4.7 Article

Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city

Publisher

ELSEVIER
DOI: 10.1016/j.future.2020.02.017

Keywords

Selection; Machine learning; Bot-IoT attacks; Identification; IoT; Smart city

Funding

  1. National Key research and Development Plan [2018YFB0803504]
  2. Guangdong Province Key Research and Development Plan [2019B010137004]
  3. National Natural Science Foundation of China [61871140]
  4. Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme

Ask authors/readers for more resources

Identifying cyber attacks traffic is very important for the Internet of things (IoT) security in smart city. Recently, the research community in the field of IoT Security endeavor hard to build anomaly, intrusion and cyber attacks traffic identification model using Machine Learning (ML) algorithms for IoT security analysis. However, the critical and significant problem still not studied in depth that is how to select an effective ML algorithm when there are numbers of ML algorithms for cyber attacks detection system for IoT security. In this paper, we proposed a new framework model and a hybrid algorithm to solve this problem. Firstly BoT-IoT identification dataset is applied and its 44 effective features are selected from a number of features for the machine learning algorithm. Then five effective machine learning algorithm is selected for the identification of malicious and anomaly traffic identification and also select the most widely ML algorithm performance evaluation metrics. To find out which ML algorithm is effective and should be used to select for IoT anomaly and intrusion traffic identification, a bijective soft set approach and its algorithm is applied. Then we applied the proposed algorithm based on bijective soft set approach. Our experimental results show that the proposed model with the algorithm is effective for the selection ML algorithm out of numbers of ML algorithms. (C) 2020 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available