AN EFFICIENT MACHINE LEARNING-BASED DETECTION AND PREDICTION MECHANISM FOR CYBER THREATS USING INTELLIGENT FRAMEWORK IN IOTS

Authors:

Sadia Saif,Hamayun Khan,Arshad Ali,Sami Albouq,Muhammad Zunnurain Hussain,Muhammad Zulkifl Hasan,Irfan Uddin,Shahab Khan,Mohammad Husain,

DOI NO:

https://doi.org/10.26782/jmcms.2024.00.00014

Keywords:

NSL-KDD dataset distribution,IoT Security,Fog Computing,Deep Learning,Random Forest (RF) machine learning,

Abstract

The dangers that Internet of Things (IoT) devices pose to large corporate corporations and smart districts have been dissected by several academics. Given the ubiquitous use of IoT and its unique characteristics, such as mobility and normalization restrictions, intelligent frameworks that can independently detect suspicious activity in privately linked IoT devices are crucial. The IoTs have led an explosion in traffic through the network, bringing information processing techniques for attack detection. The increase in traffic poses challenges in detecting attacks and differentiating traffic that is harmful. In this work, we have proposed a mechanism that uses the standard algorithms in a system that is designed to detect, track, measure and identify online traffic from organizations with malignant transmission: Random Forest (RF), gradient-boosted decision trees (GBDT), and support vector machines (SVM) gives an optimal accuracy of 80.34%,87.5%, and 88.6% while the random forest-based supervised approach is 5.5% better than the previous techniques. To facilitate comparisons between training time, prediction time, specificity, and accuracy, the proposed approach leverages the NSL KDD dataset accuracy.

Refference:

I. Asish Mitra, Numerical Simulation Of Laminar Convection Flow And Heat Transfer At The Lower Stagnation Point Of A Solid Sphere., J. Mech. Cont.& Math. Sci., Vol.10, No.1, Pp 1469-1480, 2015
II. A. Belabed, E. Aïmeur And A. Chikh, “A Personalized Whitelist Approach For Phishing Webpage Detection”, 2012 Seventh International Conference On Availability, Reliability And Security, Prague, Pp. 249-254, 2012
III. A. Naz, H. Khan, I. U. Din, A. Ali, M. Husain, “An Efficient Optimization System for Early Breast Cancer Diagnosis based on Internet of Medical Things and Deep Learning”, Engineering, Technology & Applied Science Research, Vol.14, No.4, pp. 15957-15962, 2024
IV. Hassan, H. Khan, I. Uddin, A. Sajid, “Optimal Emerging trends of Deep Learning Technique for Detection based on Convolutional Neural Network”, Bulletin of Business and Economics (BBE), Vol.12, No.4, pp. 264-273, 2023
V. H. Khan, A. Ali, S. Alshmrany, “Energy-Efficient Scheduling Based on Task Migration Policy Using DPM for Homogeneous MPSoCs”, Computers, Materials & Continua, Vol.74, No.1, pp. 965-981, 2023
VI. H. Sarwar, H. Khan, I. Uddin, R. Waleed, S. Tariq, “An Efficient E-Commerce Web Platform Based on Deep Integration of MEAN Stack Technologies”, Bulletin of Business and Economics (BBE), Vol. 12, No.4, pp. 447-453, 2023
VII. Hammad. A , E. Zhao, “Mitigating link insecurities in smart grids via QoS multi-constraint routing“, In 2016 IEEE International Conference on Communications Workshops (ICC)”, pp. 380-386. 2016
VIII. H. Khan, I. Uddin, A. Ali, M. Husain, “An Optimal DPM Based Energy-Aware Task Scheduling for Performance Enhancement in Embedded MPSoC” Computers, Materials & Continua, Vol.74, No.1, pp. 2097-2113, 2023
IX. Hammad, A. A., Ahmed, “Deep Reinforcement Learning for Adaptive Cyber Defense in Network Security”, In Proceedings of the Cognitive Models and Artificial Intelligence Conference, pp. 292-297, 2016
X. H. Khan, M. U. Hashmi, Z. Khan, R. Ahmad, “Offline Earliest Deadline first Scheduling based Technique for Optimization of Energy using STORM in Homogeneous Multi-core Systems,” IJCSNS Int. J. Comput. Sci. Netw. Secur, Vol.18, No.12, pp 125-130, 2018
XI. Hossein Shirazi, Bruhadeshwar. B,”Kn0w Thy Doma1n Name”: Unbiased Phishing Detection Using Domain Name Based Features. In Proceedings Of The 23nd Acm On Symposium On Access Control Models And Technologies (Sacmat ’18). Association For Computing Machinery, New York, Ny, Usa, pp. 69-75, 2018
XII. Hussain, S., Rajput, U. A., Kazi, Q. A., & Mastoi, S, “Numerical investigation of thermohydraulic performance of triple concentric-tube heat exchanger with longitudinal fins”, J. Mech. Cont. & Math. Sci, Vol. 16, No. 8, pp 61-73, 2021.
XIII. H. Khan, S. Ahmad, N. Saleem, M. U. Hashmi, Q. Bashir, “Scheduling Based Dynamic Power Management Technique for offline Optimization of Energy in Multi Core Processors” Int. J. Sci. Eng. Res, Vol.9, No.12, pp 6-10, 2018
XIV. H. Khan, K. Janjua, A. Sikandar, M. W. Qazi, Z. Hameed, “An Efficient Scheduling based cloud computing technique using virtual Machine Resource Allocation for efficient resource utilization of Servers” In 2020 International Conference on Engineering and Emerging Technologies (ICEET), IEEE, pp 1-7, 2020
XV. Hammad, M., Jillani, R. M., Ullah, S., Namoun, A., Tufail, A., Kim, K. H., & Shah, H, “Security framework for network-based manufacturing systems with personalized customization”, An industry 4.0 approach, Sensors, vol. 23. No. 17-55, 2022
XVI. H. Khan, Q. Bashir, M. U. Hashmi, “Scheduling based energy optimization technique in multiprocessor embedded systems” In 2018 International Conference on Engineering and Emerging Technologies (ICEET), IEEE, pp 1-8, 2018
XVII. H. Khan, A. Yasmeen, S. Jan, U. Hashmi, “Enhanced Resource Leveling Indynamic Power Management Techniqueof Improvement In Performance For Multi-Core Processors”, Journal Of Mechanics Of Continua And Mathematical Sciences, Vol.6, No.14, pp. 956-972, 2019

