AN EFFICIENT MACHINE LEARNING-BASED DETECTION AND PREDICTION MECHANISM FOR CYBER THREATS USING INTELLIGENT FRAMEWORK IN IOTS

Authors:

Sadia Saif,Hamayun Khan,Arshad Ali,Sami Albouq,Muhammad Zunnurain Hussain,Muhammad Zulkifl Hasan,Irfan Uddin,Shahab Khan,Mohammad Husain,

DOI NO:

https://doi.org/10.26782/jmcms.2024.08.00014

Keywords:

NSL-KDD dataset distribution,IoT Security,Fog Computing,Deep Learning,Random Forest (RF) machine learning,

Abstract

The dangers that Internet of Things (IoT) devices pose to large corporate corporations and smart districts have been dissected by several academics. Given the ubiquitous use of IoT and its unique characteristics, such as mobility and normalization restrictions, intelligent frameworks that can independently detect suspicious activity in privately linked IoT devices are crucial. The IoTs have led an explosion in traffic through the network, bringing information processing techniques for attack detection. The increase in traffic poses challenges in detecting attacks and differentiating traffic that is harmful. In this work, we have proposed a mechanism that uses the standard algorithms in a system that is designed to detect, track, measure and identify online traffic from organizations with malignant transmission: Random Forest (RF), gradient-boosted decision trees (GBDT), and support vector machines (SVM) gives an optimal accuracy of 80.34%,87.5%, and 88.6% while the random forest-based supervised approach is 5.5% better than the previous techniques. To facilitate comparisons between training time, prediction time, specificity, and accuracy, the proposed approach leverages the NSL KDD dataset accuracy.

Refference:

