Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » International Journal of Data and Network Science » A new model for security analysis of network anomalies for IoT devices

Journals

  • IJIEC (747)
  • MSL (2643)
  • DSL (668)
  • CCL (508)
  • USCM (1092)
  • ESM (413)
  • AC (562)
  • JPM (271)
  • IJDS (912)
  • JFS (91)
  • HE (32)
  • SCI (26)

IJDS Volumes

    • Volume 1 (8)
      • Issue 1 (5)
      • Issue 2 (3)
    • Volume 2 (12)
      • Issue 1 (3)
      • Issue 2 (3)
      • Issue 3 (3)
      • Issue 4 (3)
    • Volume 3 (27)
      • Issue 1 (4)
      • Issue 2 (9)
      • Issue 3 (8)
      • Issue 4 (6)
    • Volume 4 (37)
      • Issue 1 (6)
      • Issue 2 (15)
      • Issue 3 (7)
      • Issue 4 (9)
    • Volume 5 (86)
      • Issue 1 (9)
      • Issue 2 (11)
      • Issue 3 (32)
      • Issue 4 (34)
    • Volume 6 (163)
      • Issue 1 (30)
      • Issue 2 (33)
      • Issue 3 (40)
      • Issue 4 (60)
    • Volume 7 (200)
      • Issue 1 (53)
      • Issue 2 (46)
      • Issue 3 (46)
      • Issue 4 (55)
    • Volume 8 (243)
      • Issue 1 (60)
      • Issue 2 (61)
      • Issue 3 (60)
      • Issue 4 (62)
    • Volume 9 (96)
      • Issue 1 (20)
      • Issue 2 (6)
      • Issue 3 (30)
      • Issue 4 (40)
    • Volume 10 (40)
      • Issue 1 (40)

Keywords

Supply chain management(166)
Jordan(161)
Vietnam(149)
Customer satisfaction(120)
Performance(113)
Supply chain(110)
Service quality(98)
Competitive advantage(95)
Tehran Stock Exchange(94)
SMEs(87)
optimization(86)
Financial performance(83)
Trust(83)
TOPSIS(83)
Sustainability(81)
Job satisfaction(80)
Factor analysis(78)
Social media(78)
Knowledge Management(77)
Artificial intelligence(77)


» Show all keywords

Authors

Naser Azad(82)
Mohammad Reza Iravani(64)
Zeplin Jiwa Husada Tarigan(63)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(39)
Jumadil Saputra(36)
Dmaithan Almajali(36)
Muhammad Turki Alshurideh(35)
Barween Al Kurdi(32)
Ahmad Makui(32)
Basrowi Basrowi(31)
Hassan Ghodrati(31)
Mohammad Khodaei Valahzaghard(30)
Sautma Ronni Basana(29)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)
Haitham M. Alzoubi(27)


» Show all authors

Countries

Iran(2183)
Indonesia(1290)
India(787)
Jordan(786)
Vietnam(504)
Saudi Arabia(453)
Malaysia(441)
United Arab Emirates(220)
China(206)
Thailand(153)
United States(111)
Turkey(106)
Ukraine(104)
Egypt(98)
Canada(92)
Peru(88)
Pakistan(85)
United Kingdom(80)
Morocco(79)
Nigeria(78)


» Show all countries

International Journal of Data and Network Science

ISSN 2561-8156 (Online) - ISSN 2561-8148 (Print)
Quarterly Publication
Volume 7 Issue 3 pp. 1241-1248 , 2023

A new model for security analysis of network anomalies for IoT devices Pages 1241-1248 Right click to download the paper Download PDF

Authors: Mohammad Al Rawajbeh, Wael Alzyadat, Khalid Kaabneh, Suha Afaneh, Dima Farhan Alrwashdeh, Hamdah Samih Albayaydah, Issam Hamad AlHadid

DOI: 10.5267/j.ijdns.2023.5.001

Keywords: Internet of Things, Technology, Security Analysis, Anomaly detection system, Cybersecurity

Abstract: In the era of IoT gaining traction, attacks on IoT-enabled devices are the order of the day that emanates the need for more protected IoT networks. IoT's key feature deals with massive amounts of data sensed by numerous heterogeneous IoT devices. Numerous machine learning techniques are used to collect data from different types of sensors on the objects and transform them into information relevant to the application. Furthermore, business and data analytics algorithms help in event prediction based on observed behavior and information. Routing information securely over the internet with limited resources in IoT applications is a key problem. The study proposes a model for detecting network anomalies in IoT devices to enhance the security of the devices. The study employed the IoT Botnet dataset, and K-fold cross-validation tests were used for validating the values of evaluation metrics. The average values of Accuracy, Precision, Recall, and F Score was 97.4.

