Comparison of Various Classification Techniques in Cyber Security Using Iot

Authors

  • Urvashi Sangwan Ph.D Scholar, Department of Computer Science and Applications Maharshi Dayanand University, Rohtak
  • Rajender Singh Chhillar Professor, Department of Computer Science and Applications Maharshi Dayanand University, Rohtak

Keywords:

Internet of things, Security, machine learning, classification

Abstract

The Internet of Things (IoT) devices connected to internet increases rapidly in past decade and expected to add more in coming years. These are small devices and many of them hold personal information saved in it. That’s why it needs to be cyber secure so that attackers or intruder don’t misuse anyone’s useful information. As IoT devices are small in size and the security standards lack here that are applicable for non IoT devices. There is a need to prevent attackers to intrude. In this regard this research paper is an attempt to study machine learning (ML) algorithms that are recently used in securing these devices. In this paper various machine learning classification techniques are used and compared. 

Downloads

Download data is not yet available.

References

Ebu Yusuf Güven, Sueda Gülgün , Ceyda Manav , Behice Bakır , Zeynep Gürkaş Aydın. " Multiple Classification of Cyber Attacks Using Machine Learning." Electrica 2022; 22(2): 313-320.

Nazar Waheed, Xiangjian He, Muhammad Ikram, Muhammad Usman, Saad Sajid Hashmi, Muhammad Usman, “Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures” ACM Comput. Surv., Vol. 53, No. 3, Article 1. Publication date: April 2020.

Yakub Kayode Saheed a, Aremu Idris Abiodun b, Sanjay Misra c,*,Monica Kristiansen Holone c, Ricardo Colomo-Palacios “A machine learning-based intrusion detection for detecting internet of things network attacks” Alexandria Engineering Journal (2022) 61, 9395–9409

Garg, D. K. . (2022). Understanding the Purpose of Object Detection, Models to Detect Objects, Application Use and Benefits. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 8(2), 01–04. https://doi.org/10.17762/ijfrcsce.v8i2.2066

Sam Strecker1, Willem Van Haaften2, and Rushit Dave3 “ An Analysis of IoT Cyber Security Driven by Machine Learning” https://www.researchgate.net/publication/354068962

Amine Khatib1,2,3, Mohamed Hamlich1, Denis Hamad2 “Machine Learning based Intrusion Detection for Cyber-Security in IoT Networks “ E3S Web of Conferences 297, 01057 (2021)

Mujaheed Abdullahi, Yahia Baashar, Hitham Alhussian, Ayed Alwadain, Norshakirah Aziz, Luiz Fernando Capretz and Said Jadid Abdulkadir, “Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review” Electronics 2022, 11, 198.

Shaftab AHMED, Mohammad ILYAS, M. Yasin Akhtar RAJA “IoT Based Smart Systems using Machine Learning (ML) and Artificial Intelligence (AI): Vulnerabilities and Intelligent Solutions” Proceedings of the 13th International Conference on Society and Information Technologies (ICSIT 2022)

Sundar Krishnan, Ashar Neyaz & Qingzhong Liu, “ IoT Network Attack Detection using Supervised Machine Learning”, International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (10) : Issue (2) : 2021

Fatima Hussain, Rasheed Hussain, Syed Ali Hassan, and Ekram Hossain,” Machine Learning in IoT Security:Current Solutions and Future Challenges”. IEEE Communications Surveys & Tutorials · April 2020

Jadel Alsamiri1, Khalid Alsubhi2,” Internet of Things Cyber Attacks Detection using Machine Learning”, (IJACSA) International Journal of Advanced Computer Science and Applications,Vol. 10, No. 12, 2019

Kabisha, M. S., Rahim, K. A., Khaliluzzaman, M., & Khan, S. I. (2022). Face and Hand Gesture Recognition Based Person Identification System using Convolutional Neural Network. International Journal of Intelligent Systems and Applications in Engineering, 10(1), 105–115. https://doi.org/10.18201/ijisae.2022.273

P. Roshni Mol, Dr. C. Immaculate Mary,” Classification of Network Intrusion Attacks Using Machine Learning and Deep Learning”, Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 2, 2021, Pages. 1927 – 1943

Maryam Anwer, Muhammad Umer Farooq, Shariq Mahmood Khan, Waseemullah, “Attack Detection in IoT using Machine Learning”, Engineering, Technology & Applied Science Research Vol. 11, No. 3, 2021, 7273-7278

Khalid Albulayhi, Qasem Abu Al-Haija, Suliman A. Alsuhibany, Ananth A. Jillepalli, Mohammad Ashrafuzzaman and Frederick T. Sheldon, “IoT Intrusion Detection Using Machine Learning with a Novel High Performing Feature Selection Method”, Appl. Sci. 2022, 12, 5015.

A. Thakkar, and R. Lohiya, “A review of the advancement in intrusion detection datasets,” Procedia Comput. Sci., vol. 167, pp. 636–645, 2020.

Malla, S., M. J. . Meena, O. . Reddy. R, V. . Mahalakshmi, and A. . Balobaid. “A Study on Fish Classification Techniques Using Convolutional Neural Networks on Highly Challenged Underwater Images”. International Journal on Recent and Innovation Trends in Computing and Communication, vol. 10, no. 4, Apr. 2022, pp. 01-09, doi:10.17762/ijritcc.v10i4.5524.

N. Ye, X. Li, Q. Chen, S. M. Emran, and M. Xu, “Probabilistic techniques for intrusion detection based on computer audit data,” IEEE Trans. Syst. ManCybern. A Syst. Hum., vol. 31, no. 4, pp. 266–274, 2001

S. Rastegari, P. Hingston, and C. Lam, “Evolving statistical rule sets for network intrusion detection,” Appl. Soft Comput., vol. 33, no. C, pp.348–359, 2015.

S. Rajagopal, P. P. Kundapur, and H. K. S., “Towards effective network intrusion detection: From concept to creation on Azure cloud,” IEEE Access, vol. 9, pp. 19723–19742, 2021.

Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “Toward generating a new intrusion detection dataset and intrusion traffic characterization,”In Proceedings of the 4th International Conference on Information Systems Security and Privacy, Vol. 1. Funchal, Madeira, Portugal: ICISSP, 2018, pp.108–116

A. Gharib, I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “An evaluation framework for intrusion detection dataset,” In International Conference on Information Science and Security (ICISS), Vol. 2016, 2016. Pattaya, Thailand: IEEE Publications, 2016, pp. 1–6.

Ahmed Cherif Megri, Sameer Hamoush, Ismail Zayd Megri, Yao Yu. (2021). Advanced Manufacturing Online STEM Education Pipeline for Early-College and High School Students. Journal of Online Engineering Education, 12(2), 01–06. Retrieved from http://onlineengineeringeducation.com/index.php/joee/article/view/47

T. Saranya, S. Sridevi, C. Deisy, T. D. Chung, and M. K. A. A. Khan, “Performance analysis of machine learning algorithms in intrusion detection system: A review,” Procedia Comput. Sci., vol. 171, pp. 1251–1260, 2020.

IDS Architecture

Downloads

Published

01.10.2022

How to Cite

Sangwan, U. ., & Chhillar, R. S. . (2022). Comparison of Various Classification Techniques in Cyber Security Using Iot. International Journal of Intelligent Systems and Applications in Engineering, 10(3), 334–339. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2173

Issue

Section

Research Article