Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

IOT NETWORK INTRUSION DETECTION USING MACHINE LEARNING ON UNSW-NB15 DATASET

View through CrossRef
This research presents a comprehensive investigation into the application of machine learning techniques for addressing the pervasive security challenges within Internet of Things (IoT) networks. With the exponential growth of interconnected devices, ensuring the integrity and confidentiality of data transmissions has become increasingly critical. In this study, we deploy and evaluate seven distinct machine learning methods tailored to the IoT network intrusion detection problem. Leveraging the rich and diverse UNSW-NB15 dataset, encompassing real-world network traffic scenarios, our analysis encompasses a thorough examination of both traditional and state-of-the-art algorithms. Through rigorous experimentation and performance evaluation, we assess the efficacy of these methods in accurately detecting and classifying various forms of network intrusions. Our findings provide valuable insights into the strengths and limitations of different machine learning approaches for enhancing the security posture of IoT environments, thereby facilitating informed decision-making for network administrators and cybersecurity practitioners.
Title: IOT NETWORK INTRUSION DETECTION USING MACHINE LEARNING ON UNSW-NB15 DATASET
Description:
This research presents a comprehensive investigation into the application of machine learning techniques for addressing the pervasive security challenges within Internet of Things (IoT) networks.
With the exponential growth of interconnected devices, ensuring the integrity and confidentiality of data transmissions has become increasingly critical.
In this study, we deploy and evaluate seven distinct machine learning methods tailored to the IoT network intrusion detection problem.
Leveraging the rich and diverse UNSW-NB15 dataset, encompassing real-world network traffic scenarios, our analysis encompasses a thorough examination of both traditional and state-of-the-art algorithms.
Through rigorous experimentation and performance evaluation, we assess the efficacy of these methods in accurately detecting and classifying various forms of network intrusions.
Our findings provide valuable insights into the strengths and limitations of different machine learning approaches for enhancing the security posture of IoT environments, thereby facilitating informed decision-making for network administrators and cybersecurity practitioners.

Related Results

Intelligent Feature Engineering Based Intrusion Detection System for IoT Network Security
Intelligent Feature Engineering Based Intrusion Detection System for IoT Network Security
Abstract Internet-of-Things (IoT) helps create smart systems by allowing physical environments to be controlled or monitored by users through extensive sensor networks. Suc...
Network Intrusion Detection System based on Machine Learning algorithm using UNSW-NB15 Dataset
Network Intrusion Detection System based on Machine Learning algorithm using UNSW-NB15 Dataset
Network play important role in real life and cyber security has become a vital in reaearch.An intrusion detection system (IDS)which is important in Network Intrusion Detectyion Sy...
Improving IoT IDS with Harmony Search Feature Selection and ADASYN on UNSW-NB15 and CIC- IoT23
Improving IoT IDS with Harmony Search Feature Selection and ADASYN on UNSW-NB15 and CIC- IoT23
Abstract The proliferation of Internet of Things (IoT) devices and increasing frequency of cyber-attacks have resulted in significant security challenges. The Intru...
MIDS-GAN: Minority Intrusion Data Synthesizer GAN—An ACON Activated Conditional GAN for Minority Intrusion Detection
MIDS-GAN: Minority Intrusion Data Synthesizer GAN—An ACON Activated Conditional GAN for Minority Intrusion Detection
Intrusion Detection Systems (IDS) are vital to cybersecurity but suffer from severe class imbalance in benchmark datasets such as NSL-KDD and UNSW-NB15. Conventional oversampling m...
Stacking Ensemble and Federated Learning for IoT Intrusion Detection
Stacking Ensemble and Federated Learning for IoT Intrusion Detection
The number of Internet of Things (IoT) devices has increased considerably in the past few years, which resulted in an exponential growth of cyber attacks on IoT infrastructure. As ...
APPLYING TRANSFORMER ARCHITECTURE TO ENHANCE ATTACK DETECTION PERFORMANCE IN INTRUSION DETECTION SYSTEMS
APPLYING TRANSFORMER ARCHITECTURE TO ENHANCE ATTACK DETECTION PERFORMANCE IN INTRUSION DETECTION SYSTEMS
Intrusion Detection Systems (IDS) are crucial in safeguarding network security against increasingly sophisticated threats. In this study, we propose a Transformer-based intrusion d...
eBF: An Enhanced Bloom Filter for Intrusion Detection in IoT
eBF: An Enhanced Bloom Filter for Intrusion Detection in IoT
Abstract Intrusion detection is an essential process to identify malicious incidents and continuously alert the many users of the Internet of Things (IoT). The constant mon...

Back to Top