IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v15y2023i6p210-d1167329.html
   My bibliography  Save this article

Enhancing IoT Device Security through Network Attack Data Analysis Using Machine Learning Algorithms

Author

Listed:
  • Ashish Koirala

    (Department of Computer Science and Engineering, Kathmandu University, Dhulikhel 45200, Nepal)

  • Rabindra Bista

    (Department of Computer Science and Engineering, Kathmandu University, Dhulikhel 45200, Nepal)

  • Joao C. Ferreira

    (Inov Inesc Inovação—Instituto de Novas Tecnologias, 1000-029 Lisbon, Portugal
    Instituto Universitário de Lisboa (ISCTE-IUL), ISTAR, 1649-026 Lisboa, Portugal)

Abstract

The Internet of Things (IoT) shares the idea of an autonomous system responsible for transforming physical computational devices into smart ones. Contrarily, storing and operating information and maintaining its confidentiality and security is a concerning issue in the IoT. Throughout the whole operational process, considering transparency in its privacy, data protection, and disaster recovery, it needs state-of-the-art systems and methods to tackle the evolving environment. This research aims to improve the security of IoT devices by investigating the likelihood of network attacks utilizing ordinary device network data and attack network data acquired from similar statistics. To achieve this, IoT devices dedicated to smart healthcare systems were utilized, and botnet attacks were conducted on them for data generation. The collected data were then analyzed using statistical measures, such as the Pearson coefficient and entropy, to extract relevant features. Machine learning algorithms were implemented to categorize normal and attack traffic with data preprocessing techniques to increase accuracy. One of the most popular datasets, known as BoT-IoT, was cross-evaluated with the generated dataset for authentication of the generated dataset. The research provides insight into the architecture of IoT devices, the behavior of normal and attack networks on these devices, and the prospects of machine learning approaches to improve IoT device security. Overall, the study adds to the growing body of knowledge on IoT device security and emphasizes the significance of adopting sophisticated strategies for detecting and mitigating network attacks.

Suggested Citation

  • Ashish Koirala & Rabindra Bista & Joao C. Ferreira, 2023. "Enhancing IoT Device Security through Network Attack Data Analysis Using Machine Learning Algorithms," Future Internet, MDPI, vol. 15(6), pages 1-30, June.
  • Handle: RePEc:gam:jftint:v:15:y:2023:i:6:p:210-:d:1167329
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/15/6/210/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/15/6/210/
    Download Restriction: no
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Abbas Javed & Amna Ehtsham & Muhammad Jawad & Muhammad Naeem Awais & Ayyaz-ul-Haq Qureshi & Hadi Larijani, 2024. "Implementation of Lightweight Machine Learning-Based Intrusion Detection System on IoT Devices of Smart Homes," Future Internet, MDPI, vol. 16(6), pages 1-22, June.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:15:y:2023:i:6:p:210-:d:1167329. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.