scholarly journals Intrusion detection in internet of things networks based on machine learning methods

Author(s):  
Tatiana Tatarnikova ◽  
Pavel Bogdanov

Introduction: The growing amount of digital data generated, among others, by smart devices of the Internet of Things makes it important to study the application of machine learning methods to the detection of network traffic anomalies, namely the presence of network attacks. Purpose: To propose a unified approach to detecting attacks at different levels of IoT network architecture, based on machine learning methods. Results: It was shown that at the wireless sensor network level, attack detection is associated with the detection of anomalous behavior of IoT devices, when the deviation of an IoT device behavior from its profile exceeds a predetermined level. Smart IoT devices are profiled on the basis of statistical characteristics, such as the intensity and duration of packet transmission, the proportion of retransmitted packets, etc. At the level of a local or global wired IoT network, data is aggregated and then analyzed using machine learning methods. Trained classifiers can become a part of a network attack detection system, making decisions about compromising a node on the fly. Models of classifiers of network attacks were experimentally selected both at the level of a wireless sensor network and at the level of a local or global wired network. The best results in terms of completeness and accuracy estimates are demonstrated by the random forest method for a wired local and/or global network and by all the considered methods for a wireless sensor network. Practical relevance: The proposed models of classifiers can be used for developing intrusion detection systems in IoT networks.

2020 ◽  
Author(s):  
Liming Wang ◽  
Hongqin Zhu ◽  
Jiawei Sun ◽  
Ran Dai ◽  
Qi Ma ◽  
...  

Abstract Since IoT devices are strengthened, edge computing with multi-center cooperation becomes a trend. Considering that edge nodes may belong to different center, they have different trust management model, it’s hard to assess trust among edge nodes. In this paper, we take blockchain to coordinate differences among centers, construct a trust environment for transactions in IoT. In detail, we propose a blockchain based identity management for IoT to ensure identity is credible, then design a transaction model to provide certification for IoT transactions. And, we take machine learning methods to analyze IoT transaction log, thus decide trust nodes or not. Experiment results show that our mechanism could effectively identify trustworthy edges in IoT.


2014 ◽  
Vol 513-517 ◽  
pp. 1915-1918
Author(s):  
Heng Wang ◽  
Bi Geng Zheng

As one of the freshest technologies nowadays, the development of Internet of Things is attracting more and more concerns. Internet of Things is able to connect all the items to Internet via information technology such as RFID and Wireless Sensor Network, in order to realize intelligent identification and management. It is supposed in Internet of Things environments, satisfactory services can be provided through any devices or any networks, whenever it is demanded. It makes that not only PC device but also other small devices with intelligence can be connected to the same network. As a result, It is much more convenient for people to obtain real-time information and then to take corresponding actions.


Author(s):  
Kamal Gulati ◽  
Raja Sarath Kumar Boddu ◽  
Dhiraj Kapila ◽  
Sunil L. Bangare ◽  
Neeraj Chandnani ◽  
...  

2018 ◽  
Vol 12 (3) ◽  
pp. 2385-2394 ◽  
Author(s):  
Pei-Yih Ting ◽  
Jia-Lun Tsai ◽  
Tzong-Sun Wu

Sign in / Sign up

Export Citation Format

Share Document