Hybrid Machine Learning Models for IoT Security

Authors

DOI:

https://doi.org/10.22105/siot.v1i3.271

Keywords:

Hybrid machine learning, IoT security, Anomaly detection, Threat classification, Zero-day attacks, Traffic analysis, Real-time detection

Abstract

The swift growth of the Internet of Things (IoT) brings forth considerable security challenges due to the variety of connected devices and their limited resources. Conventional security strategies are unable to keep pace with evolving cyber threats, rendering the IoT ecosystem susceptible to attacks. This paper introduces a hybrid machine-learning framework aimed at enhancing IoT security. Our method merges supervised and unsupervised techniques to detect both known and unknown (zero-day) threats. This hybrid framework utilizes fuzzy detection along with classification algorithms to recognize malicious activities while reducing false positives. We assess the performance of the model using publicly available IoT datasets and compare it to other  Machine Learning (ML) models. The findings reveal notable improvements in precision, accuracy, recall, and response time. These results suggest that the hybrid model establishes a more robust basis for safeguarding the IoT environment against threats.

References

Sayeed Anwar, Ujjeisheei Panda, & Hitesh Mohapatra. (2024). Legal and ethical issues in IoT based smart city: data privacy, surveillance, and citizen rights. Journal of computer science engineering and software testing, 10(2), 17–26. https://matjournals.net/engineering/index.php/JOCSES/article/view/617

Mishra, S. R., & Mohapatra, H. (2024). Enhancing money laundering detection through machine learning: A comparative study of algorithms and feature selection techniques. In AI and blockchain applications in industrial robotics (pp. 300–321). IGI Global. https://www.igi-global.com/chapter/enhancing-money-laundering-detection-through-machine-learning/336091

Mahesh, B. (2020). Machine learning algorithms-a review. International journal of science and research (IJSR).[internet], 9(1), 381–386. https://www.researchgate.net/profile/Batta-Mahesh/publication/344717762_Machine_Learning_Algorithms_-A_Review/links/5f8b2365299bf1b53e2d243a/Machine-Learning-Algorithms-A-Review.pdf?eid=5082902844932096t

Madakam, S., Ramaswamy, R., & Tripathi, S. (2015). Internet of things (IoT): A literature review. Journal of computer and communications, 3(5), 164–173. https://www.scirp.org/journal/paperinformation?paperid=56616

Steinwart, I., & Christmann, A. (2008). Support vector machines. Springer Science & Business Media.

Fleury, A., Vacher, M., & Noury, N. (2009). SVM-based multimodal classification of activities of daily living in health smart homes: sensors, algorithms, and first experimental results. IEEE transactions on information technology in biomedicine, 14(2), 274–283. https://doi.org/10.1109/TITB.2009.2037317

Priyadarshini, I. (2024). Anomaly detection of IoT cyberattacks in smart cities using federated learning and split learning. Big data and cognitive computing, 8(3), 21. https://doi.org/10.3390/bdcc8030021

Mirsky, Y., Doitshman, T., Elovici, Y., & Shabtai, A. (2018). Kitsune: An ensemble of autoencoders for online network intrusion detection. ArXiv Preprint ArXiv:1802.09089.

Wang, X., Chen, M., Xing, C., & Zhang, T. (2016). Defending DDoS attacks in software-defined networking based on legitimate source and destination IP address database. IEICE transactions on information and systems, 99(4), 850–859. https://search.ieice.org/bin/summary.php?id=e99-d_4_850

Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM sigcomm computer communication review, 34(2), 39–53. https://dl.acm.org/doi/abs/10.1145/997150.997156

Published

2024-11-29

How to Cite

Sahu *, N. R. . (2024). Hybrid Machine Learning Models for IoT Security. Smart Internet of Things, 1(3), 198-202. https://doi.org/10.22105/siot.v1i3.271

Similar Articles

1-10 of 20

You may also start an advanced similarity search for this article.