I. Asish Mitra, Numerical Simulation Of Laminar Convection Flow And Heat Transfer At The Lower Stagnation Point Of A Solid Sphere., J. Mech. Cont.& Math. Sci., Vol.10, No.1, Pp 1469-1480, 2015.
II. A. Belabed, E. Aïmeur And A. Chikh, “A Personalized Whitelist Approach For Phishing Webpage Detection”, 2012 Seventh International Conference On Availability, Reliability And Security, Prague, Pp. 249-254, 2012.
III. A. Naz, H. Khan, I. U. Din, A. Ali, M. Husain, “An Efficient Optimization System for Early Breast Cancer Diagnosis based on Internet of Medical Things and Deep Learning”, Engineering, Technology & Applied Science Research, Vol.14, No.4, pp. 15957-15962, 2024.
IV. Hassan, H. Khan, I. Uddin, A. Sajid, “Optimal Emerging trends of Deep Learning Technique for Detection based on Convolutional Neural Network”, Bulletin of Business and Economics (BBE), Vol.12, No.4, pp. 264-273, 2023.
V. H. Khan, A. Ali, S. Alshmrany, “Energy-Efficient Scheduling Based on Task Migration Policy Using DPM for Homogeneous MPSoCs”, Computers, Materials & Continua, Vol.74, No.1, pp. 965-981, 2023.
VI. H. Sarwar, H. Khan, I. Uddin, R. Waleed, S. Tariq, “An Efficient E-Commerce Web Platform Based on Deep Integration of MEAN Stack Technologies”, Bulletin of Business and Economics (BBE), Vol. 12, No.4, pp. 447-453, 2023.
VII. Hammad. A , E. Zhao, “Mitigating link insecurities in smart grids via QoS multi-constraint routing“, In 2016 IEEE International Conference on Communications Workshops (ICC)”, pp. 380-386. 2016.
VIII. H. Khan, I. Uddin, A. Ali, M. Husain, “An Optimal DPM Based Energy-Aware Task Scheduling for Performance Enhancement in Embedded MPSoC” Computers, Materials & Continua, Vol.74, No.1, pp. 2097-2113, 2023.
IX. Hammad, A. A., Ahmed, “Deep Reinforcement Learning for Adaptive Cyber Defense in Network Security”, In Proceedings of the Cognitive Models and Artificial Intelligence Conference, pp. 292-297, 2016.
X. H. Khan, M. U. Hashmi, Z. Khan, R. Ahmad, “Offline Earliest Deadline first Scheduling based Technique for Optimization of Energy using STORM in Homogeneous Multi-core Systems,” IJCSNS Int. J. Comput. Sci. Netw. Secur, Vol.18, No.12, pp 125-130, 2018.
XI. Hossein Shirazi, Bruhadeshwar. B,”Kn0w Thy Doma1n Name”: Unbiased Phishing Detection Using Domain Name Based Features. In Proceedings Of The 23nd Acm On Symposium On Access Control Models And Technologies (Sacmat ’18). Association For Computing Machinery, New York, Ny, Usa, pp. 69-75, 2018.
XII. Hussain, S., Rajput, U. A., Kazi, Q. A., & Mastoi, S, “Numerical investigation of thermohydraulic performance of triple concentric-tube heat exchanger with longitudinal fins”, J. Mech. Cont. & Math. Sci, Vol. 16, No. 8, pp 61-73, 2021.
XIII. H. Khan, S. Ahmad, N. Saleem, M. U. Hashmi, Q. Bashir, “Scheduling Based Dynamic Power Management Technique for offline Optimization of Energy in Multi Core Processors” Int. J. Sci. Eng. Res, Vol.9, No.12, pp 6-10, 2018.
XIV. H. Khan, K. Janjua, A. Sikandar, M. W. Qazi, Z. Hameed, “An Efficient Scheduling based cloud computing technique using virtual Machine Resource Allocation for efficient resource utilization of Servers” In 2020 International Conference on Engineering and Emerging Technologies (ICEET), IEEE, pp 1-7, 2020.
XV. Hammad, M., Jillani, R. M., Ullah, S., Namoun, A., Tufail, A., Kim, K. H., & Shah, H, “Security framework for network-based manufacturing systems with personalized customization”, An industry 4.0 approach, Sensors, vol. 23. No. 17-55, 2022.
XVI. H. Khan, Q. Bashir, M. U. Hashmi, “Scheduling based energy optimization technique in multiprocessor embedded systems” In 2018 International Conference on Engineering and Emerging Technologies (ICEET), IEEE, pp 1-8, 2018.
XVII. H. Khan, A. Yasmeen, S. Jan, U. Hashmi, “Enhanced Resource Leveling Indynamic Power Management Techniqueof Improvement In Performance For Multi-Core Processors”, Journal Of Mechanics Of Continua And Mathematical Sciences, Vol.6, No.14, pp. 956-972, 2019.
