Machine Learning Based Intrusion Detection Systems for IoT Applications

AI-generated keywords: Internet of Things IoT cyber threats Denial of Service attacks machine learning classification algorithms

AI-generated Key Points

  • The Internet of Things (IoT) is a popular research area with various applications
  • IoT is exposed to cyber threats such as Denial of Service (DoS) attacks
  • Machine learning classification algorithms are investigated for securing IoT against DoS attacks
  • Comprehensive study on classifiers for anomaly-based intrusion detection systems (IDSs)
  • Performance assessment using prominent metrics and validation methods
  • Benchmarking classifiers using popular datasets CIDDS-001, UNSW-NB15, and NSL-KDD
  • Statistical tests like Friedman and Nemenyi tests used to analyze differences among classifiers
  • Evaluation of response time of classifiers on IoT-specific hardware using Raspberry Pi
  • Methodology discussed for selecting the best classifier based on application requirements
  • Motivation for developing IDSs using ensemble learning in IoT security research
  • Suggestions for statistically assessing classifier performance
  • Paper organized into sections providing an overview, discussing classification algorithms, explaining experimental design, presenting classifier performance and statistical test results, and concluding the paper
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Abhishek Verma, Virender Ranga

Wireless Personal Communications, 111, 2287-2310 (2020)
License: CC BY-NC-SA 4.0

Abstract: Internet of Things (IoT) and its applications are the most popular research areas at present. The characteristics of IoT on one side make it easily applicable to real-life applications, whereas on the other side expose it to cyber threats. Denial of Service (DoS) is one of the most catastrophic attacks against IoT. In this paper, we investigate the prospects of using machine learning classification algorithms for securing IoT against DoS attacks. A comprehensive study is carried on the classifiers which can advance the development of anomaly-based intrusion detection systems (IDSs). Performance assessment of classifiers is done in terms of prominent metrics and validation methods. Popular datasets CIDDS-001, UNSW-NB15, and NSL-KDD are used for benchmarking classifiers. Friedman and Nemenyi tests are employed to analyze the significant differences among classifiers statistically. In addition, Raspberry Pi is used to evaluate the response time of classifiers on IoT specific hardware. We also discuss a methodology for selecting the best classifier as per application requirements. The main goals of this study are to motivate IoT security researchers for developing IDSs using ensemble learning, and suggesting appropriate methods for statistical assessment of classifier's performance.

Submitted to arXiv on 24 Feb. 2023

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2302.12452v1

The Internet of Things (IoT) has become a popular research area with various applications. However, it also exposes IoT to cyber threats such as Denial of Service (DoS) attacks. To address this issue, the authors investigate the use of machine learning classification algorithms for securing IoT against DoS attacks. They conduct a comprehensive study on classifiers that can advance the development of anomaly-based intrusion detection systems (IDSs). The performance of these classifiers is assessed using prominent metrics and validation methods. Popular datasets CIDDS-001, UNSW-NB15, and NSL-KDD are used for benchmarking the classifiers. Statistical tests like Friedman and Nemenyi tests are employed to analyze significant differences among classifiers. Additionally, the response time of classifiers on IoT-specific hardware is evaluated using Raspberry Pi. The authors also discuss a methodology for selecting the best classifier based on application requirements. This study aims to motivate IoT security researchers to develop IDSs using ensemble learning and suggest appropriate methods for statistically assessing classifier performance. In terms of organization, Section 2 provides an overview of recent works in defending IoT against DoS attacks. Section 3 discusses classification algorithms, including single classifiers and ensembles. The experimental design is explained in Section 4 while Section 5 discusses the performance of the classifiers and presents statistical test results. Finally, Section 6 concludes the paper. In summary, this paper contributes to the field by exploring machine learning techniques for securing IoT against DoS attacks and providing insights into selecting suitable classifiers for different application requirements.
Created on 13 Jan. 2024

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.