Next Article in Journal
Cross-Domain Transfer Learning Prediction of COVID-19 Popular Topics Based on Knowledge Graph
Next Article in Special Issue
Future Wireless Networking Experiments Escaping Simulations
Previous Article in Journal
Performance Analysis of DF Relay-Assisted D2D Communication in a 5G mmWave Network
Article

Detecting IoT Attacks Using an Ensemble Machine Learning Model

by 1 and 2,*
1
Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun 248002, India
2
School of Electrical and Electronic Engineering, Technological University Dublin, D07 EWV4 Dublin, Ireland
*
Author to whom correspondence should be addressed.
Academic Editor: Paolo Bellavista
Future Internet 2022, 14(4), 102; https://doi.org/10.3390/fi14040102
Received: 21 February 2022 / Revised: 17 March 2022 / Accepted: 22 March 2022 / Published: 24 March 2022
Malicious attacks are becoming more prevalent due to the growing use of Internet of Things (IoT) devices in homes, offices, transportation, healthcare, and other locations. By incorporating fog computing into IoT, attacks can be detected in a short amount of time, as the distance between IoT devices and fog devices is smaller than the distance between IoT devices and the cloud. Machine learning is frequently used for the detection of attacks due to the huge amount of data available from IoT devices. However, the problem is that fog devices may not have enough resources, such as processing power and memory, to detect attacks in a timely manner. This paper proposes an approach to offload the machine learning model selection task to the cloud and the real-time prediction task to the fog nodes. Using the proposed method, based on historical data, an ensemble machine learning model is built in the cloud, followed by the real-time detection of attacks on fog nodes. The proposed approach is tested using the NSL-KDD dataset. The results show the effectiveness of the proposed approach in terms of several performance measures, such as execution time, precision, recall, accuracy, and ROC (receiver operating characteristic) curve. View Full-Text
Keywords: Internet of Things (IoT); machine learning; cybersecurity; DDoS Internet of Things (IoT); machine learning; cybersecurity; DDoS
Show Figures

Figure 1

MDPI and ACS Style

Tomer, V.; Sharma, S. Detecting IoT Attacks Using an Ensemble Machine Learning Model. Future Internet 2022, 14, 102. https://doi.org/10.3390/fi14040102

AMA Style

Tomer V, Sharma S. Detecting IoT Attacks Using an Ensemble Machine Learning Model. Future Internet. 2022; 14(4):102. https://doi.org/10.3390/fi14040102

Chicago/Turabian Style

Tomer, Vikas, and Sachin Sharma. 2022. "Detecting IoT Attacks Using an Ensemble Machine Learning Model" Future Internet 14, no. 4: 102. https://doi.org/10.3390/fi14040102

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop