Skip to main content

An Analysis of IoT Cyber Security Driven by Machine Learning

  • Conference paper
  • First Online:
Proceedings of International Conference on Communication and Computational Technologies

Part of the book series: Algorithms for Intelligent Systems ((AIS))

Abstract

Since the beginning of the Internet of Things (IoT), the number of IoT devices connected to the Internet has grown rapidly. However, many IoT devices lack the security standards that non-IoT devices have. This means that billions of smart devices could be used as part of a botnet attack or point of entry into a secured network. The potential to exploit an IoT device makes the search to find suitable IoT security measures extremely important. In order to fill this need, this study explores the use of machine learning in IoT security measures. Upon reviewing recent developments of machine learning in IoT security, it was found that the methods with the highest threat detection accuracy utilized the random forest and K-nearest neighbor algorithms and the most efficient methods utilized software-defined networks (SDN) and the fog layer of networks. In addition, the methods which determine the type of IoT device one is when it connects to a network primarily used the random forest algorithm. This study will take an in-depth look at the use of machine learning algorithms to detect malicious and anomalous data within IoT systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Davis G (2018) 2020: life with 50 billion connected devices. In: 2018 IEEE international conference on consumer electronics (ICCE). https://doi.org/10.1109/icce.2018.8326056

  2. Bull P, Austin R, Popov E, Sharma M, Watson R (2016) Flow based security for IoT devices using an SDN gateway. In: 2016 IEEE 4th international conference on future internet of things and cloud (FiCloud). https://doi.org/10.1109/ficloud.2016.30

  3. Kolias C, Kambourakis G, Stavrou A, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer 50(7):80–84. https://doi.org/10.1109/mc.2017.201

    Article  Google Scholar 

  4. Mamdouh M, Elrukhsi MAI, Khattab A (2018) Securing the internet of things and wireless sensor networks via machine learning: a survey. In: 2018 international conference on computer and applications (ICCA). https://doi.org/10.1109/comapp.2018.8460440

  5. Azmoodeh A, Dehghantanha A, Conti M et al (2018) Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J Ambient Intell Hum Comput 9:1141–1152

    Article  Google Scholar 

  6. Ashton K (2009) That ‘internet of things’ thing. RFID J 22(7):97–114

    Google Scholar 

  7. Cenedese A, Zanella A, Vangelista L, Zorzi M (2014) Padova smart city: an urban internet of things experimentation. In: Proceeding of IEEE international symposium on a world of wireless, mobile and multimedia networks 2014. https://doi.org/10.1109/wowmom.2014.6918931

  8. Zhang Z-K, Cho MCY, Wang C-W, Hsu C-W, Chen C-K, Shieh S (2014) IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th international conference on service-oriented computing and applications. https://doi.org/10.1109/soca.2014.58

  9. Raza S, Shafagh H, Hewage K, Hummen R, Voigt T (2013) Lithe: lightweight secure CoAP for the internet of things. IEEE Sens J 13(10):3711–3720. https://doi.org/10.1109/jsen.2013.2277656

    Article  Google Scholar 

  10. Dorri A, Kanhere SS, Jurdak R (2016) Blockchain in internet of things: challenges and solutions. arXiv preprint arXiv:1608.05187

  11. Gunn DJ et al (2019) Touch-based active cloud authentication using traditional machine learning and LSTM on a distributed tensorflow framework. Int J Comput Intell Appl 18:1950022:1–1950022:16

    Google Scholar 

  12. Mason J, Dave R, Chatterjee P, Graham-Allen I, Esterline A, Roy K (2020) An investigation of biometric authentication in the healthcare environment. Array 8:100042. https://doi.org/10.1016/j.array.2020.100042

  13. Shelton J et al (2018) Palm print authentication on a cloud platform. In: 2018 international conference on advances in big data, computing and D

    Google Scholar 

  14. Kelley T, Furey E (2018) Getting prepared for the next botnet attack: detecting algorithmically generated domains in botnet command and control. In: 2018 29th Irish signals and systems conference (ISSC), Belfast, pp 1–6. https://doi.org/10.1109/ISSC.2018.8585344

  15. Xiao L, Wan X, Lu X, Zhang Y, Wu D (2018) IoT security techniques based on machine learning: how do IoT devices use AI to enhance security? IEEE Signal Process Mag 35(5):41–49. https://doi.org/10.1109/MSP.2018.2825478

    Article  Google Scholar 

  16. Kotenko I, Saenko I, Skorik F, Bushuev S (2015) Neural network approach to forecast the state of the internet of things elements. In: 2015 XVIII international conference on soft computing and measurements (SCM). https://doi.org/10.1109/scm.2015.7190434

  17. Canedo J, Skjellum A (2016) Using machine learning to secure IoT systems. In: 2016 14th annual conference on privacy, security and trust (PST). https://doi.org/10.1109/pst.2016.7906930

  18. Moh M, Raju R (2018) Machine learning techniques for security of internet of things (IoT) and fog computing systems. In: 2018 international conference on high performance computing & simulation (HPCS). https://doi.org/10.1109/hpcs.2018.00116

  19. Buczak AL, Guven E (2015) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutor 18(2):1153–1176

    Article  Google Scholar 

  20. Meidan Y et al (2017) Detection of unauthorized IoT devices using machine learning techniques. arXiv preprint arXiv:1709.04647

  21. Meidan Y et al (2017) ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis. In: Proceedings of the symposium on applied computing

    Google Scholar 

  22. Doshi R, Apthorpe N, Feamster N (2018) Machine learning DDoS detection for consumer internet of things devices. In: 2018 IEEE security and privacy workshops (SPW). https://doi.org/10.1109/spw.2018.00013

  23. Hindy H et al (2020) Machine learning based IoT intrusion detection system: an MQTT case study. arXiv preprint arXiv:2006.15340. https://doi.org/10.1016/j.iot.2019.100059

  24. Alrashdi I et al (2019) AD-IoT: Anomaly detection of IoT cyberattacks in smart city using machine learning. In: 2019 IEEE 9th annual computing and communication workshop and conference (CCWC). IEEE

    Google Scholar 

  25. Hasan M, Milon Islam M, Islam I, Hashem MMA (2019) Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet Things 100059

    Google Scholar 

  26. Chhabra GS, Singh VP, Singh M (2020) Cyber forensics framework for big data analytics in IoT environment using machine learning. Multimed Tools Appl 79(23):15881–15900

    Google Scholar 

  27. Fang He, Qi A, Wang X (2020) Fast authentication and progressive authorization in large-scale IoT: how to leverage AI for security enhancement. IEEE Netw 34(3):24–29

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Strecker, S., Van Haaften, W., Dave, R. (2021). An Analysis of IoT Cyber Security Driven by Machine Learning. In: Kumar, S., Purohit, S.D., Hiranwal, S., Prasad, M. (eds) Proceedings of International Conference on Communication and Computational Technologies. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-16-3246-4_55

Download citation

Publish with us

Policies and ethics