507 Submission
507 Submission
Neural Network
Animesh Srivastava [1] Sant Kumar Maurya [2] Parveen Kumar Saini [3]
Assistant Professor [1] Assistant Professor [2] Assistant Professor [3]
Department of Computer Science & Department of AIT-CSE, Chandigarh Department of CSE, Chandigarh
Engineering University, Gharuan, Mohali, Punjab [2] University, Gharuan, Mohali, Punjab [3]
Graphic Era Hill University, [email protected] [2] [email protected] [3]
Dehradun
[email protected] [1]
Abstract
Finding and fixing security flaws in the IoT can be Third, ANN demonstrates the ability to adapt and
accomplished in many ways using Artificial Neural respond to new threats effectively. The significance
Networks (ANNs). Artificial Neural Networks of this issue lies in the ever-changing nature of
(ANNs) could be used to identify illogical traffic attacks aimed at the IoT.
patterns. The traffic going to a specific IoT device
may suddenly increase, and an ANN can be trained
2.0 Related Work
IoT attack detection using ANNs, offering different 2.1 GAP ANALYSIS
techniques, datasets, and insights to improve IoT
security through machine learning. have looked Since ANNs can learn and discover patterns in
into different ANN architectures, data data, they have been selected as a useful tool for
preprocessing methods, and network traffic discovering attacks in IoT systems. Since attacks
analysis strategies to make IoT systems more on the IoT frequently involve convoluted data
secure against attacks [1][2]. patterns, these tools are ideal for detecting them.
Numerous individuals have worked diligently to • ANNs can learn patterns that aren't simple. This is
detect and prevent Internet of Things (IoT)-related important because attacks on IoT devices are often
attacks. A significant amount of research has been very smart and can avoid being found in the usual
conducted on IoT devices and network security. As ways.
new vulnerabilities and countermeasures are • ANNs can change so they can handle new
discovered, security for IoT devices is a rapidly problems. This is important because attacks on IoT
developing field. [8] [9]. are getting better and better all the time.
Internet of Things (IoT) cyberattacks can wreak • A lot of people can use ANNs. This means that
havoc on the economy and people's health by they can be used to find attacks on a lot of Internet
disrupting production lines, manufacturing of Things devices.
processes, and supply chains. A system that
prevents attacks employs Graph Neural Networks 2.2 MOTIVATION
and Reinforcement Learning to analyze alerts and
The data produced by IoT (Internet of Things)
reroute sensitive traffic away from compromised
devices is substantial. The provided data can be
network paths. The detection and rerouting
used to train ANNs to identify patterns that can be
schemes are demonstrated by experimental results.
used to foresee attacks. Because of the high level of
[12][13].
sophistication required to launch an IoT attack,
IoT systems are susceptible to numerous types of conventional detection methods are often
attacks, such as DoS and DDoS. Determining and ineffective. Because of their ability to learn
preventing denial-of-service/denial-of-service complex patterns, artificial neural networks
attacks are proposed as two distinct components of (ANNs) are excellent at detecting these assaults.
a brand-new architecture. On the Bot-IoT dataset, The nature of threats posed by the IoT is constantly
the proposed detection component, a "Looking- shifting. Updates to ANNs give them the ability to
Back" multi-class classifier, is evaluated. [3][14] pick up on novel patterns, expanding their
[15]. usefulness. They are adept at fending off novel
threats because of their adaptability. The ability to
The choice of ANN algorithm for IoT expand is a unique feature of artificial neural
attack detection will depend on the networks (ANNs). This allows them to detect and
specific application. thwart attacks across a wide range of IoT gadgets.
Some of the challenges in using ANNs for Furthermore, artificial neural networks (ANNs)
IoT attack detection include the lack of appear to be a good way to detect attacks on the
labelled data, the dynamic nature of IoT IoT because of the following:
traffic, and the resource constraints of IoT
devices. Effective: ANNs are good at finding a variety of
Despite these challenges, ANNs have the IoT attacks, such as DDoS attacks, malware
potential to be a powerful tool for IoT infections, and unauthorized access.
attack detection.
Scalable: ANNs can be made bigger so that they
Using artificial neural networks (ANNs) to find can find attacks on a lot of IoT devices.
attacks on the Internet of Things (IoT) is a hard
Adaptable: ANNs can be updated to learn new
task that requires training machine learning models
patterns, which makes them able to deal with new
to find patterns and outliers in IoT data streams
threats.
[10][11].
3.0 PROPOSED FRAMEWORK
Data collection. Obtaining information from IoT
gadgets is the first step. Sensors, actuators, and
other hardware can be used to gather this
information. The information gathered from the IoT
devices should be indicative of their typical
operation.
k
or M M [4] [4] 10.1109/MECO49872.2020.9134241.
tw SV r SV est er
r d
Ne ea ea or co 3. Alaeddine Mihoub, Ouissem Ben Fredj, Omar Cheikhrouhou,
ral -lin lin m F oen Abdelouahid Derhab, Moez Krichen, Denial of service attack
eu on o t
lN n nd Au detection and mitigation for internet of things using looking-
ic a Ra back-enabled machine learning techniques, Computers &
tifi
Ar Electrical Engineering, Volume 98, 2022, 107716, ISSN 0045-
d 7906, https://doi.org/10.1016/j.compeleceng.2022.107716.
se
opo
Pr 4. E. Gelenbe et al., "IoT Network Attack Detection and
Mitigation," 2020 9th Mediterranean Conference on Embedded
Computing (MECO), Budva, Montenegro, 2020, pp. 1-6, doi:
Figure 2: Compare with other Methods 10.1109/MECO49872.2020.9134241
Overall, the neural network model has a 5 A. Srivastava and A. Kumar, "A back propagation NN to
classification accuracy of 99.2%. This model optimize the IoT network," 2022 International Conference on
proves the deployed ANN algorithm can identify Computer Communication and Informatics (ICCCI), 2022, pp.
1-4, doi: 10.1109/ICCCI54379.2022.9740861.
DDoS/DoS attacks against benign IoT network
traffic. In addition, it aids in bettering network 6 Singh, Gulbir & Kumar, Gautam & Bhatnagar, Vivek &
stability by alerting the response team at an early Srivastava, Animesh & Jyoti, Kumari. (2019). POLLUTION
MANAGEMENT THROUGH INTERNET OF THINGS: A
SUBSTANTIAL SOLUTION FOR SOCIETY. Humanities &
Social Sciences Reviews. 7. 1231-1237.
10.18510/hssr.2019.75162.