How to cite this paper
Rawajbeh, M., Alzyadat, W., Kaabneh, K., Afaneh, S., Alrwashdeh, D., Albayaydah, H & AlHadid, I. (2023). A new model for security analysis of network anomalies for IoT devices.International Journal of Data and Network Science, 7(3), 1241-1248.

Refrences
Adhikary, K., Bhushan, S., Kumar, S., & Dutta, K. (2020). Evaluating the Impact of DDoS Attacks in Vehicular Ad-Hoc Networks. International Journal of Security and Privacy in Pervasive Computing (IJSPPC), 12(4), 1-18.
Al Rawajbeh, M. (2017). Low cost design and implementation for HAS using multifunctional WI-FI. International Jour-nal of Computer Networks & Communications (IJCNC), 9(3), 105-116.
Al Rawajbeh, M. (2019). Performance evaluation of a computer network in a cloud computing environment. ICIC Express Letters, 13, 719-727.
Al Rawajbeh, M., & Haboush, A. (2015). Advanced object monitoring using wireless sensors network. Procedia Computer Science, 65, 17-24.
Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of Things security: A survey. Journal of Net-work and Computer Applications, 88, 10-28.
Alsoufi, M. A., Razak, S., Siraj, M. M., Nafea, I., Ghaleb, F. A., Saeed, F., & Nasser, M. (2021). Anomaly-based intrusion detection systems in IOT using deep learning: A systematic literature review. Applied sciences, 11(18), 8383.
Bagula, B. A., & Erasmus, Z. (2015, March). Iot emulation with cooja. In ICTP-IoT workshop (p. 99).
Balaji, S., Nathani, K., & Santhakumar, R. (2019). IoT technology, applications and challenges: a contemporary sur-vey. Wireless personal communications, 108, 363-388.
Eskandari, M., Janjua, Z. H., Vecchio, M., & Antonelli, F. (2020). Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet of Things Journal, 7(8), 6882-6897.
Hassan, W. H. (2019). Current research on Internet of Things (IoT) security: A survey. Computer networks, 148, 283-294.
Hawkins, D. M. (1980). Identification of outliers (Vol. 11). London: Chapman and Hall.
Kavyashree, E. D., Vidyashree, H. D., & Kumar, B. A. (2018). A survey of internet of things (IoT)-applications, merits, demerits & challenges. International Journal of Innovative Research in Computer and Communication Engineering, 6(2), 903-907.
Kouicem, D. E., Bouabdallah, A., & Lakhlef, H. (2018). Internet of things security: A top-down survey. Computer Net-works, 141, 199-221.
Kumar, R., Venkanna, U., & Tiwari, V. (2020, January). A binary classification approach for time granular traffic in SDWMN based IoT networks. In 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS) (pp. 531-534). IEEE.
Lee, J., & Park, K. (2021). GAN-based imbalanced data intrusion detection system. Personal and Ubiquitous Compu-ting, 25, 121-128.
Li, Y., Xu, Y., Liu, Z., Hou, H., Zheng, Y., Xin, Y., ... & Cui, L. (2020). Robust detection for network intrusion of industri-al IoT based on multi-CNN fusion. Measurement, 154, 107450.
Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE internet of things journal, 4(5), 1125-1142.
Mohamed, T., Otsuka, T., & Ito, T. (2018). Towards machine learning based IoT intrusion detection service. In Recent Trends and Future Technology in Applied Intelligence: 31st International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2018, Montreal, QC, Canada, June 25-28, 2018, Proceed-ings 31 (pp. 580-585). Springer International Publishing.
Mohammad, Z., Abusukhon, A., & Qattam, T. A. (2019, April). A survey of authenticated Key Agreement Protocols for securing IoT. In 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Tech-nology (JEEIT) (pp. 425-430). IEEE.
Mohammadzadeh, A. K., Ghafoori, S., Mohammadian, A., Mohammadkazemi, R., Mahbanooei, B., & Ghasemi, R. (2018). A Fuzzy Analytic Network Process (FANP) approach for prioritizing internet of things challenges in Iran. Technology in Society, 53, 124-134.
Mourtzis, D., Vlachou, E., & Milas, N. (2016). Industrial big data as a result of IoT adoption in manufacturing. Procedia cirp, 55, 290-295.
Mumtaz, R., Samawi, V., Alhroob, A., Alzyadat, W., & Almukahel, I. (2022). PDIS: A Service Layer for Privacy and De-tecting Intrusions in Cloud Computing. International Journal of Advanced Software Computer Applications, 14(2).
