skip to main content
10.1145/3460620.3460742acmotherconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
research-article

IoT Cyber-Attack Detection: A Comparative Analysis

Published: 04 June 2021 Publication History

Editorial Notes

NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the DATA 2021 Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM's investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.

Abstract

A cyber-attack is precautious manipulation of computer systems and networks using malware to conciliate data or restrict processes or operations. These types of attacks are vastly growing over the years. This increase in structure and complexity calls for advanced innovation in defensive strategies and detection. Traditional approaches for detecting cyber-attacks suffer from low efficiency, especially with the high demands of increasing security threats. With the substitutional increase of computational power, machine learning and deep learning methods are considered significant solutions for defending and detecting those threats or attacks. In this paper, we performed a comparative analysis of IoT cyberattack detection methods. We utilized six different algorithms including, Random Forest, Logistic Regression, SVM, NB, KNN, and MLP. Each model is evaluated using precision, recall, F-score, and ROC.

References

[1]
L. D. X. Yang Lu, "Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics," IEEE INTERNET OF THINGS JOURNAL, vol. 6, 2019.
[2]
J. K. E. B.-H. a. P. Č. M. Husák, ""Survey of Attack Projection, Prediction, and Forecasting in Cyber Security,"," IEEE Communications Surveys & Tutorials, vol. 21, pp. 640-660, 2019.
[3]
C. a. B. E. D. R. U. T. O. C. Dina Nawara Electrical and R. Kashef, "IoT-based Recommendation Systems – An Overview," in 2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), 2020.
[4]
S. U. Rifkie Primartha Faculty of Computer Science and B. A. Tama, "Anomaly detection using random forest: A performance revisited," in International Conference on Data and Software Engineering (ICoDSE), 2017.
[5]
M. H. M. I. I. M.M.A.Hashem, "Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches," Internet of Things, vol. 7, 2019.
[6]
R. Kashef, "A boosted SVM classifier trained by incremental learning and decremental unlearning approach," Expert Systems with Applications, 2020.
[7]
M. R. P. Mrutyunjaya Panda, "NETWORK INTRUSION DETECTION USING NAÏVE BAYES," JCSNS International Journal of Computer Science and Network Security, vol. 7, no. 12, 2007.
[8]
M. Xie, J. Hu, S. Han and H.-H. Chen, "Scalable Hypergrid k-NN-Based Online Anomaly Detection in Wireless Sensor Networks," IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 8, 2013.
[9]
M. S. K. R. Kashef, "Distributed Cooperative Hard-Fuzzy Document Clustering," in the Annual Scientific Conference of the LORNET Research Network, 2006.
[10]
R. Kashef and M. S. Kamel, "Hard-fuzzy clustering: a cooperative approach," in IEEE International Conference on Systems, Man and Cybernetics, 2007.
[11]
K. G. J. H. L. Il-Gu Lee, "Battery Draining Attack and Defense against Power Saving Wireless LAN Devices," MDPI sensors, 2020.
[12]
V. G. V. M. D. L. Philokypros P. Ioulianou, "Battery Drain Denial-of-Service Attacks and Defenses in the Internet of Things," Journal of Telecommunications and Information Technology, pp. 37-45, 2019.
[13]
L. A. D. B. O. O. E. T. L. Nathalie Baracaldo, "Securing Data Provenance in Internet of Things (IoT) Systems," in International Conference on Service-Oriented Computing, 2016.
[14]
M. N. Aman, M. H. Basheer and B. Sikdar, "A Lightweight Protocol for Secure Data Provenance in the Internet of Things Using Wireless Fingerprints," IEEE SYSTEMS JOURNAL, pp. 1-11, 2020.
[15]
C. H. Rajesh Kumar Shrivastava, "Code-Tampering Defense for Internet of Things Using System Call Traces," in International Conference on Innovations for Community Services, 2020.
[16]
H. B. Salameh and M. Al-Quraan, "Securing Delay-Sensitive CR-IoT Networking Under Jamming Attacks: Parallel Transmission and Batching Perspective," IEEE Internet of Things Journal, vol. 7, no. 8, 2020.
