Performance evaluation of machine learning algorithms for intrusion detection in IoT applications

Ng Yee Jien, Mohammad Tahir, Mohammad Dabbagh, Yap Kian Meng, Ali Farooq

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

2 Citations (Scopus)

Abstract

It is estimated that the number of IoT devices will reach 50 billion by 2030, with its wide range of applications and ease of use. However, in recent years, it has been established that there are numerous attacks targeting IoT devices and various challenges to securing them due to their limited computing capacity. One of the main problems that need to be solved is detecting and reporting malicious packets that are attempting to enter the IoT device before they are executed, also known as intrusion detection. An Intrusion Detection System (IDS) is a tool that monitors the network for potentially malicious packets and raises an alert when one is detected. With the usage of technologies such as machine learning and published datasets of IoT traffic that contain malicious traffic and normal traffic, an optimal approach to intrusion detection can be identified. This paper provides an overview of existing machine learning approaches for intrusion detection and evaluates different approaches using multiple datasets. The available datasets were evaluated on several machine learning models based on accuracy, F1-score, and efficiency.
Original languageEnglish
Title of host publication2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET)
Place of PublicationPiscataway, NJ
PublisherIEEE
Pages101-106
Number of pages6
ISBN (Electronic)9781665468374
ISBN (Print)9781665468381
DOIs
Publication statusPublished - 9 Nov 2022

Keywords

  • IoT
  • machine learning
  • CNN
  • k-nearest neighbor
  • support vector machine
  • random forest

Fingerprint

Dive into the research topics of 'Performance evaluation of machine learning algorithms for intrusion detection in IoT applications'. Together they form a unique fingerprint.

Cite this