Affiliation:
1. Department of Computer Science and Engineering, Kathmandu University, Dhulikhel 45200, Nepal
2. Inov Inesc Inovação—Instituto de Novas Tecnologias, 1000-029 Lisbon, Portugal
3. Instituto Universitário de Lisboa (ISCTE-IUL), ISTAR, 1649-026 Lisboa, Portugal
Abstract
The Internet of Things (IoT) shares the idea of an autonomous system responsible for transforming physical computational devices into smart ones. Contrarily, storing and operating information and maintaining its confidentiality and security is a concerning issue in the IoT. Throughout the whole operational process, considering transparency in its privacy, data protection, and disaster recovery, it needs state-of-the-art systems and methods to tackle the evolving environment. This research aims to improve the security of IoT devices by investigating the likelihood of network attacks utilizing ordinary device network data and attack network data acquired from similar statistics. To achieve this, IoT devices dedicated to smart healthcare systems were utilized, and botnet attacks were conducted on them for data generation. The collected data were then analyzed using statistical measures, such as the Pearson coefficient and entropy, to extract relevant features. Machine learning algorithms were implemented to categorize normal and attack traffic with data preprocessing techniques to increase accuracy. One of the most popular datasets, known as BoT-IoT, was cross-evaluated with the generated dataset for authentication of the generated dataset. The research provides insight into the architecture of IoT devices, the behavior of normal and attack networks on these devices, and the prospects of machine learning approaches to improve IoT device security. Overall, the study adds to the growing body of knowledge on IoT device security and emphasizes the significance of adopting sophisticated strategies for detecting and mitigating network attacks.
Subject
Computer Networks and Communications
Reference35 articles.
1. The Internet of Things: Review and theoretical framework;Nord;Expert Syst. Appl.,2019
2. Kumar, A., and Lim, T.J. (2019, January 15–18). EDIMA: Early Detection of IoT Malware Network Activity Using Machine Learning Techniques. Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT’19), Limerick, Ireland.
3. Systematic Literature Review on IoT-Based Botnet Attack;Ali;IEEE Access,2020
4. Al-Othman, Z., Alkasassbeh, M., and Baddar, S.A.-H. (2019). A State-of-the-Art Review on IoT botnet Attack Detection (Version 1). arXiv.
5. Vengatesan, K., Kumar, A., Parthibhan, M., Singhal, A., and Rajesh, R. (2019, January 19–20). Analysis of Mirai Botnet Malware Issues and Its Prediction Methods in Internet of Things. Proceedings of the Lecture Notes on Data Engineering and Communications Technologies, Madurai, India.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献