Cargando…
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks
In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices. The participating devices in IoT networks can be problematic due to their resource-constrained nature, and integrating security on these devices is ofte...
Autores principales: | , , , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7827441/ https://www.ncbi.nlm.nih.gov/pubmed/33435202 http://dx.doi.org/10.3390/s21020446 |
_version_ | 1783640763033190400 |
---|---|
author | Churcher, Andrew Ullah, Rehmat Ahmad, Jawad ur Rehman, Sadaqat Masood, Fawad Gogate, Mandar Alqahtani, Fehaid Nour, Boubakr Buchanan, William J. |
author_facet | Churcher, Andrew Ullah, Rehmat Ahmad, Jawad ur Rehman, Sadaqat Masood, Fawad Gogate, Mandar Alqahtani, Fehaid Nour, Boubakr Buchanan, William J. |
author_sort | Churcher, Andrew |
collection | PubMed |
description | In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices. The participating devices in IoT networks can be problematic due to their resource-constrained nature, and integrating security on these devices is often overlooked. This has resulted in attackers having an increased incentive to target IoT devices. As the number of attacks possible on a network increases, it becomes more difficult for traditional intrusion detection systems (IDS) to cope with these attacks efficiently. In this paper, we highlight several machine learning (ML) methods such as k-nearest neighbour (KNN), support vector machine (SVM), decision tree (DT), naive Bayes (NB), random forest (RF), artificial neural network (ANN), and logistic regression (LR) that can be used in IDS. In this work, ML algorithms are compared for both binary and multi-class classification on Bot-IoT dataset. Based on several parameters such as accuracy, precision, recall, F1 score, and log loss, we experimentally compared the aforementioned ML algorithms. In the case of HTTP distributed denial-of-service (DDoS) attack, the accuracy of RF is 99%. Furthermore, other simulation results-based precision, recall, F1 score, and log loss metric reveal that RF outperforms on all types of attacks in binary classification. However, in multi-class classification, KNN outperforms other ML algorithms with an accuracy of 99%, which is 4% higher than RF. |
format | Online Article Text |
id | pubmed-7827441 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-78274412021-01-25 An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks Churcher, Andrew Ullah, Rehmat Ahmad, Jawad ur Rehman, Sadaqat Masood, Fawad Gogate, Mandar Alqahtani, Fehaid Nour, Boubakr Buchanan, William J. Sensors (Basel) Article In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices. The participating devices in IoT networks can be problematic due to their resource-constrained nature, and integrating security on these devices is often overlooked. This has resulted in attackers having an increased incentive to target IoT devices. As the number of attacks possible on a network increases, it becomes more difficult for traditional intrusion detection systems (IDS) to cope with these attacks efficiently. In this paper, we highlight several machine learning (ML) methods such as k-nearest neighbour (KNN), support vector machine (SVM), decision tree (DT), naive Bayes (NB), random forest (RF), artificial neural network (ANN), and logistic regression (LR) that can be used in IDS. In this work, ML algorithms are compared for both binary and multi-class classification on Bot-IoT dataset. Based on several parameters such as accuracy, precision, recall, F1 score, and log loss, we experimentally compared the aforementioned ML algorithms. In the case of HTTP distributed denial-of-service (DDoS) attack, the accuracy of RF is 99%. Furthermore, other simulation results-based precision, recall, F1 score, and log loss metric reveal that RF outperforms on all types of attacks in binary classification. However, in multi-class classification, KNN outperforms other ML algorithms with an accuracy of 99%, which is 4% higher than RF. MDPI 2021-01-10 /pmc/articles/PMC7827441/ /pubmed/33435202 http://dx.doi.org/10.3390/s21020446 Text en © 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Churcher, Andrew Ullah, Rehmat Ahmad, Jawad ur Rehman, Sadaqat Masood, Fawad Gogate, Mandar Alqahtani, Fehaid Nour, Boubakr Buchanan, William J. An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks |
title | An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks |
title_full | An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks |
title_fullStr | An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks |
title_full_unstemmed | An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks |
title_short | An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks |
title_sort | experimental analysis of attack classification using machine learning in iot networks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7827441/ https://www.ncbi.nlm.nih.gov/pubmed/33435202 http://dx.doi.org/10.3390/s21020446 |
work_keys_str_mv | AT churcherandrew anexperimentalanalysisofattackclassificationusingmachinelearninginiotnetworks AT ullahrehmat anexperimentalanalysisofattackclassificationusingmachinelearninginiotnetworks AT ahmadjawad anexperimentalanalysisofattackclassificationusingmachinelearninginiotnetworks AT urrehmansadaqat anexperimentalanalysisofattackclassificationusingmachinelearninginiotnetworks AT masoodfawad anexperimentalanalysisofattackclassificationusingmachinelearninginiotnetworks AT gogatemandar anexperimentalanalysisofattackclassificationusingmachinelearninginiotnetworks AT alqahtanifehaid anexperimentalanalysisofattackclassificationusingmachinelearninginiotnetworks AT nourboubakr anexperimentalanalysisofattackclassificationusingmachinelearninginiotnetworks AT buchananwilliamj anexperimentalanalysisofattackclassificationusingmachinelearninginiotnetworks AT churcherandrew experimentalanalysisofattackclassificationusingmachinelearninginiotnetworks AT ullahrehmat experimentalanalysisofattackclassificationusingmachinelearninginiotnetworks AT ahmadjawad experimentalanalysisofattackclassificationusingmachinelearninginiotnetworks AT urrehmansadaqat experimentalanalysisofattackclassificationusingmachinelearninginiotnetworks AT masoodfawad experimentalanalysisofattackclassificationusingmachinelearninginiotnetworks AT gogatemandar experimentalanalysisofattackclassificationusingmachinelearninginiotnetworks AT alqahtanifehaid experimentalanalysisofattackclassificationusingmachinelearninginiotnetworks AT nourboubakr experimentalanalysisofattackclassificationusingmachinelearninginiotnetworks AT buchananwilliamj experimentalanalysisofattackclassificationusingmachinelearninginiotnetworks |