Cyber Attack Detection Using Machine Learning Techniques in IoT Networks

Authors

Keywords:

Internet of Things (IoT), Machine Learning and IoT Attacks

Abstract

The Internet of Things is a rapidly emerging technology (IoT). Thanks to numerous sensors, billions of smart objects (referred to as "Things") may acquire data about themselves and their environment. So they may regulate and monitor industrial services or increase commercial services and activities. However, the Internet of Things is now more vulnerable than ever. Machine Learning (ML) has advanced significantly, bringing up new research avenues to solve current and future IoT challenges. On the other hand, machine learning is an effective method for identifying peril in intelligent devices and networks. Following a thorough literature review on Machine Learning methods and the necessity of IoT security, this study will assess numerous ML algorithms for threat detection and the various security methods, which are associated with Machine Learning techniques.

References

Khan MA, Salah K. "IoT security: Review, blockchain solutions, and open challenges," Future Generation Computer Systems. 2018;82:395-411.

Farooq M. Supervised learning techniques for intrusion detection system based on multi-layer classification approach. International Journal of Advanced Computer Science and Applications. 2022;13(3).

Lu Y, Da Xu L. "Internet of Things (IoT) cybersecurity research: A review of current research topics," IEEE Internet of Things Journal. 2018;6:2103-2115.

Singh RP, Javaid M, Haleem A, Suman R. "Internet of things (IoT) applications to fight against COVID-19 pandemic," Diabetes & Metabolic Syndrome: Clinical Research and Reviews. 2020;14:521-524.

Farooq M, Hassan M. IoT smart homes security challenges and solution. International Journal of Security and Networks. 2021;16(4):235-43.

Stoyanova M, Nikoloudakis Y, Panagiotakis S, Pallis E, Markakis EK. "A survey on the internet of things (IoT) forensics: Challenges, approaches, and open issues," IEEE Communications Surveys & Tutorials. 2020;22:1191-1221.

V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar, "A survey on IoT security: application areas, security threats, and solution architectures," IEEE Access. 2019;7:82721-82743.

Farooq M. Genetic algorithm technique in hybrid intelligent systems for pattern recognition. International Journal of Innovative Research in Science, Engineering and Technology. 2015;4(04):1891-8.

Adat V, Gupta B. "Security in Internet of Things: Issues, challenges, taxonomy and architecture," Telecommunication Systems. 2018;67:423-441.

Fawzi LM, Alqarawi SM, Ameen SY, Dawood SA. "Two Levels Alert Verification Technique for Smart Oil Pipeline Surveillance System (SOPSS)," International Journal of Computing and Digital Systems. 2019;8:115-124.

Al-Sultan MR, Ameen SY, Abduallah WM. "Real Time Implementation of Stegofirewall System," International Journal of Computing and Digital Systems. 2019;8:498-504.

Farooq M, Khan MH. Artificial Intelligence-Based Approach on Cybersecurity Challenges and Opportunities in The Internet of Things & Edge Computing Devices. International Journal of Engineering and Computer Science. 2023 Jul;12(07):25763-8.

Ammar M, Russello G, Crispo B. "Internet of Things: A survey on the security of IoT frameworks," Journal of Information Security and Applications. 2018;38:8- 27.

Chernyshev M, Baig Z, Bello O, Zeadally S. "Internet of things (iot): Research, simulators, and testbeds," IEEE Internet of Things Journal. 2017;5:1637-1647.

Farooq M, Khan MH. Signature-Based Intrusion Detection System in Wireless 6G IoT Networks. Journal on Internet of Things. 2022 Jul 1;4(3).

Vashi S, Ram J, Modi J, Verma S, Prakash C. "Internet of Things (IoT): A vision, architectural elements, and security issues," in 2017 international conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC). 2017;492-496.

Sharma B, Sharma L, Lal C. "Anomaly Detection Techniques using Deep Learning in IoT: A Survey," in 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE). 2019;146-149. Janaby AO. al, A. Al-Omary, S. Y. Ameen, and H. M. Al-Rizzo, "Tracking High-Speed Users Using SNR-CQI Mapping in LTE-A Networks," in 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT). 2018;1-7.

Farooq M. Application of genetic algorithm & morphological operations for image segmentation. International Journal of Advanced Research in Computer and Communication Engineering. 2015 Mar;4(3):195-9.

Costa KA. da, J. P. Papa, C. O. Lisboa, R. Munoz, and V. H. C. de Albuquerque, "Internet of Things: A survey on machine learning-based intrusion detection approaches," Computer Networks. 2019;151:147-157.

Hussain F, Hussain R, Hassan SA, Hossain E. "Machine learning in IoT security: Current solutions and future challenges," IEEE Communications Surveys & Tutorials. 2020;22:1686- 1721,

Farooq M, Khan R, Khan MH. Stout Implementation of Firewall and Network Segmentation for Securing IoT Devices. Indian Journal of Science and Technology. 2023 Sep;16(33):2609-21.

Othman A, Ameen SY, Al-Rizzo H. "Dynamic Switching of Scheduling Algorithm for," International Journal of Computing and Network Technology. 2018;6.

Arko AR, Khan SH, A. Preety, M. H. Biswas, "Anomaly detection In IoT using machine learning algorithms," Brac University; 2019.

Farooq M. Optimizing pattern recognition scheme using genetic algorithms in computer image processing. International Journal of Advanced Research in Computer Engineering & Technology. 2015 Mar;4(3):834-6.

