• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

检测物联网中基于循环攻击的异常重复行为模式。

Detecting Unusual Repetitive Patterns of Behavior Indicative of a Loop-Based Attack in IoT.

作者信息

Munshi Asmaa

机构信息

College of Computer Science and Engineering, University of Jeddah, Jeddah 21959, Saudi Arabia.

出版信息

Sensors (Basel). 2024 Nov 26;24(23):7534. doi: 10.3390/s24237534.

DOI:10.3390/s24237534
PMID:39686071
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11644736/
Abstract

Given the high risk of Internet of Things (IoT) device compromise, it is crucial to discuss the attack detection aspect. However, due to the physical limitations of IoT, such as battery life and sensing and processing power, the widely used detection techniques, such as signature-based or anomaly-based detection, are quite ineffective. This research extracted loop-based cases from the transmission session dataset of "CTU-IoT-Malware-Capture-7-1" ("Linux, Mirai") and implemented a loop-based detection machine learning approach. The research employed nine machine learning models to illustrate how the loop patterns of the datasets can facilitate detection. The results of this study indicate that the XGBoost model achieves the best performance in terms of "Accuracy: 8.85%", "Precision: 96.57% (Class)", "Recall: 96.72% (Class 1)", and "F1-Score: 6.24%". The XGBoost model demonstrated exceptional performance across all metrics, indicating its capability in handling large IoT datasets effectively. It provides not only high accuracy but also strong generalization, which is crucial for detecting intricate and diverse patterns of malicious behavior in IoT networks. Its precision and recall performance further highlight its robustness in identifying both attack and normal activity, reducing the chances of false positives and negatives, making it a superior choice for real-time IoT threat detection.

摘要

鉴于物联网(IoT)设备被攻破的高风险,讨论攻击检测方面至关重要。然而,由于物联网的物理限制,如电池寿命以及传感和处理能力,广泛使用的检测技术,如基于特征或基于异常的检测,效果相当不佳。本研究从“CTU-IoT-Malware-Capture-7-1”(“Linux,Mirai”)的传输会话数据集中提取基于循环的案例,并实施了基于循环的检测机器学习方法。该研究采用了九种机器学习模型来说明数据集的循环模式如何有助于检测。本研究结果表明,XGBoost模型在“准确率:8.85%”、“精确率:96.57%(类别)”、“召回率:96.72%(类别1)”和“F值:6.24%”方面表现最佳。XGBoost模型在所有指标上都表现出色,表明其能够有效处理大型物联网数据集。它不仅提供了高精度,还具有很强的泛化能力,这对于检测物联网网络中复杂多样的恶意行为模式至关重要。其精确率和召回率性能进一步突出了其在识别攻击和正常活动方面的稳健性,减少了误报和漏报的可能性,使其成为实时物联网威胁检测的优越选择。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/768a/11644736/0470499053fa/sensors-24-07534-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/768a/11644736/d1e646a708f1/sensors-24-07534-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/768a/11644736/0f4015c7db4f/sensors-24-07534-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/768a/11644736/24a8e786db2e/sensors-24-07534-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/768a/11644736/0470499053fa/sensors-24-07534-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/768a/11644736/d1e646a708f1/sensors-24-07534-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/768a/11644736/0f4015c7db4f/sensors-24-07534-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/768a/11644736/24a8e786db2e/sensors-24-07534-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/768a/11644736/0470499053fa/sensors-24-07534-g004.jpg

相似文献

1
Detecting Unusual Repetitive Patterns of Behavior Indicative of a Loop-Based Attack in IoT.检测物联网中基于循环攻击的异常重复行为模式。
Sensors (Basel). 2024 Nov 26;24(23):7534. doi: 10.3390/s24237534.
2
An Aggregated Mutual Information Based Feature Selection with Machine Learning Methods for Enhancing IoT Botnet Attack Detection.基于聚合互信息的特征选择与机器学习方法在增强物联网僵尸网络攻击检测中的应用。
Sensors (Basel). 2021 Dec 28;22(1):185. doi: 10.3390/s22010185.
3
Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques.利用机器学习技术检测云计算中的恶意带宽消耗。
Comput Intell Neurosci. 2022 Sep 5;2022:4003403. doi: 10.1155/2022/4003403. eCollection 2022.
4
Review of Botnet Attack Detection in SDN-Enabled IoT Using Machine Learning.基于机器学习的 SDN 赋能物联网中的僵尸网络攻击检测综述。
Sensors (Basel). 2022 Dec 14;22(24):9837. doi: 10.3390/s22249837.
5
Botnet Attack Detection in IoT Using Machine Learning.基于机器学习的物联网僵尸网络攻击检测
Comput Intell Neurosci. 2022 Oct 4;2022:4515642. doi: 10.1155/2022/4515642. eCollection 2022.
6
A hybrid deep learning-based intrusion detection system for IoT networks.一种用于物联网网络的基于深度学习的混合入侵检测系统。
Math Biosci Eng. 2023 Jun 13;20(8):13491-13520. doi: 10.3934/mbe.2023602.
7
FL-DSFA: Securing RPL-Based IoT Networks against Selective Forwarding Attacks Using Federated Learning.FL-DSFA:使用联邦学习保护基于RPL的物联网网络免受选择性转发攻击
Sensors (Basel). 2024 Sep 8;24(17):5834. doi: 10.3390/s24175834.
8
Using Machine Learning Multiclass Classification Technique to Detect IoT Attacks in Real Time.使用机器学习多类分类技术实时检测物联网攻击。
Sensors (Basel). 2024 Jul 12;24(14):4516. doi: 10.3390/s24144516.
9
Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection-Current Research Trends.用于物联网网络异常检测的机器学习和深度学习技术——当前研究趋势
Sensors (Basel). 2024 Mar 20;24(6):1968. doi: 10.3390/s24061968.
10
Cyberattacks Detection in IoT-Based Smart City Applications Using Machine Learning Techniques.基于机器学习技术的物联网智慧城市应用中的网络攻击检测。
Int J Environ Res Public Health. 2020 Dec 14;17(24):9347. doi: 10.3390/ijerph17249347.

本文引用的文献

1
Code Injection Attacks in Wireless-Based Internet of Things (IoT): A Comprehensive Review and Practical Implementations.基于无线的物联网(IoT)中的代码注入攻击:全面综述与实际实现
Sensors (Basel). 2023 Jun 30;23(13):6067. doi: 10.3390/s23136067.
2
Comparative performance analysis of K-nearest neighbour (KNN) algorithm and its different variants for disease prediction.用于疾病预测的K近邻(KNN)算法及其不同变体的性能比较分析。
Sci Rep. 2022 Apr 15;12(1):6256. doi: 10.1038/s41598-022-10358-x.
3
Deep learning approaches for detecting DDoS attacks: a systematic review.
用于检测分布式拒绝服务攻击的深度学习方法:一项系统综述。
Soft comput. 2022 Jan 27:1-37. doi: 10.1007/s00500-021-06608-1.
4
Long short-term memory.长短期记忆
Neural Comput. 1997 Nov 15;9(8):1735-80. doi: 10.1162/neco.1997.9.8.1735.