Cyber Attack Detection in an Internet of Things Employing Random Forest
DOI:
https://doi.org/10.70454/JRICST.2024.10101Keywords:
Internet of Things, cyber-Security, Random Forest, DoS, DDoS AttackAbstract
The Internet of Things is a vast system of interconnected devices. These gadgets are becoming increasingly commonplace in vital applications. As a result, cybercriminals are directing more of their attention toward the IoT. To protect the IoT from intrusion, we employ Random Forest, a popular machine-learning algorithm for classification tasks, in this work. To implement the proposed method, labeled data depicting both normal IoT device operation and malicious attacks must be collected. Our approach is 95% accurate. Because the advantages of using random forests can be used with smaller datasets and normal computational resources, we believe our method is a good one for detecting and avoiding IoT attacks. This paper introduces a method for detecting cyber-attacks in IoT environments. It uses the Random Forest (RF) algorithm, which is well-known for its accuracy and resilience in classification tasks. To better protect the Internet of Things (IoT) from ever-changing cyber threats, this method offers a dependable and scalable solution.
References
[1] Elamparithi, P., Kalaivani, S., Vijayalakshmi, S., Keerthika, E., Koteswari, S., &Raaj, R. S. (2023). A Machine Learning Approach for Detecting DDOS Attack in IoT Network Using Random Forest Classifier. International Journal of Intelligent Systems and Applications in Engineering, 12(2s), 495–502.
[2] Han S, Wu Q, Yang Y. Machine learning for Internet of things anomaly detection under low-quality data. International Journal of Distributed Sensor Networks. 2022;18(10). doi:10.1177/15501329221133765
[3] A. D. Vasantha, P. P. Paul and M. Usha, "Secure Trust Management Scheme over the Detection of ON/OFF Attacks to Predict an Efficient Crop Yield Production in Wireless Sensor Network," 2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Dharan, Nepal, 2022, pp. 139-149, doi: 10.1109/I-SMAC55078.2022.9987273.
[4] L. Andrade-Arenas and J. A. Ramos-Romero, "Analysis and prevention of IoT vulnerabilities by implementing a lightweight AD-IoT intrusion detection system model," 2020 IEEE CongresoBienal de Argentina (ARGENCON), Resistencia, Argentina, 2020, pp. 1-4, doi: 10.1109/ARGENCON49523.2020.9505497.
[5] P. Owezarski, "Investigating adversarial attacks against Random Forest-based network attack detection systems," NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium, Miami, FL, USA, 2023, pp. 1-6, doi: 10.1109/NOMS56928.2023.10154328.
[6] N. Tripathi, A. K. Mishra, P. Bagla, N. K. Pandey and S. Mittal, "IoT Attack Detection Method based on Synthetic Minority Over-Sampling with Random Forest Technique," 2023 10th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 2023, pp. 472-477.
[7] A. Srivastava, S. K. Maurya and P. Kumar Saini, "Blockchain based Authentication for Internet of Things Devices based on Smart Farming," 2023 8th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, 2023, pp. 577-582, doi: 10.1109/ICCES57224.2023.10192605.
[8] Rashid, M.M.; Kamruzzaman, J.; Hassan, M.M.; Imam, T.; Gordon, S. Cyberattacks Detection in IoT-Based Smart City Applications Using Machine Learning Techniques. Int. J. Environ. Res. Public Health 2020, 17, 9347. https://doi.org/10.3390/ijerph17249347
[9] M. Maliha, "A Supervised Learning Approach: Detection of Cyber Attacks," 2021 IEEE International Conference on Telecommunications and Photonics (ICTP), Dhaka, Bangladesh, 2021, pp. 1-5, doi: 10.1109/ICTP53732.2021.9744169.
[10] A. Srivastava, B. S. Rawat, G. Singh, V. Bhatnagar, P. K. Saini and S. A. Dhondiyal, "A Review of Optimization Algorithms for Training Neural Networks," 2023 International Conference on Sustainable Emerging Innovations in Engineering and Technology (ICSEIET), Ghaziabad, India, 2023, pp. 886-890, doi: 10.1109/ICSEIET58677.2023.10303287.
[11] Dalal, S., Lilhore, U.K., Faujdar, N. et al. Next-generation cyber-attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree. J Cloud Comp 12, 137 (2023). https://doi.org/10.1186/s13677-023-00517-4
[12] Nanda, W. D., &Sumadi, F. D. S. (2022). LRDDoS Attack Detection on SD-IoT Using Random Forest with Logistic Regression Coefficient. Jurnal RESTI (RekayasaSistem Dan TeknologiInformasi), 6(2), 220 -226
[13] K. Saurabh, S. Singh, R. Vyas, O. P. Vyas and R. Khondoker, "MLAPS: A Machine Learning based Second Line of Defense for Attack Prevention in IoT Network," 2022 IEEE 19th India Council International Conference (INDICON), Kochi, India, 2022, pp. 1-6, doi: 10.1109/INDICON56171.2022.10039777.
[14] Kurniabudi, DerisStiawan, Darmawijoyo, MohdYazid Bin Idris, SarjonDefit, Yaya SudaryaTriana, RahmatBudiarto,Improvement of attack detection performance on the internet of things with PSO-search and random forest,Journal of Computational Science,Volume 64,2022,101833,ISSN 1877-7503,https://doi.org/10.1016/j.jocs.2022.101833.
[15] Mahmood, H., Mahmood, D., Shaheen, Q., Akhtar, R., &Changda, W. (2021). S-DPS: An SDN-Based DDoS Protection System for Smart Grids. Security and Communication Networks, 2021, 1–19. https://doi.org/10.1155/2021/6629098
[16] Kurniabudi, DerisStiawan, Darmawijoyo, MohdYazid Bin Idris, SarjonDefit, Yaya SudaryaTriana, RahmatBudiarto, Improvement of attack detection performance on the Internet of things with PSO-search and random forest,Journal of Computational Science, Volume 64, 2022, 101833, ISSN 1877-7503, https://doi.org/10.1016/j.jocs.2022.101833.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 PRASHANT Bajpai (Author)
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.