A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection

11/25/2021
by   João Vitorino, et al.
0

The digital transformation faces tremendous security challenges. In particular, the growing number of cyber-attacks targeting Internet of Things (IoT) systems restates the need for a reliable detection of malicious network activity. This paper presents a comparative analysis of supervised, unsupervised and reinforcement learning techniques on nine malware captures of the IoT-23 dataset, considering both binary and multi-class classification scenarios. The developed models consisted of Support Vector Machine (SVM), Extreme Gradient Boosting (XGBoost), Light Gradient Boosting Machine (LightGBM), Isolation Forest (iForest), Local Outlier Factor (LOF) and a Deep Reinforcement Learning (DRL) model based on a Double Deep Q-Network (DDQN), adapted to the intrusion detection context. The most reliable performance was achieved by LightGBM. Nonetheless, iForest displayed good anomaly detection results and the DRL model demonstrated the possible benefits of employing this methodology to continuously improve the detection. Overall, the obtained results indicate that the analyzed techniques are well suited for IoT intrusion detection.

READ FULL TEXT
research
01/30/2023

Towards Adversarial Realism and Robust Learning for IoT Intrusion Detection and Classification

The Internet of Things (IoT) faces tremendous security challenges. Machi...
research
08/04/2018

Active Learning for Wireless IoT Intrusion Detection

Internet of Things (IoT) is becoming truly ubiquitous in our everyday li...
research
10/15/2021

A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods

Modern scientific advancements often contribute to the introduction and ...
research
12/09/2020

An Isolation Forest Learning Based Outlier Detection Approach for Effectively Classifying Cyber Anomalies

Cybersecurity has recently gained considerable interest in today's secur...
research
12/02/2020

Intrusion Detection Systems for IoT: opportunities and challenges offered by Edge Computing

Key components of current cybersecurity methods are the Intrusion Detect...
research
11/29/2022

Analysis of Anomalous Behavior in Network Systems Using Deep Reinforcement Learning with CNN Architecture

In order to gain access to networks, different types of intrusion attack...
research
08/20/2023

An IoT Architecture Leveraging Digital Twins: Compromised Node Detection Scenario

Modern IoT (Internet of Things) environments with thousands of low-end a...

Please sign up or login with your details

Forgot password? Click here to reset