Network Traffic Analysis Using Machine Learning Techniques in IoT Networks

Network Traffic Analysis Using Machine Learning Techniques in IoT Networks

Shailendra Mishra
Copyright: © 2021 |Pages: 17
DOI: 10.4018/IJSI.289172
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Internet of things devices are not very intelligent and resource-constrained; thus, they are vulnerable to cyber threats. Cyber threats would become potentially harmful and lead to infecting the machines, disrupting the network topologies, and denying services to their legitimate users. Artificial intelligence-driven methods and advanced machine learning-based network investigation prevent the network from malicious traffics. In this research, a support vector machine learning technique was used to classify normal and abnormal traffic. Network traffic analysis has been done to detect and prevent the network from malicious traffic. Static and dynamic analysis of malware has been done. Mininet emulator was selected for network design, VMware fusion for creating a virtual environment, hosting OS was Ubuntu Linux, network topology was a tree topology. Wireshark was used to open an existing pcap file that contains network traffic. The support vector machine classifier demonstrated the best performance with 99% accuracy.
Article Preview
Top

1. Introduction

The connection of the internet with an embedded computer system coupled with sensors and actuators brought about the notion of the internet of things (IoT). The name ‘Internet of Things’ developed from a presentation in the Procter & Gamble corporation. The presenter showed that the company could use the internet to gather information about clients without any human assistance and called it the internet of things (Ibarra-Esquer et al., 2017). The popularity developed from there and confined until now when people are linking it to virtual cyberspace and believe that it can make human life easier. The internet of things now has a close connection to location and tracking, sensing, actuation, and processes. This technology avails an ability to detect items through the use of a digital tag or serial numbers. They also check the physical location of people and items in the world through various Geo-location devices and offer communication capabilities. Apart from all these functions, IoT allows the actuation of devices and the ability to modify the external physical environment. In the same way the system can process commands sent through the internet and lead to real benefits for the user. The internet of things possesses similar challenges of security and privacy (Ouaddah et al., 2017). The growing market for IoT also attracts malicious individuals trying to gain access to the marketplace (Bertino & Islam, 2017). This new technology comes with difficulties in protecting the privacy and safety of data. Organizations with interest in the IoT technology should train their staff about safety measures and ways of detecting cyber-attacks.

Software defined networking is a new network paradigm that improves security in IoT networks. The centralized controller in SDN manages the network and controls the data flow in the network elements. It has received significant attention from industry and researchers, and it has been deployed in different scenarios and environments (Lee et al., 2020). The network traffic analysis process consists of packet recording and analyzing the behavior of network traffic communication to detect attacks in the IoT network (Banerjee & Samantaray, 2019; Sultana et al., 2019). The threat landscape evolution, in coincidence with the increasing dependence on modern technology, has occasioned a structural transformation for the development of the incident retort framework, while the IT would continuously play an essential part in response action, its responsibility has reformed for a caring one. Nowadays, with the upsurge in the utilization of technologies within the workroom, cybercriminals can get access to company networks. (Shea et al., 2019). As a consequence, the whole cyber battleground has changed and turned out to be far more multifaceted hence the need for an incident response framework.

Artificial intelligence improved system security against cyber, reactive defences are not enough to halt attackers from accessing even the top security architectures. (Desouza et al., 2020) Industrial IoT has special communication requirements including high reliability, low latency, flexibility, and security as provided by the 5G mobile technology and growth is the foundation of development in the modern age. (Varga et al., 2020). Ensuring the safety entails shielding both IoT services and devices from illegal access from external and in the devices, confidentiality is a significant security aspect of the IoT network (Siboni et al., 2019).

Deep learning and machine learning are a great addition to the IoT era. Support Vector Machine (SVM), Random Forest (RF), K-Nearest Neighbour (KNN), Logistic Regression (LR) are the prominent machine learning approaches used in attack and anomaly detection in IoT network (Hasan et al., 2019). RF algorithm combines bagging) and random feature to create a series of controlled variation decision trees. In K-NN classification, a classifier returns a class membership. SVM seeks a hyperplane, which best splits, the various classes (Fenanir et al., 2019). SVM trains data to find multiple support vectors, which define the hyperplane. The prediction only relies on the support vectors. Besides linear classification. SVM is considered to be more robust in performance (Sciancalepore et al., 2020).

Complete Article List

Search this Journal:
Reset
Volume 12: 1 Issue (2024)
Volume 11: 1 Issue (2023)
Volume 10: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 9: 4 Issues (2021)
Volume 8: 4 Issues (2020)
Volume 7: 4 Issues (2019)
Volume 6: 4 Issues (2018)
Volume 5: 4 Issues (2017)
Volume 4: 4 Issues (2016)
Volume 3: 4 Issues (2015)
Volume 2: 4 Issues (2014)
Volume 1: 4 Issues (2013)
View Complete Journal Contents Listing