An Efficient Spam Detection Technique For IoT Devices Using Machine Learning
An Efficient Spam Detection Technique For IoT Devices Using Machine Learning
https://doi.org/10.22214/ijraset.2022.45132
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VIII Aug 2022- Available at www.ijraset.com
Abstract: The Internet of Things (IoT) is a group of millions of devices having sensors and actuators linked over wired or
wireless channel for data transmission. The volume of data released from these devices will increase many-fold in the years to
come. In such an environment, machine learning algorithms can play an important role in ensuring security and authorization
based on biotechnology, anomalous detection to improve the usability and security of IoT systems. On the other hand, attackers
often view learning algorithms to exploit the vulnerabilities in smart IoT-based systems. Motivated from these, in this project, we
propose the security of the IoT devices by detecting spam using machine learning. In this framework, five machine learning
models are evaluated using various metrics with a large collection of inputs features sets. Each model computes a spam score by
considering the refined input features. This score depicts the trustworthiness of IoT device under various parameters. The results
obtained proves the effectiveness of the proposed scheme in comparison to the other existing schemes.
I. INTRODUCTION
A. Purpose
The main purpose of this project is to present a thorough and complete assessment of current research on detecting review spam
using various machine learning approaches, as well as to develop methodology for further exploration.
Internet of Things (IoT) enables convergence and implementations between the real-world objects irrespective of their geographical
locations. IoT applications need to protect data privacy to fix security issues such as intrusions, spoofing attacks, DoS attacks, DoS
attacks, jamming, eavesdropping, spam, and malware.
B. Scope
The main purpose of this project is to present a thorough and complete assessment of current research on detecting review spam
using various machine learning approaches, as well as to develop methodology for further exploration. Internet of Things (IoT)
enables convergence and implementations between the real-world objects irrespective of their geographical locations.
Implementation of such network management and control make privacy and protection strategies utmost important and challenging
in such an environment. IoT applications need to protect data privacy to fix security issues such as intrusions, spoofing attacks, DoS
attacks, DoS attacks, jamming, eavesdropping, spam, and malware. For example, wearable devices collect and send user’s health
data to a connected smartphone should prevent leakage of information to ensure privacy. It has been found in the market that 25-
30% of working employees connect their personal IoT devices with the organizational network
C. Model Diagram/Overview
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 485
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VIII Aug 2022- Available at www.ijraset.com
The above model diagram depicts the information how the remote user and server is connected and how can we see the reviews of
the posts.
B. Problem Statement
1) IoT applications need to protect data privacy to fix security issues such as intrusions, spoofing attacks, DoS attacks, DoS
attacks, jamming, eavesdropping, spam, and malware.
2) The safety measures of IoT devices depends upon the size and type of organization in which it is imposed.
C. Proposed System
1) The digital world is completely dependent upon the smart devices. The information retrieved from these devices should be
spam free.
2) The information retrieval from various IoT devices is a big challenge because it is collected from various domains. As there are
multiple devices involved in IoT, so a large volume of data is generated having heterogeneity and variety.
3) Here support vector machine is used to detect the spam in particular IoT devices.
4) We can call this data as IoT data. IoT data has various features such as real-time, multi-source, rich and sparse.
5) Here we use Randomforest algorithm to depicts the trustworthiness of IoT device under various parameters.
The proposed scheme of spam detection is validated using five different machine learning models.
An algorithm is proposed to compute the spamicity score of each model which is then used for detection and intelligent
decision making.
Based upon the spamicity score computed in previous step, the reliability of IoT devices is analyzed using different evaluation
metrics.
The target is to resolve the issues in the IoT devices deployed within home. But, the proposed methodology considers all the
parameters of data engineering before validating it with machine learning models.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 486
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VIII Aug 2022- Available at www.ijraset.com
C. Hardware Requirements
Minimum hardware requirements are very dependent on the particular software being developed by a given Enthought Python /
Canopy / VS Code user.
