Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3628797.3628930acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoictConference Proceedingsconference-collections
research-article

A Machine Learning-Based Anomaly Packets Detection for Smart Home

Published: 07 December 2023 Publication History
  • Get Citation Alerts
  • Abstract

    The advent of smart homes has revolutionized residential living, integrating advanced technologies and intelligent devices to create secure, comfortable, and efficient environments. However, this integration of diverse smart devices has brought significant cybersecurity challenges. Detecting and analyzing abnormal network packets have become paramount, signifying potential intrusions, malicious activities, or system errors and ensuring the security and stability of smart home systems. Machine learning techniques, such as Decision Trees, Support Vector Machines (SVM), Convolutional Neural Networks (CNN), K-Nearest Neighbors (KNN), Recurrent Neural Networks (RNN), and Random Forests, have shown promise in addressing these challenges. However, most research has concentrated on anomaly detection rather than malicious activity in smart homes. The vast datasets collected from various scenarios pose methodological and algorithmic challenges for applying machine learning techniques. To fill these research gaps, our study introduces traditional machine-learning methods for detecting abnormal network packets in smart homes using the IoT-23 dataset. It involves preprocessing the dataset, extracting relevant features, and training various machine learning models. The correlation matrix helps validate the feature selection of the best models based on performance metrics like precision, F1-score, recall, accuracy ratio, training score, and training time cost. Additionally, the study classifies 12 types of malicious malware across different machine learning models, considering performance within the context of smart home devices. This study implements real-time anomaly detection on the Raspberry Pi using packet captures and Zeek flowmeter methods. The findings contribute insights into models suitable for smart home security. In addition, our research enhances the understanding and application of machine learning methods for bolstering security in smart homes.

