You are on page 1of 13

Machine Learning

Strategy to Classify
the Attack in Internet
of Thing(MLSIOT)

ASEM ALKHDOUR
IBRAHEEM ALAZZAM
ABD-ALHAKEEK OMAR
S U P E RV I S O R : D R . R A E D A L K H AT E E B
Content
• INTRODUCTION

•RELATED WORK
• METHODOLOGY
◦ Flowchart of overall work
◦ Data pre-processing
◦ Machine Learning Classifiers Model

• RESULT AND DISCUSSION


◦ Dataset collection
◦ EVALUATION CRITERIA

• CONCLUSIONS

• COMPARATIVE STUDY
• ACKNOWLEDGEMENTS

• REFERENCES
1- Introduction

 The Internet of Things (IoT), is a technological model that represents a network of


machines, devices, and sensors capable of interacting with each other.

 The Internet of Things has become an essential component of modern life.

 It is essential to take cyber security seriously to prevent cyber attacks.

 The aim of this research is to know the type of attack on the Internet of Things.
2- Related Work

Author algorithm Result


Hasan et al.(2019) Several machine learning RF performs better with the
Title lorem algorithms :
LR,SVM,DT,RF,ANN
accuracy of 99.4% .

Ipsum
Pajouh et al. (2018) A Two-layer Dimension Detection rate =84.82%
Reduction and Two-tier
Classification Model(TDTC):
NB,KNN
Diro et al. (2018) Deep learning: Accuracy=98.27%
Neural network
Liu et al. ( 2018) TLPD(Trust-joint Light Probe- Identification rate of malicious
based Defense) node ≥80%
3- Proposed Methodology

1 - Data Pre-processing
The data was cleaned of nulls and values, and the text
values were converted to numerical values to ensure
the quality of the work.

2- Machine Learning Classifiers Model

The classifier aims to distinguish between normal


classes and attacked classes.
Cont.

Dataset visualization process:


algorithms applied for machine learning
modules (ML)
1. Artificial Neural Network (ANN)

2. Logistic Regression (LR)

3. Random Forest (RF)

4. Supporting Vector Machine (SVM)

5. Decision Tree (DT)

6. Naive Bayes (NB)

7. K-Nearest Neighbor (KNN)


Result & Discussion

 Dataset collection :
datasets the open-source data were collected in the paper contains traces captured in the DS20S
Internet of Things environment to evaluate the anomaly detection algorithms
“mainSimulationAccessTraces.csv “
Cont.

EVALUATION CRITERIA
Confusion matrix :
we used four metrics to evaluate the classifiers and see what works best , and A confusion matrix is a summary of prediction results on a classification
problem to visualize the performance of a technique.
COMPARATIVE STUDY
5- Conclusion

 In this paper seven machine learning technique are compared in term of accuracy, f1 score,
recall and precision on IoT dataset.

 It was discovered that the best technique to use in this kind of dataset for discovering
cyberattacks on IoT was KNN followed by DT and RF, compared to other technique for this
dataset study.

 In this paper KNN performs better with recall of 100%, accuracy of 99%, f1 score of 98%
and precision of 96%. DT and RF perform better with a tiny different from KNN.

 Future work maybe include applying other machine learning technique such as deep learning
(DL).
6- References
1- Hasan, M., Islam, M. M., Zarif, M. I. I., & Hashem, M. M. A. (2019). Attack and anomaly detection in
IoT sensors in IoT sites using machine learning approaches. Internet of Things, 7, 100059.

2- Pajouh, H. H., Javidan, R., Khayami, R., Dehghantanha, A., & Choo, K. K. R. (2016). A two-layer
Title lorem
dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT

Ipsum
backbone networks. IEEE Transactions on Emerging Topics in Computing, 7(2), 314-323.

3- Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach
for Internet of Things. Future Generation Computer Systems, 82, 761-768.K. Elissa,

4- Liu, X., Liu, Y., Liu, A., & Yang, L. T. (2018). Defending ON–OFF attacks using light probing messages
in smart sensors for industrial communication systems. IEEE Transactions on Industrial Informatics, 14(9),
3801-3811.
“Thank You”

You might also like