banner

An efficient network optimized machine learning architecture framework for detection of malwares in IOT (NB-IOT) systems

R. Rajalingam, K. Kavitha

Abstract


The Internet of things (IoT) is a wirelessly interconnected network of electrical gadgets. Due to their necessity of vast volumes of data in a single entity, the centralized machine learning (ML)-assisted systems that are widely used are difficult to use. Researchers and academics have a challenging issue about security and privacy in the IoT system. To overcome this issue, the paper presents Network optimised with machine learning classification is proposed. In terms of delay, security, accessibility, data transfer rate, energy consumption, spectral effectiveness, and coverage area, IoT and other wireless and mobile communication technologies function effectively. K-nearest neighbour (KNN) is one of the machine learning algorithms based on supervised learning technique is proposed. In specific applications, the proposed K nearest neighbour algorithm, is more accurate than existing methods such as decision tree (DT), random forest (RF), and support vector machine (SVM), and can be used to improve malware detection accuracy and also used to detect malware in NB-IoT. Using Aposemat IoT-23 datasets and assessment criteria including malware detection accuracy, recall, precision, and F1-score, the suggested technique was assessed. It was shown to be more accurate than competing methods and to increase security levels.


Keywords


Internet of things (IoT); machine learning (ML); network optimised; classification; K nearest neighbor (KNN); decision tree (DT); random forest (RF); support vector machine (SVM)

Full Text:

PDF

References


1. Qiu M, Ming Z, Li J, et al. Phase-Change Memory Optimization for Green Cloud with Genetic Algorithm. IEEE Transactions on Computers. 2015; 64(12): 3528-3540. doi: 10.1109/tc.2015.2409857

2. Sfar AR, Chtourou Z, Challal Y. A systemic and cognitive vision for IoT security: A case study of military live simulation and security challenges. 2017 International Conference on Smart, Monitored and Controlled Cities (SM2C). doi: 10.1109/sm2c.2017.8071828

3. Anthi E, Williams L, Burnap P. Pulse: an adaptive intrusion detection for the internet of things. Living in the Internet of Things: Cybersecurity of the IoT—2018. doi: 10.1049/cp.2018.0035

4. Hou X, Li Y, Chen M, et al. Vehicular Fog Computing: A Viewpoint of Vehicles as the Infrastructures. IEEE Transactions on Vehicular Technology. 2016; 65(6): 3860-3873. doi: 10.1109/tvt.2016.2532863

5. Li Y, Zheng F, Chen M, et al. A unified control and optimization framework for dynamical service chaining in software-defined NFV system. IEEE Wireless Communications. 2015; 22(6): 15-23. doi: 10.1109/mwc.2015.7368820

6. Zayas AD, Merino P. The 3GPP NB-IoT system architecture for the Internet of Things. 2017 IEEE International Conference on Communications Workshops (ICC Workshops). doi: 10.1109/iccw.2017.7962670

7. Muteba F, Djouani K, Olwal TO, et al. Challenges and solutions of spectrum allocation in NB-IoT technology. Tshwane University of Technology. Pretoria, South Africa. pp. 2-7.

8. Chen M, Miao Y, Jian X, et al. Cognitive-LPWAN: Towards Intelligent Wireless Services in Hybrid Low Power Wide Area Networks. IEEE Transactions on Green Communications and Networking. 2019; 3(2): 409-417. doi: 10.1109/tgcn.2018.2873783

9. Moazzeni S, Sawan M, Cowan GER. An Ultra-Low-Power Energy-Efficient Dual-Mode Wake-Up Receiver. IEEE Transactions on Circuits and Systems I: Regular Papers. 2015; 62(2): 517-526. doi: 10.1109/tcsi.2014.2360336

10. Hoymann C, Astely D, Stattin M, et al. LTE release 14 outlook. IEEE Communications Magazine. 2016; 54(6): 44-49. doi: 10.1109/mcom.2016.7497765

11. Riaz S, Latif S, Usman SM, et al. Malware Detection in Internet of Things (IoT) Devices Using Deep Learning. Sensors. 2022; 22(23): 9305. doi: 10.3390/s22239305

12. Jeon J, Park JH, Jeong YS. Dynamic Analysis for IoT Malware Detection with Convolution Neural Network Model. IEEE Access. 2020; 8: 96899-96911. doi: 10.1109/access.2020.2995887

13. Asam M, Khan SH, Akbar A, et al. IoT malware detection architecture using a novel channel boosted and squeezed CNN. Scientific Reports. 2022; 12(1). doi: 10.1038/s41598-022-18936-9

14. Dartel B. Malware detection in IoT devices using Machine Learning [Bachelor’s thesis]. University of Twente.

15. Mustafa Hilal A, Ben Haj Hassine S, Larabi-Marie-Sainte S, et al. Malware Detection Using Decision Tree Based SVM Classifier for IoT. Computers, Materials & Continua. 2022; 72(1): 713-726. doi: 10.32604/cmc.2022.024501

16. Pei X, Deng X, Tian S, et al. A knowledge transfer-based semi-supervised federated learning for IoT malware detection. IEEE Transactions on Dependable and Secure Computing. 20(3): pp. 2127-2143.

