Professional Documents
Culture Documents
Strategy to Classify
the Attack in Internet
of Thing(MLSIOT)
ASEM ALKHDOUR
IBRAHEEM ALAZZAM
ABD-ALHAKEEK OMAR
S U P E RV I S O R : D R . R A E D A L K H AT E E B
Content
• INTRODUCTION
•RELATED WORK
• METHODOLOGY
◦ Flowchart of overall work
◦ Data pre-processing
◦ Machine Learning Classifiers Model
• CONCLUSIONS
• COMPARATIVE STUDY
• ACKNOWLEDGEMENTS
• REFERENCES
1- Introduction
The aim of this research is to know the type of attack on the Internet of Things.
2- Related Work
Ipsum
Pajouh et al. (2018) A Two-layer Dimension Detection rate =84.82%
Reduction and Two-tier
Classification Model(TDTC):
NB,KNN
Diro et al. (2018) Deep learning: Accuracy=98.27%
Neural network
Liu et al. ( 2018) TLPD(Trust-joint Light Probe- Identification rate of malicious
based Defense) node ≥80%
3- Proposed Methodology
1 - Data Pre-processing
The data was cleaned of nulls and values, and the text
values were converted to numerical values to ensure
the quality of the work.
Dataset collection :
datasets the open-source data were collected in the paper contains traces captured in the DS20S
Internet of Things environment to evaluate the anomaly detection algorithms
“mainSimulationAccessTraces.csv “
Cont.
EVALUATION CRITERIA
Confusion matrix :
we used four metrics to evaluate the classifiers and see what works best , and A confusion matrix is a summary of prediction results on a classification
problem to visualize the performance of a technique.
COMPARATIVE STUDY
5- Conclusion
In this paper seven machine learning technique are compared in term of accuracy, f1 score,
recall and precision on IoT dataset.
It was discovered that the best technique to use in this kind of dataset for discovering
cyberattacks on IoT was KNN followed by DT and RF, compared to other technique for this
dataset study.
In this paper KNN performs better with recall of 100%, accuracy of 99%, f1 score of 98%
and precision of 96%. DT and RF perform better with a tiny different from KNN.
Future work maybe include applying other machine learning technique such as deep learning
(DL).
6- References
1- Hasan, M., Islam, M. M., Zarif, M. I. I., & Hashem, M. M. A. (2019). Attack and anomaly detection in
IoT sensors in IoT sites using machine learning approaches. Internet of Things, 7, 100059.
2- Pajouh, H. H., Javidan, R., Khayami, R., Dehghantanha, A., & Choo, K. K. R. (2016). A two-layer
Title lorem
dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT
Ipsum
backbone networks. IEEE Transactions on Emerging Topics in Computing, 7(2), 314-323.
3- Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach
for Internet of Things. Future Generation Computer Systems, 82, 761-768.K. Elissa,
4- Liu, X., Liu, Y., Liu, A., & Yang, L. T. (2018). Defending ON–OFF attacks using light probing messages
in smart sensors for industrial communication systems. IEEE Transactions on Industrial Informatics, 14(9),
3801-3811.
“Thank You”