Comparison of Various Classification Techniques in Cyber Security Using Iot
Keywords:
Internet of things, Security, machine learning, classificationAbstract
The Internet of Things (IoT) devices connected to internet increases rapidly in past decade and expected to add more in coming years. These are small devices and many of them hold personal information saved in it. That’s why it needs to be cyber secure so that attackers or intruder don’t misuse anyone’s useful information. As IoT devices are small in size and the security standards lack here that are applicable for non IoT devices. There is a need to prevent attackers to intrude. In this regard this research paper is an attempt to study machine learning (ML) algorithms that are recently used in securing these devices. In this paper various machine learning classification techniques are used and compared.
Downloads
References
Ebu Yusuf Güven, Sueda Gülgün , Ceyda Manav , Behice Bakır , Zeynep Gürkaş Aydın. " Multiple Classification of Cyber Attacks Using Machine Learning." Electrica 2022; 22(2): 313-320.
Nazar Waheed, Xiangjian He, Muhammad Ikram, Muhammad Usman, Saad Sajid Hashmi, Muhammad Usman, “Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures” ACM Comput. Surv., Vol. 53, No. 3, Article 1. Publication date: April 2020.
Yakub Kayode Saheed a, Aremu Idris Abiodun b, Sanjay Misra c,*,Monica Kristiansen Holone c, Ricardo Colomo-Palacios “A machine learning-based intrusion detection for detecting internet of things network attacks” Alexandria Engineering Journal (2022) 61, 9395–9409
Garg, D. K. . (2022). Understanding the Purpose of Object Detection, Models to Detect Objects, Application Use and Benefits. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 8(2), 01–04. https://doi.org/10.17762/ijfrcsce.v8i2.2066
Sam Strecker1, Willem Van Haaften2, and Rushit Dave3 “ An Analysis of IoT Cyber Security Driven by Machine Learning” https://www.researchgate.net/publication/354068962
Amine Khatib1,2,3, Mohamed Hamlich1, Denis Hamad2 “Machine Learning based Intrusion Detection for Cyber-Security in IoT Networks “ E3S Web of Conferences 297, 01057 (2021)
Mujaheed Abdullahi, Yahia Baashar, Hitham Alhussian, Ayed Alwadain, Norshakirah Aziz, Luiz Fernando Capretz and Said Jadid Abdulkadir, “Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review” Electronics 2022, 11, 198.
Shaftab AHMED, Mohammad ILYAS, M. Yasin Akhtar RAJA “IoT Based Smart Systems using Machine Learning (ML) and Artificial Intelligence (AI): Vulnerabilities and Intelligent Solutions” Proceedings of the 13th International Conference on Society and Information Technologies (ICSIT 2022)
Sundar Krishnan, Ashar Neyaz & Qingzhong Liu, “ IoT Network Attack Detection using Supervised Machine Learning”, International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (10) : Issue (2) : 2021
Fatima Hussain, Rasheed Hussain, Syed Ali Hassan, and Ekram Hossain,” Machine Learning in IoT Security:Current Solutions and Future Challenges”. IEEE Communications Surveys & Tutorials · April 2020
Jadel Alsamiri1, Khalid Alsubhi2,” Internet of Things Cyber Attacks Detection using Machine Learning”, (IJACSA) International Journal of Advanced Computer Science and Applications,Vol. 10, No. 12, 2019
Kabisha, M. S., Rahim, K. A., Khaliluzzaman, M., & Khan, S. I. (2022). Face and Hand Gesture Recognition Based Person Identification System using Convolutional Neural Network. International Journal of Intelligent Systems and Applications in Engineering, 10(1), 105–115. https://doi.org/10.18201/ijisae.2022.273
P. Roshni Mol, Dr. C. Immaculate Mary,” Classification of Network Intrusion Attacks Using Machine Learning and Deep Learning”, Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 2, 2021, Pages. 1927 – 1943
Maryam Anwer, Muhammad Umer Farooq, Shariq Mahmood Khan, Waseemullah, “Attack Detection in IoT using Machine Learning”, Engineering, Technology & Applied Science Research Vol. 11, No. 3, 2021, 7273-7278
Khalid Albulayhi, Qasem Abu Al-Haija, Suliman A. Alsuhibany, Ananth A. Jillepalli, Mohammad Ashrafuzzaman and Frederick T. Sheldon, “IoT Intrusion Detection Using Machine Learning with a Novel High Performing Feature Selection Method”, Appl. Sci. 2022, 12, 5015.
A. Thakkar, and R. Lohiya, “A review of the advancement in intrusion detection datasets,” Procedia Comput. Sci., vol. 167, pp. 636–645, 2020.
Malla, S., M. J. . Meena, O. . Reddy. R, V. . Mahalakshmi, and A. . Balobaid. “A Study on Fish Classification Techniques Using Convolutional Neural Networks on Highly Challenged Underwater Images”. International Journal on Recent and Innovation Trends in Computing and Communication, vol. 10, no. 4, Apr. 2022, pp. 01-09, doi:10.17762/ijritcc.v10i4.5524.
N. Ye, X. Li, Q. Chen, S. M. Emran, and M. Xu, “Probabilistic techniques for intrusion detection based on computer audit data,” IEEE Trans. Syst. ManCybern. A Syst. Hum., vol. 31, no. 4, pp. 266–274, 2001
S. Rastegari, P. Hingston, and C. Lam, “Evolving statistical rule sets for network intrusion detection,” Appl. Soft Comput., vol. 33, no. C, pp.348–359, 2015.
S. Rajagopal, P. P. Kundapur, and H. K. S., “Towards effective network intrusion detection: From concept to creation on Azure cloud,” IEEE Access, vol. 9, pp. 19723–19742, 2021.
Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “Toward generating a new intrusion detection dataset and intrusion traffic characterization,”In Proceedings of the 4th International Conference on Information Systems Security and Privacy, Vol. 1. Funchal, Madeira, Portugal: ICISSP, 2018, pp.108–116
A. Gharib, I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “An evaluation framework for intrusion detection dataset,” In International Conference on Information Science and Security (ICISS), Vol. 2016, 2016. Pattaya, Thailand: IEEE Publications, 2016, pp. 1–6.
Ahmed Cherif Megri, Sameer Hamoush, Ismail Zayd Megri, Yao Yu. (2021). Advanced Manufacturing Online STEM Education Pipeline for Early-College and High School Students. Journal of Online Engineering Education, 12(2), 01–06. Retrieved from http://onlineengineeringeducation.com/index.php/joee/article/view/47
T. Saranya, S. Sridevi, C. Deisy, T. D. Chung, and M. K. A. A. Khan, “Performance analysis of machine learning algorithms in intrusion detection system: A review,” Procedia Comput. Sci., vol. 171, pp. 1251–1260, 2020.

Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.