[17]
N. Zhang, R. Wu, S. Yuan, C. Yuan and D. Chen, "RAV: Relay Aided Vectorized Secure Transmission in Physical Layer Security for Internet of Things Under Active Attacks," IEEE Internet of Things Journal, vol. 6, no. 5, 2019.
[18]
L. Li, G. Xu, L. Jiao, X. Li, H. Wang, J. Hu, H. Xian, W. Lian and H. Gao, "A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems," IEEE Transactions on Industrial Informatics, vol. 16, no. 3, 2020.
[19]
H. B. S. A. R. D. I. A. YaserJararweh, "Intelligent jamming-aware routing in multi-hop IoT-based opportunistic cognitive radio networks," Ad Hoc Networks, vol. 2020, 98.
[20]
H. Park, H. Roh and W. Lee, "Tagora: A Collision-Exploitative RFID Authentication Protocol Based on Cross-Layer Approach," IEEE Internet of Things Journal, vol. 7, no. 4, 2020.
[21]
Y. Y.,. G. Olivier Brun, "Deep Learning with Dense Random Neural Network for DetectingAttacks against IoT-connected Home Environments," ScienceDirect-Elsevier, vol. 134, pp. 458-463, 2018.
[22]
E. A. 1, L. Williams and P. Burnap, "Pulse: An Adaptive Intrusion Detection for the Internet of Things," in Living in the Internet of Things: Cybersecurity of the IoT, 2018.
[23]
I. Alrashdi, A. Alqazzaz, E. Aloufi, R. Alharthi, M. Zohdy and H. Ming, "AD-IoT: Anomaly Detection of IoT Cyberattacks in Smart City Using Machine Learning," in 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), 2019.
[24]
I. G. H. Y. J. L.-f. T. Zonglin Guo, "An Efficient Approach to Prevent Battery Exhaustion Attack on BLE-based Mesh Networks," in International Conference on Computing, Networking and Communications (ICNC): Wireless Networks, 2017.
[25]
M. Nobakht, V. Sivaraman and R. Boreli, "A Host-based Intrusion Detection and Mitigation Framework for Smart Home IoT using OpenFlow," in 11th International Conference on Availability, Reliability and Security (ARES), 2016.
[26]
P. Zhang, S. G. Nagarajan and I. Nevat, "Secure Location of Things (SLOT): Mitigating Localization Spoofing Attacks in the Internet of Things," IEEE Internet of Things Journal, vol. 4, no. 6, 2017.
[27]
X. F. Y. W. S. W. H. W. D. K. a. H. Z. Ning Zhang, "Physical Layer Authentication for Internet of Things via WFRFT-based Gaussian Tag Embedding," IEEE Internet of Things Journal, vol. 7, no. 9, 2020.
[28]
R. Kashef and M. S. Kamel, "Towards better outliers detection for gene expression datasets," in 2008 International Conference on Biocomputation, Bioinformatics, and Biomedical Technologies, 2008.
[29]
M. Ebrahimian and R. Kashef, "Efficient Detection of Shilling's Attacks in Collaborative Filtering Recommendation Systems Using Deep Learning Models," in 2020 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), 2020.
[30]
R. F. Kashef, "Ensemble-Based Anomaly Detetction using Cooperative Learning," in KDD 2017: Workshop on Anomaly Detection in Finance, 2017.
[31]
R. K. Liam Close, "Combining Artificial Immune System and Clustering Analysis: A Stock Market Anomaly Detection Model," Journal of Intelligent Learning Systems and Applications, vol. 12, no. 4, 2020.
[32]
R. K. Mahsa Ebrahimian, "Detecting Shilling Attacks Using Hybrid Deep Learning Models," symmetry, vol. 12, no. 11, 2020.
[33]
T. Yiu, "Understanding Random Forest https://towardsdatascience.com/understanding-random-forest-58381e0602d2," Medium, 2019.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
DATA'21: International Conference on Data Science, E-learning and Information Systems 2021
April 2021
277 pages
ISBN:9781450388382
DOI:10.1145/3460620
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 June 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cyberattack detection
  2. IoT
  3. Machine Learning
  4. Security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

DATA'21

Acceptance Rates

Overall Acceptance Rate 74 of 167 submissions, 44%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)84
  • Downloads (Last 6 weeks)2
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media