    References

    [1]
    Adel Ali Ahmed and Waleed Ali Ahmed. 2019. An effective multifactor authentication mechanism based on combiners of hash function over internet of things. Sensors 19, 17 (2019), 3663.
    [2]
    Saad Albawi, Tareq Abed Mohammed, and Saad Al-Zawi. 2017. Understanding of a convolutional neural network. In 2017 international conference on engineering and technology (ICET). Ieee, 1–6.
    [3]
    Somaya Alshare, Malak Abdullah, and Muhannad Quwaider. 2022. Increasing Accuracy of Random Forest Algorithm by Decreasing Variance. In 2022 13th International Conference on Information and Communication Systems (ICICS). IEEE, 232–238.
    [4]
    Léon Bottou. 2012. Stochastic gradient descent tricks. In Neural Networks: Tricks of the Trade: Second Edition. Springer, 421–436.
    [5]
    Leo Breiman. 2001. Random forests. Machine learning 45 (2001), 5–32.
    [6]
    C Cortes and V Vapnik. [n. d.]. Support-vector networks, machine learning, 20 (3)(1995) 273–297. Google Scholar Google Scholar Digital Library Digital Library ([n. d.]).
    [7]
    Thomas Cover and Peter Hart. 1967. Nearest neighbor pattern classification. IEEE transactions on information theory 13, 1 (1967), 21–27.
    [8]
    Abdelouahid Derhab, Arwa Aldweesh, Ahmed Z Emam, and Farrukh Aslam Khan. 2020. Intrusion detection system for internet of things based on temporal convolution neural network and efficient feature engineering. Wireless Communications and Mobile Computing 2020 (2020), 1–16.
    [9]
    Amir Gandomi and Murtaza Haider. 2015. Beyond the hype: Big data concepts, methods, and analytics. International journal of information management 35, 2 (2015), 137–144.
    [10]
    Dimitrios Georgakopoulos and Liang-Jie Zhang. 2018. Internet of Things-ICIOT 2018. Springer.
    [11]
    Pierre Geurts, Damien Ernst, and Louis Wehenkel. 2006. Extremely randomized trees. Machine learning 63 (2006), 3–42.
    [12]
    Xavier Glorot and Yoshua Bengio. 2010. Understanding the difficulty of training deep feedforward neural networks. In Proceedings of the thirteenth international conference on artificial intelligence and statistics. JMLR Workshop and Conference Proceedings, 249–256.
    [13]
    Jochen Görtler, Fred Hohman, Dominik Moritz, Kanit Wongsuphasawat, Donghao Ren, Rahul Nair, Marc Kirchner, and Kayur Patel. 2022. Neo: Generalizing confusion matrix visualization to hierarchical and multi-output labels. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems. 1–13.
    [14]
    Harsurinder Kaur, Husanbir Singh Pannu, and Avleen Kaur Malhi. 2019. A systematic review on imbalanced data challenges in machine learning: Applications and solutions. ACM Computing Surveys (CSUR) 52, 4 (2019), 1–36.
    [15]
    C.-C. Jay Kuo. 2016. Understanding convolutional neural networks with a mathematical model. Journal of Visual Communication and Image Representation 41 (2016), 406–413.
    [16]
    Yann LeCun, Léon Bottou, Yoshua Bengio, and Patrick Haffner. 1998. Gradient-based learning applied to document recognition. Proc. IEEE 86, 11 (1998), 2278–2324.
    [17]
    Y Liang and N Vankayalapati. [n. d.]. Machine Learning and Deep Learning Methods for Better Anomaly Detection in IoT-23 Dataset Cybersecurity. Preprint. Available online: https://github. com/yliang725/Anomaly-Detection-IoT23 (accessed on 22 December 2022) ([n. d.]).
    [18]
    Borja Martinez, Marius Monton, Ignasi Vilajosana, and Joan Daniel Prades. 2015. The power of models: Modeling power consumption for IoT devices. IEEE Sensors Journal 15, 10 (2015), 5777–5789.
    [19]
    Karlen Mkrtchyan. [n. d.]. Learning SVM from Distributed, Non-Linearly Separable Datasets with Kernel Methods. International Journal of New Technology and Research 4, 8 ([n. d.]), 263015.
    [20]
    Sokratis Papadopoulos, Elie Azar, Wei-Lee Woon, and Constantine E Kontokosta. 2018. Evaluation of tree-based ensemble learning algorithms for building energy performance estimation. Journal of Building Performance Simulation 11, 3 (2018), 322–332.
    [21]
    A Parmisano, Sebastian Garcia, and MJ Erquiaga. 2020. A labeled dataset with malicious and benign iot network traffic. Stratosphere Laboratory: Praha, Czech Republic (2020).
    [22]
    J. Ross Quinlan. 1986. Induction of decision trees. Machine learning 1 (1986), 81–106.
    [23]
    Pau Rodríguez, Miguel A Bautista, Jordi Gonzalez, and Sergio Escalera. 2018. Beyond one-hot encoding: Lower dimensional target embedding. Image and Vision Computing 75 (2018), 21–31.
    [24]
    Bernhard Scholkopf and Alexander J Smola. 2018. Learning with kernels: support vector machines, regularization, optimization, and beyond. MIT press.
    [25]
    Nicolas-Alin Stoian. 2020. Machine learning for anomaly detection in iot networks: Malware analysis on the iot-23 data set. B.S. thesis. University of Twente.
    [26]
    Prabha PM Surya and B Subbulakshmi. 2019. Sentimental analysis using Naive Bayes classifier. In 2019 International conference on vision towards emerging trends in communication and networking (ViTECoN). IEEE, 1–5.
    [27]
    Bambang Susilo and Riri Fitri Sari. 2020. Intrusion detection in IoT networks using deep learning algorithm. Information 11, 5 (2020), 279.
    [28]
    Shan Suthaharan and Shan Suthaharan. 2016. Support vector machine. Machine learning models and algorithms for big data classification: thinking with examples for effective learning (2016), 207–235.
    [29]
    Richard Swinburne. 2004. Bayes’ theorem. Revue Philosophique de la France Et de l 194, 2 (2004).
    [30]
    Takeshi Takahashi and Tao Ban. 2019. Android application analysis using machine learning techniques. AI in Cybersecurity (2019), 181–205.
    [31]
    Ciprian-Octavian Truica and Catalin Adrian Leordeanu. 2017. Classification of an imbalanced data set using decision tree algorithms. Univ. Politech. Bucharest Sci. Bull. Ser. C Electr. Eng. Comput. Sci 79 (2017), 69–84.

    Index Terms

    1. A Machine Learning-Based Anomaly Packets Detection for Smart Home
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Information & Contributors

            Information

            Published In

            cover image ACM Other conferences
            SOICT '23: Proceedings of the 12th International Symposium on Information and Communication Technology
            December 2023
            1058 pages
            ISBN:9798400708916
            DOI:10.1145/3628797
            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            Published: 07 December 2023

            Permissions

            Request permissions for this article.

            Check for updates

            Author Tags

            1. Anomaly Detection
            2. Cybersecurity
            3. IoT-23 Dataset
            4. Machine Learning
            5. Smart Homes

            Qualifiers

            • Research-article
            • Research
            • Refereed limited

            Conference

            SOICT 2023

            Acceptance Rates

            Overall Acceptance Rate 147 of 318 submissions, 46%

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • 0
              Total Citations
            • 62
              Total Downloads
            • Downloads (Last 12 months)62
            • Downloads (Last 6 weeks)7
            Reflects downloads up to 27 Jul 2024

            Other Metrics

            Citations

            View Options

            Get Access

            Login options

            View options

            PDF

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format.

            HTML Format

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media