Murali, S., & Jamalipour, A. (2019). A lightweight intrusion detection for sybil attack under mobile RPL in the internet of things. IEEE Internet of Things Journal, 7(1), 379-388.
NSF, N. S. F. (2011). The Network Simulator - ns-2. https://nsnam.sourceforge.net/wiki/index.php/User_Information#The_Network_Simulator_-_ns-2
Oikonomou, G., Duquennoy, S., Elsts, A., Eriksson, J., Tanaka, Y., & Tsiftes, N. (2022). The Contiki-NG open source op-erating system for next generation IoT devices. SoftwareX, 18, 101089.
Rawajbeh, M. A., Sayenko, V. I., Alhadid, I. H., Al-Turjman, F., & Ramasamy, L. K. (2021). Evaluation of functional ma-turity for a network information service-design and case analysis. International Journal of Ad Hoc and Ubiquitous Computing, 38(1-3), 3-16.
Rydning, D. R. J. G. J., Reinsel, J., & Gantz, J. (2018). The digitization of the world from edge to core. Framingham: In-ternational Data Corporation, 16.
Sfar, A. R., Natalizio, E., Challal, Y., & Chtourou, Z. (2018). A roadmap for security challenges in the Internet of Things. Digital Communications and Networks, 4(2), 118-137.
Sha, K., Wei, W., Yang, T. A., Wang, Z., & Shi, W. (2018). On security challenges and open issues in Internet of Things. Future generation computer systems, 83, 326-337.
Shanmugam, B., & Azam, S. (2023). Risk Assessment of Heterogeneous IoMT Devices: A Review. Technologies, 11(1), 31.
Sheng, Z., Mahapatra, C., Zhu, C., & Leung, V. C. (2015). Recent advances in industrial wireless sensor networks toward efficient management in IoT. IEEE access, 3, 622-637.
Siraj, S., Gupta, A., & Badgujar, R. (2012). Network simulation tools survey. International Journal of Advanced Research in Computer and Communication Engineering, 1(4), 199-206.
Statista, “Number of connected devices worldwide 2030 | Statista,” Statista Research Department, 2020. [Online]. Availa-ble:https://www.statista.com/statistics/802690/worldwide-connecteddevices-by-access-technology/. [Accessed: 26-May-2022].
Tewari, A., & Gupta, B. B. (2020). Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future generation computer systems, 108, 909-920.
Thamilarasu, G., & Chawla, S. (2019). Towards deep-learning-driven intrusion detection for the internet of things. Sensors, 19(9), 1977.
things challenges in Iran. Technology in Society, 53, 124-134.
Turner, S., & Chen, L. (2011). Updated security considerations for the MD5 message-digest and the HMAC-MD5 algo-rithms (No. rfc6151).
TutorialsWeb. (2023). Network Simulator 2 (NS2) : Features & Basic Architecture Of NS2. https://www.tutorialsweb.com/ns2/NS2-1.htm
Velinov, A., & Mileva, A. (2016). Running and testing applications for Contiki OS using Cooja simulator.
Wahid-Ul-Ashraf, A., Budka, M., & Musial, K. (2018). Netsim–the framework for complex network generator. Procedia Computer Science, 126, 547-556.
Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of things Journal, 4(5), 1250-1258.
Zhang, Y., An, J. P., & Chen, P. (2012). Research of Hybrid Programming with C#. net and Matlab. Physics Procedia, 24, 1677-1681.
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: International Journal of Data and Network Science | Year: 2023 | Volume: 7 | Issue: 3 | Views: 1179 | Reviews: 0

Related Articles:
  • Simulation and analysis performance of ad-hoc routing protocols under DDoS ...
  • A trust management model in internet of vehicles
  • The effect of supply chain risk management on supply chain resilience: The ...
  • A synergic framework for cyber-physical production systems in the context o ...
  • A new method for improving security in MANETs AODV Protocol

Add Reviews

Name:*
E-Mail:
Review:
Bold Italic Underline Strike | Align left Center Align right | Insert smilies Insert link URLInsert protected URL Select color | Add Hidden Text Insert Quote Convert selected text from selection to Cyrillic (Russian) alphabet Insert spoiler
winkwinkedsmileam
belayfeelfellowlaughing
lollovenorecourse
requestsadtonguewassat
cryingwhatbullyangry
Security Code: *
Include security image CAPCHA.
Refresh Code

® 2010-2026 GrowingScience.Com