Applications that need to store large arrays/objects in memory will require more RAM, whereas applications that need to perform
numerous calculations or tasks more quickly will require a faster processor.
D. Software Requirements
The functional requirements or the overall description documents include the product perspective and features, operating system and
operating environment, graphics requirements, design constraints and user documentation.
The appropriation of requirements and implementation constraints gives the general overview of the project in regards to what the
areas of strength and deficit are and how to tackle them.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 487
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VIII Aug 2022- Available at www.ijraset.com
System architecture refers to the placement of these software components on physical machines. Two closely related components
can be co-located or placed on different machines. The location of components will also impact performance and reliability. The
resulting architectural style ultimately determines how components are connected, data is exchanged, and how they all work
together as a coherent system.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 488
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue VIII Aug 2022- Available at www.ijraset.com
2) Supervised Learning
An algorithm uses training data and feedback from humans to learn the relationship of given inputs to a given output. For instance, a
practitioner can use marketing expense and weather forecast as input data to predict the sales of cans. You can use supervised
learning when the output data is known. The algorithm will predict new data.
3) Unsupervised Learning
In unsupervised learning, an algorithm explores input data without being given an explicit output variable (e.g., explores customer
demographic data to identify patterns)
You can use it when you do not know how to classify the data, and you want the algorithm to find patterns and classify the data for
you.
V. CONCLUSION:
The following conclusion can be presented:
The proposed framework, detects the spam parameters of IoT devices using machine learning models. The IoT dataset used for
experiments, is pre-processed by using feature engineering procedure. By experimenting the framework with machine learning
models, each IoT appliance is awarded with a spam score. The spamicity score is used in this research to determine the reliability of
IoT devices in the smart home organisation. Different ML models were utilised to assess the time-arrangement information
produced by keen metres through extensive tests and analysis. This refines the conditions to be taken for successful working of IoT
devices in a smart home. In future, we are planning to consider the climatic and surrounding features of IoT device to make them
more secure and trustworthy.
REFERENCES
[1] Z.-K. Zhang, M. C. Y. Cho, C.-W. Wang, C.-W. Hsu, C.-K. Chen, and S. Shieh, “Iot security: ongoing challenges and research opportunities,” in 2014 IEEE
7th international conference on service-oriented computing and applications. IEEE, 2014, pp. 230–234.
[2] A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Blockchain for iot security and privacy: The case study of a smart home,” in 2017 IEEE international
conference on pervasive computing and communications workshops (PerCom workshops). IEEE, 2017, pp. 618–623.
[3] E. Bertino and N. Islam, “Botnets and internet of things security,” Computer, no. 2, pp. 76–79, 2017.
[4] C. Zhang and R. Green, “Communication security in internet of thing: preventive measure and avoid ddos attack over iot network,” in Proceedings of the 18th
Symposium on Communications & Networking. Society for Computer Simulation International, 2015, pp. 8–15.
[5] W. Kim, O.-R. Jeong, C. Kim, and J. So, “The dark side of the internet: Attacks, costs and responses,” Information systems, vol. 36, no. 3, pp. 675–705, 2011.
[6] H. Eun, H. Lee, and H. Oh, “Conditional privacy preserving security protocol for nfc applications,” IEEE Transactions on Consumer Electronics, vol. 59, no. 1,
pp. 153–160, 2013
[7] R. V. Kulkarni and G. K. Venayagamoorthy, “Neural network based secure media access control protocol for wireless sensor networks,” in 2009 International
Joint Conference on Neural Networks. IEEE, 2009, pp. 1680–1687.
[8] M. A. Alsheikh, S. Lin, D. Niyato, and H.-P. Tan, “Machine learning in wireless sensor networks: Algorithms, strategies, and applications,” IEEE
Communications Surveys & Tutorials, vol. 16, no. 4, pp. 1996– 2018, 2014.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 489