17. Tamás C, Papp D, Buttyán L, et al. SIMBIoTA: Similarity-based Malware Detection on IoT Devices. In: IoTBDS. pp. 58-69.

18. HaddadPajouh H, Dehghantanha A, Khayami R, et al. A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting. Future Generation Computer Systems. 2018; 85: 88-96. doi: 10.1016/j.future.2018.03.007

19. Mihoub A, Fredj OB, Cheikhrouhou O, et al. Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques. Computers & Electrical Engineering. 2022; 98: 107716. doi: 10.1016/j.compeleceng.2022.107716

20. Kaur A, Pal SK, Singh AP. Hybridization of K-Means and Firefly Algorithm for intrusion detection system. International Journal of System Assurance Engineering and Management. 2017; 9(4): 901-910. doi: 10.1007/s13198-017-0683-8

21. Sakr MM, Tawfeeq MA, El-Sisi AB, et al. An Efficiency Optimization for Network Intrusion Detection System. International Journal of Computer Network and Information Security. 2019; 11(10): 1-11. doi: 10.5815/ijcnis.2019.10.01

22. Abdelmoumin G, Rawat DB, Rahman A. On the Performance of Machine Learning Models for Anomaly-Based Intelligent Intrusion Detection Systems for the Internet of Things. IEEE Internet of Things Journal. 2022; 9(6): 4280-4290. doi: 10.1109/jiot.2021.3103829

23. Srivastava A, Kumar A. A back propagation NN to optimize the IoT network. 2022 International Conference on Computer Communication and Informatics (ICCCI). Published online January 25, 2022. doi: 10.1109/iccci54379.2022.9740861

24. Azrour M, Mabrouki J, Guezzaz A, et al. Internet of Things Security: Challenges and Key Issues. Khan HU, ed. Security and Communication Networks. 2021; 2021: 1-11. doi: 10.1155/2021/5533843

25. Nižetić S, Šolić P, López-de-Ipiña González-de-Artaza D, et al. Internet of Things (IoT): Opportunities, issues and challenges towards a smart and sustainable future. Journal of Cleaner Production. 2020; 274: 122877. doi: 10.1016/j.jclepro.2020.122877

26. Weber M, Boban M. Security challenges of the internet of things. 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). Published online May 2016. doi: 10.1109/mipro.2016.7522219

27. Hasan M, Islam MdM, Zarif MII, et al. Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things. 2019; 7: 100059. doi: 10.1016/j.iot.2019.100059

28. Sarker IH. Machine Learning: Algorithms, Real-World Applications and Research Directions. SN Computer Science. 2021; 2(3). doi: 10.1007/s42979-021-00592-x

29. Soofi AA, Awan A. Classification Techniques in Machine Learning: Applications and Issues. Journal of Basic & Applied Sciences. 2017; 13: 459-465. doi: 10.6000/1927-5129.2017.13.76

30. Asharf J, Moustafa N, Khurshid H, et al. A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions. Electronics. 2020; 9(7): 1177. doi: 10.3390/electronics9071177

31. Ioannou C, Vassiliou V. Network Attack Classification in IoT Using Support Vector Machines. Journal of Sensor and Actuator Networks. 2021; 10(3): 58. doi: 10.3390/jsan10030058

32. Hemanth DJ. Improved Malware Detection for IoT Devices Using Random Forest Algorithm Comparing with Decision Tree Algorithm. pp. 597-603.

33. Narudin FA, Feizollah A, Anuar NB, et al. Evaluation of machine learning classifiers for mobile malware detection. Soft Computing. 2014; 20(1): 343-357. doi: 10.1007/s00500-014-1511-6

34. Xiao L, Li Y, Huang X, et al. Cloud-Based Malware Detection Game for Mobile Devices with Offloading. IEEE Transactions on Mobile Computing. 2017; 16(10): 2742-2750. doi: 10.1109/tmc.2017.2687918

35. Razzak I, Moustafa N, Mumtaz S, et al. One‐class tensor machine with randomized projection for large‐scale anomaly detection in high‐dimensional and noisy data. International Journal of Intelligent Systems. 2021; 37(8): 4515-4536. doi: 10.1002/int.22729

36. Haider SK, Jiang A, Jamshed MA, et al. Performance Enhancement in P300 ERP Single Trial by Machine Learning Adaptive Denoising Mechanism. IEEE Networking Letters. 2019; 1(1): 26-29. doi: 10.1109/lnet.2018.2883859

37. Satpathy SK, Vibhu V, Behera BK, et al. Analysis of Quantum Machine Learning Algorithms in Noisy Channels for Classification Tasks in the IoT Extreme Environment. IEEE Internet of Things Journal. 2024; 11(3): 3840-3852. doi: 10.1109/jiot.2023.3300577




DOI: https://doi.org/10.32629/jai.v7i5.1635

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 R. Rajalingam, K. Kavitha

License URL: https://creativecommons.org/licenses/by-nc/4.0/