Please use this identifier to cite or link to this item: http://bura.brunel.ac.uk/handle/2438/28660
Title: Denial of Service Detection for IoT Networks Using Machine Learning
Authors: Abdulla, H
Al-Raweshidy, HS
Awad, W
Keywords: intrusion detection system;IoT;machine learning;security;anomaly detection
Issue Date: 22-Feb-2023
Publisher: SciTePress (Science and Technology Publications)
Citation: Abdulla, H., Al-Raweshidy, H.S. and Awad, W. (2023) 'Denial of Service Detection for IoT Networks Using Machine Learning', Proceedings of the 15th International Conference on Agents and Artificial Intelligence ICAART, Lisbon, Portugal, 22-24 February, volume 3 pp. 996 - 1003. doi: 10.5220/0011885700003393.
Abstract: The Internet of Things (IoT) is considered one of the trending technologies today. IoT affects a variety of industries, including logistics tracking, healthcare, automotive and smart cities. A rising number of cyberattacks and breaches are rapidly targeting networks equipped with IoT devices. Due to the resource-constrained nature of the IoT devices, one of the Internet security issues impacting IoT devices is the Denial-of-Service (DoS). This encourages the development of new techniques for automatically detecting DoS in IoT networks. In this paper, we test the performance of the following Machine Learning (ML) algorithms in detecting IoT DoS attacks using packet analysis at regular time intervals: Neural Networks (NN), Gaussian Naive Bayes (NB), Decision Trees (DT), and Support Vector Machine (SVM). We were able to achieve 98% accuracy in intrusion detection for IoT devices. We have created a novel way of detecting the attacks using only six attributes, which significantly reduces the time to train the ML Models by 58% on average. This research is based on data collected from actual IoT attacks on IoT networks. This paper shows that using the DT or NN; we can detect attacks on IoT devices. Furthermore, it shows that NB and SVM are poor in detecting IoT attacks. In addition, it proves that middle boxes embedded with ML Models can be utilized to detect attacks in places such as houses, manufactures, and plants.
URI: https://bura.brunel.ac.uk/handle/2438/28660
DOI: https://doi.org/10.5220/0011885700003393
ISBN: 978-989-758-623-1
ISSN: 2184-3589
Other Identifiers: ORCiD: Hamed S. Al-Raweshidy https://orcid.org/0000-0002-3702-8192
Appears in Collections:Dept of Electronic and Electrical Engineering Research Papers

Files in This Item:
File Description SizeFormat 
FullText.pdfCopyright © 2023 by SCITEPRESS – Science and Technology Publications, Lda. This is an Open Access article distributed under the terms of the Creative Commons (CC BY-NC-ND 4.0) Attribution License (https://creativecommons.org/licenses/by-nc-nd/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.493.04 kBAdobe PDFView/Open


This item is licensed under a Creative Commons License Creative Commons