Abstract
Machine learning (ML) techniques learn a system by observing it. Events and occurrences in the network define what is expected of the network’s operation. It is for this reason that ML techniques are used in the computer network security field to detect unauthorized intervention. In the event of suspicious activity, the result of the ML analysis deviates from the definition of expected normal network activity and the suspicious activity becomes apparent. Support vector machines (SVM) are ML techniques that have been used to profile normal network activity and classify it as normal or abnormal. They are trained to configure an optimal hyperplane that classifies unknown input vectors’ values based on their positioning on the plane. We propose to use SVM models to detect malicious behavior within low-power, low-rate and short range networks, such as those used in the Internet of Things (IoT). We evaluated two SVM approaches, the C-SVM and the OC-SVM, where the former requires two classes of vector values (one for the normal and one for the abnormal activity) and the latter observes only normal behavior activity. Both approaches were used as part of an intrusion detection system (IDS) that monitors and detects abnormal activity within the smart node device. Actual network traffic with specific network-layer attacks implemented by us was used to create and evaluate the SVM detection models. It is shown that the C-SVM achieves up to 100% classification accuracy when evaluated with unknown data taken from the same network topology it was trained with and 81% accuracy when operating in an unknown topology. The OC-SVM that is created using benign activity achieves at most 58% accuracy.
Subject
Control and Optimization,Computer Networks and Communications,Instrumentation
Cited by
28 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Machine Learning-Based Intrusion Detection Methods in IoT Systems: A Comprehensive Review;Electronics;2024-09-11
2. Detecting multiple jammers using Fuzzy-Logic Intrusion Detection System (FLIDS);2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT);2024-04-29
3. DDoS and Botnet Attacks: A Survey of Detection and Prevention Techniques;2024 International Conference on Advances in Data Engineering and Intelligent Computing Systems (ADICS);2024-04-18
4. Enhancing Internet of Things Network Security Through an Ensemble-Learning Approach;Proceedings of the 7th International Conference on Networking, Intelligent Systems and Security;2024-04-18
5. Securing internet of things using machine and deep learning methods: a survey;Cluster Computing;2024-04-16