Accurate and Efficient Security Authentication of IoT Devices using Machine Learning Algorithms DOI Open Access

Ilham Alghamdi,

Mohammad Eid Alzahrani

Published: March 16, 2024

The rapid proliferation of Internet Things (IoT) devices has led to an increase in botnet attacks targeting these devices. A attack is a cyber-attack which network compromised devices, referred as "bots" or "zombies," utilized execute synchronized attack. These can result substantial harm both the and they are connected. This study investigates deployment security authentication protocols verify identity IoT prior connection. also evaluates classification accuracy four distinct supervised machine learning algorithms: Random Forest (RF), Naïve Bayes (NB), DecisionTree (DT), eXtreme Gradient Boosting (XGBoost). It was foundXGBoost best performing classifier among various algorithms tested, terms detecting networks using Bot-IoT dataset.

Language: Английский

Anomaly Detection of Distributed Denial of Service (DDoS) in IoT Network Using Machine Learning DOI Creative Commons
Baydaa Hashim Mohammed, Hasimi Sallehudin,

Nurhizam Safie

et al.

Research Square (Research Square), Journal Year: 2023, Volume and Issue: unknown

Published: Nov. 14, 2023

Abstract This research focuses on developing an anomaly detection system using machine learning to mitigate Distributed Denial of Service (DDoS) attacks in IoT networks. The study utilizes a diverse dataset from environments train and evaluate algorithms for DDoS detection. includes various device types, communication protocols, network configurations. aims achieve several objectives, including preprocessing, feature engineering, model selection, detection, performance evaluation. team preprocesses the raw Internet Things (IoT) data by cleaning transforming it prepare analysis. They then extract relevant features effectively characterize normal abnormal behavior. Multiple are evaluated compared determine most suitable models selected used identify classify traffic patterns associated with attacks. developed is assessing its accuracy, precision, recall, F1 score. significance this lies potential enhance security networks proactively detecting mitigating By leveraging learning, provide robust defense mechanism against pervasive threat, ensuring reliability availability services applications.

Language: Английский

Citations

3

User-Centric Security and Privacy Threats in Connected Vehicles: A Threat Modeling Analysis Using STRIDE and LINDDUN DOI

Beáta Stingelová,

Clemens Thaddäus Thrakl,

Laura Wrońska

et al.

2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Journal Year: 2023, Volume and Issue: unknown, P. 0690 - 0697

Published: Nov. 14, 2023

The increasing equipment of cars with smart systems and their networking other devices is leading to a growing network connected vehicles. Connected are Internet Things (IoT) that communicate bidirectionally systems, enabling internet access data exchange. Artificial Intelligence (AI) offers benefits such as autonomous driving, driver assistance programs, monitoring. connectivity also brings new risks users' privacy. Our study focuses on privacy threats in from user perspective. provides comprehensive threat model analysis based combination STRIDE LINDDUN. We analyze the various vulnerabilities arise connecting devices, including Vehicle-to-Vehicle (V2V), Vehicle-to-Vloud (V2C), Vehicle-to-Device (V2D). conduct our theoretical modern-day vehicle another study. shows several types can negatively impact car users. This encapsulates potential risks, inadvertent disclosure personal due vehicle's interconnectedness smartphones, subsequent susceptibility unauthorized access, while highlighting need for robust security measures indicated by modeling, safeguard against wide array identified cybersecurity threats.

Language: Английский

Citations

1

Exploring Smart Cities: Definitions, Advantages, Challenges, and Security Considerations for Urban Transformation DOI
Anuj Kumar Dwivedi, Sanjeev Kumar Prasad

Published: Nov. 24, 2023

The concept of "smart cities" has gained a lot attention in recent years as urban regions struggle with issues including population development, resource management, and environmental sustainability. goal this research paper is to give thorough introduction the idea smart cities by examining their definition, essential elements, prospective advantages. Smart aim improve quality life, encourage economic growth, guarantee efficiency utilizing cutting-edge technologies data-driven solutions. This also covers difficulties factors be considered when putting city ideas into practice provides prominent global examples. examines security attacks, asset-related threats, proposes countermeasures, will provide understanding cities, setting groundwork for future how they might change ecosystems.

Language: Английский

Citations

1

Cashew Apple Nutrients Prediction from Optical Spectroscopic Streaming Data Using Machine Learning-Based Approach DOI

Jeremiah Ayock Ishaya,

Wilfried Yves Hamilton Adoni, Jérémie T. Zoueu

et al.

Published: Jan. 1, 2024

Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI

Language: Английский

Citations

0

Accurate and Efficient Security Authentication of IoT Devices using Machine Learning Algorithms DOI Open Access

Ilham Alghamdi,

Mohammad Eid Alzahrani

Published: March 16, 2024

The rapid proliferation of Internet Things (IoT) devices has led to an increase in botnet attacks targeting these devices. A attack is a cyber-attack which network compromised devices, referred as "bots" or "zombies," utilized execute synchronized attack. These can result substantial harm both the and they are connected. This study investigates deployment security authentication protocols verify identity IoT prior connection. also evaluates classification accuracy four distinct supervised machine learning algorithms: Random Forest (RF), Naïve Bayes (NB), DecisionTree (DT), eXtreme Gradient Boosting (XGBoost). It was foundXGBoost best performing classifier among various algorithms tested, terms detecting networks using Bot-IoT dataset.

Language: Английский

Citations

0