A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods

@article{Strecker2021AMA,
  title={A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods},
  author={Sam Strecker and Rushit Dave and Nyle Siddiqui and Naeem Seliya},
  journal={ArXiv},
  year={2021},
  volume={abs/2110.07832}
}
Modern scientific advancements often contribute to the introduction and refinement of never-before-seen technologies. This can be quite the task for humans to maintain and monitor and as a result, our society has become reliant on machine learning to assist in this task. With new technology comes new methods and thus new ways to circumvent existing cyber security measures. This study examines the effectiveness of three distinct Internet of Things cyber security algorithms currently used in… 

Figures and Tables from this paper

Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning
In recent years, the amount of secure information being stored on mobile devices has grown exponentially. However, current security schemas for mobile devices such as physiological biometrics and
Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning
Human activity recognition has grown in popularity with its increase of applications within daily lifestyles and medical environments. The goal of having efficient and reliable human activity

References

SHOWING 1-10 OF 28 REFERENCES
Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches
Detection of Unauthorized IoT Devices Using Machine Learning Techniques
TLDR
Random Forest, a supervised machine learning algorithm, was applied to features extracted from network traffic data with the aim of accurately identifying IoT device types from the white list, achieving perfect detection of unauthorized IoT devicetypes and perfect classification of white listed types.
Cyber forensics framework for big data analytics in IoT environment using machine learning
TLDR
A generalized forensic framework has been proposed that use Google’s programming model, MapReduce as the backbone for traffic translation, extraction, and analysis of dynamic traffic features and shows the results with the sensitivity of 99%.
AD-IoT: Anomaly Detection of IoT Cyberattacks in Smart City Using Machine Learning
TLDR
An Anomaly Detection-IoT (AD- IoT) system, which is an intelligent anomaly detection based on Random Forest machine learning algorithm, which can effectively detect compromised IoT devices at distributed fog nodes is proposed.
Machine learning approaches to IoT security: A systematic literature review
A Review on Machine Learning and Deep Learning Perspectives of IDS for IoT: Recent Updates, Security Issues, and Challenges
TLDR
A comprehensive survey on Intrusion Detection System (IDS) for IoT is presented and various IDS placement strategies and IDS analysis strategies in IoT architecture are discussed, along with Machine Learning (ML) and Deep Learning techniques for detecting attacks in IoT networks.
Machine Learning DDoS Detection for Consumer Internet of Things Devices
TLDR
Results indicate that home gateway routers or other network middleboxes could automatically detect local IoT device sources of DDoS attacks using low-cost machine learning algorithms and traffic data that is flow-based and protocol-agnostic.
IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security?
TLDR
The attack model for IoT systems is investigated, and the IoT security solutions based on machine-learning (ML) techniques including supervised learning, unsupervised learning, and reinforcement learning (RL) are reviewed.
Machine Learning Techniques for Security of Internet of Things (IoT) and Fog Computing Systems
  • M. Moh, R. Raju
  • Computer Science
    2018 International Conference on High Performance Computing & Simulation (HPCS)
  • 2018
TLDR
A holistic picture of IoT, its growth, fog computing, and Machine Learning (ML) techniques for securing IoT devices and fog computing systems is presented and future research directions in this important topic are discussed.
Fast Authentication and Progressive Authorization in Large-Scale IoT: How to Leverage AI for Security Enhancement
TLDR
A lightweight intelligent authentication approach is developed by exploring machine learning at the base station to identify the prearranged access time sequences or frequency bands or codes used in IoT devices, and a holistic authentication and authorization approach is proposed, where online machine learning and trust management are adopted for achieving adaptive access control.
...
1
2
3
...