Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city
Author | Shafiq, Muhammad |
Author | Tian, Zhihong |
Author | Sun, Yanbin |
Author | Du, Xiaojiang |
Author | Guizani, Mohsen |
Available date | 2022-12-07T11:38:24Z |
Publication Date | 2020-06-01 |
Publication Name | Future Generation Computer Systems |
Identifier | http://dx.doi.org/10.1016/j.future.2020.02.017 |
Citation | Shafiq, M., Tian, Z., Sun, Y., Du, X., & Guizani, M. (2020). Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city. Future Generation Computer Systems, 107, 433-442. |
ISSN | 0167739X |
Abstract | Identifying cyber attacks traffic is very important for the Internet of things (IoT) security in smart city. Recently, the research community in the field of IoT Security endeavor hard to build anomaly, intrusion and cyber attacks traffic identification model using Machine Learning (ML) algorithms for IoT security analysis. However, the critical and significant problem still not studied in depth that is how to select an effective ML algorithm when there are numbers of ML algorithms for cyber attacks detection system for IoT security. In this paper, we proposed a new framework model and a hybrid algorithm to solve this problem. Firstly BoT-IoT identification dataset is applied and its 44 effective features are selected from a number of features for the machine learning algorithm. Then five effective machine learning algorithm is selected for the identification of malicious and anomaly traffic identification and also select the most widely ML algorithm performance evaluation metrics. To find out which ML algorithm is effective and should be used to select for IoT anomaly and intrusion traffic identification, a bijective soft set approach and its algorithm is applied. Then we applied the proposed algorithm based on bijective soft set approach. Our experimental results show that the proposed model with the algorithm is effective for the selection ML algorithm out of numbers of ML algorithms. |
Sponsor | This work is supported by the National Key research and Development Plan (Grant No. 2018YFB0803504), the Guangdong Province Key Research and Development Plan (Grant No.2019B010137004) and the National Natural Science Foundation of China under Grant No. 61871140, and Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme (2019). |
Language | en |
Publisher | Elsevier B.V. |
Subject | Bot-IoT attacks Identification IoT Machine learning Selection Smart city |
Type | Article |
Pagination | 433-442 |
Volume Number | 107 |
Check access options
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |
This item appears in the following Collection(s)
-
Computer Science & Engineering [2402 items ]