Smart City Gnosys

Smart city article details

Title Iot Network Security: Netflow Traffic Analysis And Attack Classification Using Machine Learning Techniques
ID_Doc 33860
Authors Tyagi K.; Ahlawat A.; Chaudhary H.
Year 2024
Published 2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), ICRITO 2024
DOI http://dx.doi.org/10.1109/ICRITO61523.2024.10522466
Abstract In the modern day, Internet of Things (IoT) has become critical since it permits seamless integration of physical objects and data-driven communication. IoT improves efficiency, automated processes, and real-time decision-making across the different sectors such as smart cities, transportation, agriculture, healthcare, etc. In IoT, machine learning is essential for advancing security, flexibility, and efficiency. Its real-time anomaly detection improves security by recognizing threats quickly. In this paper, we employed an IoT dataset called NF-ToN-IoT, a NetFlow-based dataset which has nine attack categories. On this dataset, we used SMOTE-ENN, a potent machine learning balancing technique created to solve the issue of class imbalance which provides best results after implementing Machine Learning(ML) models. Preprocessing was done on the dataset to eliminate extraneous or missing values. After that we applied four ML algorithms to classify attacks in NF-ToN-IoT dataset & these are Linear Discriminant Analysis (LDA), Decision Tree (DT), Random Forest (RF), and K-Nearest Neighbors (KNN) classifiers. These algorithms are quite good at identifying patterns and abnormalities in the dataset, which improves the efficiency of attack classification. The framework which we proposed achieved an accuracy rate of 60.6%, 98%, 98.3%, and 99% for LDA, RF, DT, and KNN respectively. Hence, we get the best results from KNN to classify those attacks present in NF-ToN-IoT dataset. © 2024 IEEE.
Author Keywords Attacks; Internet of Things(IoT); Machine Learning(ML); NF-ToN-IoT; SMOTEENN


Similar Articles


Id Similarity Authors Title Published
24715 View0.905Ali M.; Pervez S.; Hosseini S.E.; Siddhu M.K.Evaluation And Detection Of Cyberattack In Iot-Based Smart City Networks Using Machine Learning On The Unsw-Nb15 DatasetInternational Journal of Online and Biomedical Engineering, 21, 2 (2025)
35873 View0.899Kumar V.S.; Sunehra D.Machine Learning Algorithms For Binary And Multiclass Classification Of Iot Network Traffic In Smart Cities2024 3rd International Conference on Artificial Intelligence for Internet of Things, AIIoT 2024 (2024)
23835 View0.899Arabiat A.; Altayeb M.Enhancing Internet Of Things Security: Evaluating Machine Learning Classifiers For Attack PredictionInternational Journal of Electrical and Computer Engineering, 14, 5 (2024)
47766 View0.898Plazas Olaya M.K.; Vergara Tejada J.A.; Aedo Cobo J.E.Securing Microservices-Based Iot Networks: Real-Time Anomaly Detection Using Machine LearningJournal of Computer Networks and Communications, 2024 (2024)
32898 View0.897Kaur B.; Dadkhah S.; Shoeleh F.; Neto E.C.P.; Xiong P.; Iqbal S.; Lamontagne P.; Ray S.; Ghorbani A.A.Internet Of Things (Iot) Security Dataset Evolution: Challenges And Future DirectionsInternet of Things (Netherlands), 22 (2023)
2483 View0.895Nepolo E.; Ngxande M.; Zodi G.-A.L.A Machine Learning-Based Performance Analysis Of Feature Selection Methods For Anomaly Detection For Iot Network SecurityLearning and Analytics in Intelligent Systems, 43 (2025)
33032 View0.894Dawoud A.; Sianaki O.A.; Shahristani S.; Raun C.Internet Of Things Intrusion Detection: A Deep Learning Approach2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020 (2020)
36064 View0.892Alfahaid A.; Alalwany E.; Almars A.M.; Alharbi F.; Atlam E.; Mahgoub I.Machine Learning-Based Security Solutions For Iot Networks: A Comprehensive SurveySensors, 25, 11 (2025)
9197 View0.891Janani Pandeeswari G.; Jeyanthi S.Analysis Of Intrusion Detection Using Machine Learning Techniques2nd IEEE International Conference on Advanced Technologies in Intelligent Control, Environment, Computing and Communication Engineering, ICATIECE 2022 (2022)
47716 View0.891Wang M.; Yang N.; Weng N.Securing A Smart Home With A Transformer-Based Iot Intrusion Detection SystemElectronics (Switzerland), 12, 9 (2023)