XVIII. H. Khan, K. Janjua, A. Sikandar, M. W. Qazi, Z. Hameed, “An Efficient Scheduling based cloud computing technique using virtual Machine Resource Allocation for efficient resource utilization of Servers” In 2020 International Conference on Engineering and Emerging Technologies (ICEET), IEEE, pp 1-7, 2020.
XIX. H. Huang, J. Tan And L. Liu, “Countermeasure Techniques For Deceptive Phishing Attack”, International Conference On New Trends In Information And Service Science, Beijing, pp. 636-641, 2009.
XX. H. Khan, M. U. Hashmi, Z. Khan, R. Ahmad, “Offline Earliest Deadline first Scheduling based Technique for Optimization of Energy using STORM in Homogeneous Multi-core Systems” IJCSNS Int. J. Comput. Sci. Netw. Secur, Vol.18, No.12, pp 125-130, 2018.
XXI. H. Khan, M. U. Hashmi, Z. Khan, R. Ahmad, A. Saleem, “Performance Evaluation for Secure DES-Algorithm Based Authentication & Counter Measures for Internet Mobile Host Protocol” IJCSNS Int. J. Comput. Sci. Netw. Secur, Vol.18, No.12, pp 181-185, 2018.
XXII. J. Chen; J. Tan, C. Chang, F. Feng, “A New Cost-Aware Sensitivity-Driven Algorithm for the Design of FIR Filters”, IEEE Transactions on Circuits and Systems I, Vol. 64, No. 6 pp: 1588 – 1598, 2017.
XXIII. M. Y. A. Khan, F. Khan, H. Khan, S. Ahmed, M. Ahmad, “Design and Analysis of Maximum Power Point Tracking (MPPT) Controller for PV System” Journal of Mechanics of Continua and Mathematical Sciences, Vol.14, No.1, pp 276-288, 2019.
XXIV. M. Y. A. Khan, “A GSM based Resource Allocation technique to control Autonomous Robotic Glove for Spinal Cord Implant paralysed Patients using Flex Sensors”, Sukkur IBA Journal of Emerging Technologies, Vol.3, No.2, pp 13-23, 2020.
XXV. M. Y. A. Khan, “A high state of modular transistor on a 105 kW HVPS for X-rays tomography Applications”, Sukkur IBA Journal of Emerging Technologies, Vol.2, No.2, pp 1-6, 2019.
XXVI. M. Shah, S. Ahmed, K. Saeed, M. Junaid, H. Khan, “Penetration testing active reconnaissance phase–optimized port scanning with nmap tool” In 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), IEEE, pp 1-6, 2019.
XXVII. M. Y. A. Khan, M. Ibrahim, M. Ali, H. Khan, E. Mustafa, “Cost Benefit Based Analytical Study of Automatic Meter Reading (AMR) and Blind Meter Reading (BMR) used by PESCO (WAPDA),” In 2020 3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), IEEE, pp 1-7, 2020.
XXVIII. M. Y. A. Khan, “Enhancing Energy Efficiency in Temperature Controlled Dynamic Scheduling Technique for Multi Processing System on Chip” Sukkur IBA Journal of Emerging Technologies, Vol.2, No.2, pp 46-53,2019.
XXIX. M. U. Hashmi, S. A. ZeeshanNajam, “Thermal-Aware Real-Time Task Schedulabilty test for Energy and Power System Optimization using Homogeneous Cache Hierarchy of Multi-core Systems” Journal of Mechanics of Continua and Mathematical Sciences, Vol.14, No.4, pp 442-452, 2023.
XXX. M. Y. A. Khan, U. Khalil, H. Khan, A. Uddin, S. Ahmed, “Power flow control by unified power flow controller” Engineering, Technology & Applied Science Research, Vol.9, No.2, pp 3900-3904, 2019.
XXXI. R. Waleed, A. Ali, S. Tariq, G. Mustafa, H. Sarwar, S. Saif, I. Uddin, “An Efficient Artificial Intelligence (AI) and Internet of Things (IoT’s) Based MEAN Stack Technology Applications” Bulletin of Business and Economics (BBE), Vol.13, No.2, pp 200-206, 2024.
XXXII. S. Khan, I. Ullah, M. U. Rahman, H. Khan, A. B. Shah, R. H. Althomali, M. M. Rahman, “Inorganic-polymer composite electrolytes: basics, fabrications, challenges and future perspectives” Reviews in Inorganic Chemistry, Vol.44, No.3, pp 1-29, 2024.
XXXIII. S. Khan, I. Ullah, H. Khan, F. U. Rahman, M. U. Rahman, M. A. Saleem, A. Ullah, “Green synthesis of AgNPs from leaves extract of Salvia Sclarea their characterization, antibacterial activity and catalytic reduction ability” Zeitschrift für Physikalische Chemie, Vol.238, No.5, pp 931-947, 2024.
XXXIV. T. M. Gondal, Z. Hameed, M. U. Shah, H. Khan, “Cavitation phenomenon and its effects in Francis turbines and amassed adeptness of hydel power plant” In 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), IEEE, pp 1-9, 2019.

View Download