Please use this identifier to cite or link to this item: http://bura.brunel.ac.uk/handle/2438/28660
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAbdulla, H-
dc.contributor.authorAl-Raweshidy, HS-
dc.contributor.authorAwad, W-
dc.coverage.spatialLisbon, Portugal-
dc.date.accessioned2024-03-30T11:38:46Z-
dc.date.available2024-03-30T11:38:46Z-
dc.date.issued2023-02-22-
dc.identifierORCiD: Hamed S. Al-Raweshidy https://orcid.org/0000-0002-3702-8192-
dc.identifier.citationAbdulla, H., Al-Raweshidy, H.S. and Awad, W. (2023) 'Denial of Service Detection for IoT Networks Using Machine Learning', Proceedings of the 15th International Conference on Agents and Artificial Intelligence ICAART, Lisbon, Portugal, 22-24 February, volume 3 pp. 996 - 1003. doi: 10.5220/0011885700003393.en_US
dc.identifier.isbn978-989-758-623-1-
dc.identifier.issn2184-3589-
dc.identifier.urihttps://bura.brunel.ac.uk/handle/2438/28660-
dc.description.abstractThe Internet of Things (IoT) is considered one of the trending technologies today. IoT affects a variety of industries, including logistics tracking, healthcare, automotive and smart cities. A rising number of cyberattacks and breaches are rapidly targeting networks equipped with IoT devices. Due to the resource-constrained nature of the IoT devices, one of the Internet security issues impacting IoT devices is the Denial-of-Service (DoS). This encourages the development of new techniques for automatically detecting DoS in IoT networks. In this paper, we test the performance of the following Machine Learning (ML) algorithms in detecting IoT DoS attacks using packet analysis at regular time intervals: Neural Networks (NN), Gaussian Naive Bayes (NB), Decision Trees (DT), and Support Vector Machine (SVM). We were able to achieve 98% accuracy in intrusion detection for IoT devices. We have created a novel way of detecting the attacks using only six attributes, which significantly reduces the time to train the ML Models by 58% on average. This research is based on data collected from actual IoT attacks on IoT networks. This paper shows that using the DT or NN; we can detect attacks on IoT devices. Furthermore, it shows that NB and SVM are poor in detecting IoT attacks. In addition, it proves that middle boxes embedded with ML Models can be utilized to detect attacks in places such as houses, manufactures, and plants.en_US
dc.format.extent996 - 1003-
dc.format.mediumPrint-Electronic-
dc.languageEnglish-
dc.language.isoen_USen_US
dc.publisherSciTePress (Science and Technology Publications)en_US
dc.rightsCopyright © 2023 by SCITEPRESS – Science and Technology Publications, Lda. This is an Open Access article distributed under the terms of the Creative Commons (CC BY-NC-ND 4.0) Attribution License (https://creativecommons.org/licenses/by-nc-nd/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.-
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0-
dc.source15th International Conference on Agents and Artificial Intelligence-
dc.source15th International Conference on Agents and Artificial Intelligence-
dc.subjectintrusion detection systemen_US
dc.subjectIoTen_US
dc.subjectmachine learningen_US
dc.subjectsecurityen_US
dc.subjectanomaly detectionen_US
dc.titleDenial of Service Detection for IoT Networks Using Machine Learningen_US
dc.typeConference Paperen_US
dc.identifier.doihttps://doi.org/10.5220/0011885700003393-
dc.relation.isPartOfProceedings of the 15th International Conference on Agents and Artificial Intelligence ICAART-
pubs.finish-date2023-02-24-
pubs.finish-date2023-02-24-
pubs.publication-statusPublished-
pubs.start-date2023-02-22-
pubs.start-date2023-02-22-
pubs.volume3-
dc.identifier.eissn2184-433X-
dc.rights.licensehttps://creativecommons.org/licenses/by-nc-nd/4.0/legalcode.en-
dc.rights.holderSCITEPRESS – Science and Technology Publications, Lda.-
Appears in Collections:Dept of Electronic and Electrical Engineering Research Papers

Files in This Item:
File Description SizeFormat 
FullText.pdfCopyright © 2023 by SCITEPRESS – Science and Technology Publications, Lda. This is an Open Access article distributed under the terms of the Creative Commons (CC BY-NC-ND 4.0) Attribution License (https://creativecommons.org/licenses/by-nc-nd/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.493.04 kBAdobe PDFView/Open


This item is licensed under a Creative Commons License Creative Commons