Examining the Suitability of NetFlow Features in Detecting IoT Network Intrusions

Author:

Awad MohammedORCID,Fraihat SalamORCID,Salameh Khouloud,Al Redhaei Aneesa

Abstract

The past few years have witnessed a substantial increase in cyberattacks on Internet of Things (IoT) devices and their networks. Such attacks pose a significant threat to organizational security and user privacy. Utilizing Machine Learning (ML) in Intrusion Detection Systems (NIDS) has proven advantageous in countering novel zero-day attacks. However, the performance of such systems relies on several factors, one of which is prediction time. Processing speed in anomaly-based NIDS depends on a few elements, including the number of features fed to the ML model. NetFlow, a networking industry-standard protocol, offers many features that can be used to predict malicious attacks accurately. This paper examines NetFlow features and assesses their suitability in classifying network traffic. Our paper presents a model that detects attacks with (98–100%) accuracy using as few as 13 features. This study was conducted using a large dataset of over 16 million records released in 2021.

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry

Reference39 articles.

1. The internet of things: An overview;Rose;Internet Soc. (ISOC),2015

2. The Growth in Connected IoT Devices is Expected to Generate 79.4ZB of Data in 2025, According to a New IDC Forecast https://www.businesswire.com/news/home/20190618005012/en/The-Growth-in-Connected-IoT-Devices-is-Expected-to-Generate-79.4ZB-of-Data-in-2025-According-to-a-New-IDC-Forecast

3. Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things

4. 3 Steps: Cyber Breach Recovery Plan to Minimize Loss of Sales—Based on Verkada Breach https://firedome.io/blog/cyber-breach-recovery-plan-based-on-verkada-breach

5. Top Cyber Attacks on IoT Devices in 2021 https://firedome.io/blog/top-cyber-attacks-on-iot-devices-in-2021/

Cited by 10 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models;Scientific Reports;2024-01-03

2. Modern NetFlow network dataset with labeled attacks and detection methods;Proceedings of the 18th International Conference on Availability, Reliability and Security;2023-08-29

3. Security Landscape of Anomaly based Defence Mechanisms in Edge Environments;2023 9th International Conference on Smart Computing and Communications (ICSCC);2023-08-17

4. How to secure the IoT-based surveillance systems in an ELEGANT way;2023 IEEE International Conference on Cyber Security and Resilience (CSR);2023-07-31

5. Intrusion detection system for large-scale IoT NetFlow networks using machine learning with modified Arithmetic Optimization Algorithm;Internet of Things;2023-07

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3