We propose a low-complexity fault prediction model and an online adversarial training technique to enhance robustness.
Our model outclasses the state-of-the-art for resilient fault prediction benchmarking, with an accuracy of up to 0.958.
arXiv Detail & Related papers (2024-03-26T08:51:23Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Unraveling Attacks in Machine Learning-based IoT Ecosystems: A Survey
and the Open Libraries Behind Them [9.55194238764852]
The Internet of Things (IoT) has brought forth an era of unprecedented connectivity, with an estimated 80 billion smart devices expected to be in operation by the end of 2025.
Machine Learning (ML) serves as a crucial technology, not only for analyzing IoT-generated data but also for diverse applications within the IoT ecosystem.
This paper embarks on a comprehensive exploration of the security threats arising from ML's integration into various facets of IoT.
arXiv Detail & Related papers (2024-01-22T06:52:35Z) - Malware Detection in IOT Systems Using Machine Learning Techniques [0.0]
This study introduces a CNN-LSTM hybrid model for IoT malware identification and evaluates its performance against established methods.
The proposed approach achieved 95.5% accuracy, surpassing existing methods.
arXiv Detail & Related papers (2023-12-29T17:02:54Z) - Harris Hawks Feature Selection in Distributed Machine Learning for
Secure IoT Environments [8.690178186919635]
Internet of Things (IoT) applications can collect and transfer sensitive data.
It is necessary to develop new methods to detect hacked IoT devices.
This paper proposes a Feature Selection (FS) model based on Harris Hawks Optimization (HHO) and Random Weight Network (RWN) to detect IoT botnet attacks.
arXiv Detail & Related papers (2023-02-20T09:38:12Z) - Detecting Botnet Attacks in IoT Environments: An Optimized Machine
Learning Approach [8.641714871787595]
Machine learning (ML) has emerged as one potential solution due to the abundance of data generated and available for IoT devices and networks.
This paper proposes an optimized ML-based framework to detect attacks on IoT devices in an effective and efficient manner.
Experimental results show that the proposed optimized framework has a high detection accuracy, precision, recall, and F-score.
arXiv Detail & Related papers (2020-12-16T16:39:55Z) - On Lightweight Privacy-Preserving Collaborative Learning for Internet of
Things by Independent Random Projections [40.586736738492384]
Internet of Things (IoT) will be a main data generation infrastructure for achieving better system intelligence.
This paper considers the design and implementation of a practical privacy-preserving collaborative learning scheme.
A curious learning coordinator trains a better machine learning model based on the data samples contributed by a number of IoT objects.
arXiv Detail & Related papers (2020-12-11T12:44:37Z) - Lightweight Collaborative Anomaly Detection for the IoT using Blockchain [40.52854197326305]
Internet of things (IoT) devices tend to have many vulnerabilities which can be exploited by an attacker.
Unsupervised techniques, such as anomaly detection, can be used to secure these devices in a plug-and-protect manner.
We present a distributed IoT simulation platform, which consists of 48 Raspberry Pis.
arXiv Detail & Related papers (2020-06-18T14:50:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.