XVIII. H. Khan, K. Janjua, A. Sikandar, M. W. Qazi, Z. Hameed, “An Efficient Scheduling based cloud computing technique using virtual Machine Resource Allocation for efficient resource utilization of Servers” In 2020 International Conference on Engineering and Emerging Technologies (ICEET), IEEE, pp 1-7, 2020
XIX. H. Huang, J. Tan And L. Liu, “Countermeasure Techniques For Deceptive Phishing Attack”, International Conference On New Trends In Information And Service Science, Beijing, pp. 636-641, 2009
XX. H. Khan, M. U. Hashmi, Z. Khan, R. Ahmad, “Offline Earliest Deadline first Scheduling based Technique for Optimization of Energy using STORM in Homogeneous Multi-core Systems” IJCSNS Int. J. Comput. Sci. Netw. Secur, Vol.18, No.12, pp 125-130, 2018
XXI. H. Khan, M. U. Hashmi, Z. Khan, R. Ahmad, A. Saleem, “Performance Evaluation for Secure DES-Algorithm Based Authentication & Counter Measures for Internet Mobile Host Protocol” IJCSNS Int. J. Comput. Sci. Netw. Secur, Vol.18, No.12, pp 181-185, 2018
XXII. J. Chen; J. Tan, C. Chang, F. Feng, “A New Cost-Aware Sensitivity-Driven Algorithm for the Design of FIR Filters”, IEEE Transactions on Circuits and Systems I, Vol. 64, No. 6 pp: 1588 – 1598, 2017

XXIII. M. Y. A. Khan, F. Khan, H. Khan, S. Ahmed, M. Ahmad, “Design and Analysis of Maximum Power Point Tracking (MPPT) Controller for PV System” Journal of Mechanics of Continua and Mathematical Sciences, Vol.14, No.1, pp 276-288, 2019
XXIV. M. Y. A. Khan, “A GSM based Resource Allocation technique to control Autonomous Robotic Glove for Spinal Cord Implant paralysed Patients using Flex Sensors”, Sukkur IBA Journal of Emerging Technologies, Vol.3, No.2, pp 13-23, 2020
XXV. M. Y. A. Khan, “A high state of modular transistor on a 105 kW HVPS for X-rays tomography Applications”, Sukkur IBA Journal of Emerging Technologies, Vol.2, No.2, pp 1-6, 2019
XXVI. M. Shah, S. Ahmed, K. Saeed, M. Junaid, H. Khan, “Penetration testing active reconnaissance phase–optimized port scanning with nmap tool” In 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), IEEE, pp 1-6, 2019
XXVII. M. Y. A. Khan, M. Ibrahim, M. Ali, H. Khan, E. Mustafa, “Cost Benefit Based Analytical Study of Automatic Meter Reading (AMR) and Blind Meter Reading (BMR) used by PESCO (WAPDA),” In 2020 3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), IEEE, pp 1-7, 2020
XXVIII. M. Y. A. Khan, “Enhancing Energy Efficiency in Temperature Controlled Dynamic Scheduling Technique for Multi Processing System on Chip” Sukkur IBA Journal of Emerging Technologies, Vol.2, No.2, pp 46-53,2019
XXIX. M. U. Hashmi, S. A. ZeeshanNajam, “Thermal-Aware Real-Time Task Schedulabilty test for Energy and Power System Optimization using Homogeneous Cache Hierarchy of Multi-core Systems” Journal of Mechanics of Continua and Mathematical Sciences, Vol.14, No.4, pp 442-452, 2023
XXX. M. Y. A. Khan, U. Khalil, H. Khan, A. Uddin, S. Ahmed, “Power flow control by unified power flow controller” Engineering, Technology & Applied Science Research, Vol.9, No.2, pp 3900-3904, 2019
XXXI. R. Waleed, A. Ali, S. Tariq, G. Mustafa, H. Sarwar, S. Saif, I. Uddin, “An Efficient Artificial Intelligence (AI) and Internet of Things (IoT’s) Based MEAN Stack Technology Applications” Bulletin of Business and Economics (BBE), Vol.13, No.2, pp 200-206, 2024
XXXII. S. Khan, I. Ullah, M. U. Rahman, H. Khan, A. B. Shah, R. H. Althomali, M. M. Rahman, “Inorganic-polymer composite electrolytes: basics, fabrications, challenges and future perspectives” Reviews in Inorganic Chemistry, Vol.44, No.3, pp 1-29, 2024.
XXXIII. S. Khan, I. Ullah, H. Khan, F. U. Rahman, M. U. Rahman, M. A. Saleem, A. Ullah, “Green synthesis of AgNPs from leaves extract of Salvia Sclarea their characterization, antibacterial activity and catalytic reduction ability” Zeitschrift für Physikalische Chemie, Vol.238, No.5, pp 931-947, 2024
XXXIV. T. M. Gondal, Z. Hameed, M. U. Shah, H. Khan, “Cavitation phenomenon and its effects in Francis turbines and amassed adeptness of hydel power plant” In 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), IEEE, pp 1-9, 2019

View Download