4.8 Article

CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 8, 期 5, 页码 3242-3254

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.3002255

关键词

Feature extraction; Internet of Things; Machine learning; Measurement; Computer security; Computational modeling; Attacks; detection; identification; Internet of Things (IoT); intrusion; machine learning (ML); malicious

资金

  1. National Key research and Development Plan [2018YFB0803504]
  2. Guangdong Province Key Research and Development Plan [2019B010137004]
  3. National Natural Science Foundation of China [61871140]
  4. Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme

向作者/读者索取更多资源

Researchers have proposed a new feature selection method and algorithm to accurately detect malicious traffic in IoT networks. By integrating TOPSIS and Shannon entropy methods to validate the selected features for malicious traffic identification in IoT networks, the experimental results have shown that this method is efficient and can achieve over 96% accuracy on average.
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT network. For this purpose, numerous machine-learning (ML) technique models are presented by many researchers to block malicious traffic flows in the IoT network. However, due to the inappropriate feature selection, several ML models prone misclassify mostly malicious traffic flows. Nevertheless, the significant problem still needs to be studied more in-depth that is how to select effective features for accurate malicious traffic detection in the IoT network. To address the problem, a new framework model is proposed. First, a novel feature selection metric approach named CorrAUC is proposed, and then based on CorrAUC, a new feature selection algorithm named CorrAUC is developed and designed, which is based on the wrapper technique to filter the features accurately and select effective features for the selected ML algorithm by using the area under the curve (AUC) metric. Then, we applied the integrated TOPSIS and Shannon entropy based on a bijective soft set to validate selected features for malicious traffic identification in the IoT network. We evaluate our proposed approach by using the Bot-IoT data set and four different ML algorithms. The experimental results analysis showed that our proposed method is efficient and can achieve >96% results on average.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据