Hassan RJ, S. R. Zeebaree, S. Y. Ameen, S. F. Kak, M. A. Sadeeq, Z. S. Ageed, et al., "State of Art Survey for IoT Effects on Smart City Technology: Challenges, Opportunities, and Solutions," Asian Journal of Research in Computer Science. 2021;32-48.

Ameen SY, Ali ALSH. "A Comparative Study for New Aspects to Quantum Key Distribution," Journal of Engineering and Sustainable Development. 2018;11:45- 57.

Farooq M, Hassan M. Pattern recognition in digital images using fractals. International Journal of Engineering and Advanced Technology. 2019;9(2):3180-3.

Malallah H, Zeebaree SR, R. R. Zebari, M. A. Sadeeq, Z. S. Ageed, I. M. Ibrahim, et al., "A Comprehensive Study of Kernel (Issues and Concepts) in Different Operating Systems," Asian Journal of Research in Computer Science. 2021;16- 31.

Zebari IM, Zeebaree SR, Yasin HM. "Real Time Video Streaming From Multi-Source using Client-Server for Video Distribution," in 2019 4th Scientific International Conference Najaf (SICN). 2019;109-114.

Farooq M. Color Edge Detection Based on the Fusion of Intensity and Chromatic Differences. International Journal of Recent Technology and Engineering (IJRTE). 2020;8(6):1038-41.

Niz?etic? S, P. S?olic?, D. L.-d.-I. Gonza?lez-de, and L. Patrono, "Internet of Things (IoT): Opportunities, issues and challenges towards a smart and sustainable future," Journal of Cleaner Production. 2020;274:122877.

Khalid LF, S. Y. Ameen, "Secure Iot integration in daily lives: A review," Journal of Information Technology and Informatics. 2021;1:6-12.

Farooq M. Enhancement and Segmentation of Digital Image using Genetic Algorithm. International Journal of Research in Electronics and Computer Engineering. 2019;7(2):2619-23.

Alaba FA, M. Othman, I. A. T. Hashem, and F. Alotaibi, "Internet of Things security: A survey," Journal of Network and Computer Applications. 2017;88:10-28,

Yasin HM, Zeebaree SR, M. A. Sadeeq, S. Y. Ameen, I. M. Ibrahim, R. R. Zebari, et al., "IoT and ICT based Smart Water Management, Monitoring and Controlling System: A Review," Asian Journal of Research in Computer Science. 2021;42- 56.

Farooq M. Split/Merge and Chromosome Encoding Model of Genetic Algorithm For Image Segmentation & Optimization. International Journal of Advanced Research in Computer Science. 2015 Mar 1;6(2).

Singh A, A. Payal, S. Bharti, "A walkthrough of the emerging IoT paradigm: Visualizing inside functionalities, key features, and open issues," Journal of Network and Computer Applications. 2019;143:111-151.

Elazhary H. "Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions," Journal of Network and Computer Applications. 2019;128:105-140.

Farooq M. Application of Genetic Programming for Pattern Recognition. International Journal of Advanced Research in Computer and Communication Engineering. 2015;4(4):14-7.

Yasin HM, Zeebaree SR Zebari, IM. "Arduino Based Automatic Irrigation System: Monitoring and SMS Controlling," in 2019 4th Scientific International Conference Najaf (SICN). 2019;109-114.

Tahsien SM, Karimipour H, Spachos P. "Machine learning based solutions for security of Internet of Things (IoT): A survey," Journal of Network and Computer Applications. 2020;161:102630.

Novaliendry D, Farooq M, Sivakumar KK, Parida PK, Supriya BY. Medical Internet-of-Things Based Breast Cancer Diagnosis Using Hyper Parameter-Optimized Neural Networks. International Journal of Intelligent Systems and Applications in Engineering. 2024 Jan 7;12(10s):65-71.

Gupta MK, Dwivedi RK, Sharma A, Farooq M. Performance Evaluation of Blockchain Platforms. In2023 International Conference on IoT, Communication and Automation Technology (ICICAT) 2023 Jun 23 (pp. 1-6). IEEE.

Farooq M, Hassan M. “EDeLeaR: Edge-based Deep Learning with Resource Awareness for Efficient Model Training and Inference for IoT and Edge Devices”, Int. J. Sc. Res. In Network Security and Communication. 2024; 12(1):1- 8.

Gupta MK, Rai AK, Farooq M, Santhiya P. Network Security and Protection Strategies for Big Data: Challenges and Innovations. In2023 6th International Conference on Contemporary Computing and Informatics (IC3I) 2023 Sep 14 (Vol. 6, pp. 705-709). IEEE.

Sharma A, Kumar G, Farooq M, Gupta MK, Raj S, Rai AK. Unleashing the Power of Big Data: A Comprehensive Analysis and Future Directions. In2023 6th International Conference on Contemporary Computing and Informatics (IC3I) 2023 Sep 14 (Vol. 6, pp. 828-832). IEEE.

Farooq M, Khan MH. QuantIoT Novel Quantum Resistant Cryptographic Algorithm for Securing IoT Devices: Challenges and Solution.

Downloads

Published

2024-03-22

How to Cite

[1]
M. Farooq and M. H. Khan, “Cyber Attack Detection Using Machine Learning Techniques in IoT Networks”, IJIRCST, vol. 12, no. 2, pp. 32–38, Mar. 2024.

Similar Articles

1 2 3 4 5 6 7 > >> 

You may also start an advanced similarity search for this article.