Vis enkel innførsel

dc.contributor.authorSaheed, Yakub Kayode
dc.contributor.authorAbiodun, Aremu Idris
dc.contributor.authorMisra, Sanjay
dc.contributor.authorHolone, Monica Kristiansen
dc.contributor.authorColomo-Palacios, Ricardo
dc.date.accessioned2022-12-14T17:56:54Z
dc.date.available2022-12-14T17:56:54Z
dc.date.created2022-03-29T08:34:38Z
dc.date.issued2022
dc.identifier.citationAlexandria Engineering Journal. 2022, 61 (12), 9395-9409.en_US
dc.identifier.issn1110-0168
dc.identifier.urihttps://hdl.handle.net/11250/3037789
dc.description.abstractThe Internet of Things (IoT) refers to the collection of all those devices that could connect to the Internet to collect and share data. The introduction of varied devices continues to grow tremendously, posing new privacy and security risks—the proliferation of Internet connections and the advent of new technologies such as the IoT. Various and sophisticated intrusions are driving the IoT paradigm into computer networks. Companies are increasing their investment in research to improve the detection of these attacks. By comparing the highest rates of accuracy, institutions are picking intelligent procedures for testing and verification. The adoption of IoT in the different sectors, including health, has also continued to increase in recent times. Where the IoT applications became well known for technology researchers and developers. Unfortunately, the striking challenge of IoT is the privacy and security issues resulting from the energy limitations and scalability of IoT devices. Therefore, how to improve the security and privacy challenges of IoT remains an important problem in the computer security field. This paper proposes a machine learning-based intrusion detection system (ML-IDS) for detecting IoT network attacks. The primary objective of this research focuses on applying ML-supervised algorithm-based IDS for IoT. In the first stage of this research methodology, feature scaling was done using the Minimum-maximum (min–max) concept of normalization on the UNSW-NB15 dataset to limit information leakage on the test data. This dataset is a mixture of contemporary attacks and normal activities of network traffic grouped into nine different attack types. In the next stage, dimensionality reduction was performed with Principal Component Analysis (PCA). Lastly, six proposed machine learning models were used for the analysis. The experimental results of our findings were evaluated in terms of validation dataset, accuracy, the area under the curve, recall, F1, precision, kappa, and Mathew correlation coefficient (MCC). The findings were also benchmarked with the existing works, and our results were competitive with an accuracy of 99.9% and MCC of 99.97%.en_US
dc.language.isoengen_US
dc.publisherElsevieren_US
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/deed.no*
dc.subjectintrusion detection systemen_US
dc.subjectmachine learningen_US
dc.subjectInternet of Thingsen_US
dc.subjectmin-max normalizationen_US
dc.subjectUNSWNB-15en_US
dc.subjectprincipal component analysisen_US
dc.subjectcat boosten_US
dc.subjectXgBoosten_US
dc.titleA machine learning-based intrusion detection for detecting internet of things network attacksen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.rights.holder© 2022 THE AUTHORS.en_US
dc.subject.nsiVDP::Teknologi: 500en_US
dc.source.pagenumber9395-9409en_US
dc.source.volume61en_US
dc.source.journalAlexandria Engineering Journalen_US
dc.source.issue12en_US
dc.identifier.doi10.1016/j.aej.2022.02.063
dc.identifier.cristin2013188
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal