News Updates Thursday 19th Dec 2024 :
  • Welcome to INPRESSCO, world's leading publishers, We have served more than 10000+ authors
  • Articles are invited in engineering, science, technology, management, industrial engg, biotechnology etc.
  • Paper submission is open. Submit online or at editor.ijcet@inpressco.com
  • Our journals are indexed in NAAS, University of Regensburg Germany, Google Scholar, Cross Ref etc.
  • DOI is given to all articles

Enhanced IoT Network Security with Machine Learning Techniques for Anomaly Detection and Classification


Author : Noman Abid

Pages : 536-544, DOI: https://doi.org/10.14741/ijcet/v.13.6.5
Download PDF
Abstract

Network anomaly detection systems have grown in popularity and usefulness as a means to identify assaults, intrusions, and abnormalities in the ever-increasing volume of data sent by the internet and smart devices. Unusual patterns in network traffic may be reasonably anticipated using machine learning techniques. Nevertheless, the majority of prior efforts have been on anomaly detection inside conventional ML frameworks. Focussing on the IoT-23 dataset, which contains both harmless and malicious network traffic, this research explores the use of ML techniques for identifying and categorising anomalies in network security. Data preparation, feature engineering, model execution, and assessment are all a part of the technique. Models such as CNN, DT, LR, and SVM are employed to classify network anomalies, with performance evaluated using accuracy, precision, recall, and F1-score. Achieving a balance across parameters including F1-score, recall, and precision, the CNN model surpasses other models with an accuracy of 98.69%. Comparing the results, it can be concluded that CNN performs well aimed at anomaly detection, whereas Decision Trees offer a high level, and Logistic Regression and SVM are less accurate and stable. Since CNN is applied in deep learning, the study shows the effectiveness of deep learning models for network security in terms of anomaly detection with a suggestion to approach model optimisation to avoid overfitting and enhance generalisation.

Keywords: Cybersecurity, IoT, Machine Learning, Network Security, Malicious Activities, Anomaly detection, Classification.

Call for Papers
  1. IJCET- Current Issue
  2. Issues are published in Feb, April, June, Aug, Oct and Dec
  3. DOI is given to all articles
  • Inpressco Google Scholar
  • Inpressco Science Central
  • Inpressco Global impact factor
  • Inpressco aap

International Press corporation is licensed under a Creative Commons Attribution-Non Commercial NoDerivs 3.0 Unported License
©2010-2023 INPRESSCO® All Rights Reserved