• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Internet of Things(IoT)Security Enhancement Using XGboost Machine Learning Techniques

    2023-12-12 15:50:28DanaDoghramachiandSiddeeqAmeen
    Computers Materials&Continua 2023年10期

    Dana F.Doghramachi and Siddeeq Y.Ameen

    1Department of Information Systems Engineering Techniques,Erbil Technical Engineering College,Erbil Polytechnic University,Erbil,44001,Iraq

    2Department of Energy Engineering,Technical College of Engineering,Duhok Polytechnic University,Duhok,42001,Iraq

    ABSTRACT The rapid adoption of the Internet of Things (IoT) across industries has revolutionized daily life by providing essential services and leisure activities.However,the inadequate software protection in IoT devices exposes them to cyberattacks with severe consequences.Intrusion Detection Systems(IDS)are vital in mitigating these risks by detecting abnormal network behavior and monitoring safe network traffic.The security research community has shown particular interest in leveraging Machine Learning(ML)approaches to develop practical IDS applications for general cyber networks and IoT environments.However,most available datasets related to Industrial IoT suffer from imbalanced class distributions.This study proposes a methodology that involves dataset preprocessing,including data cleaning,encoding,and normalization.The class imbalance is addressed by employing the Synthetic Minority Oversampling Technique(SMOTE)and performing feature reduction using correlation analysis.Multiple ML classifiers,including Logistic Regression,multi-layer perceptron,Decision Trees,Random Forest,and XGBoost,are employed to model IoT attacks.The effectiveness and robustness of the proposed method evaluate using the IoTID20 dataset,which represents current imbalanced IoT scenarios.The results highlight that the XGBoost model,integrated with SMOTE,achieves outstanding attack detection accuracy of 0.99 in binary classification,0.99 in multi-class classification,and 0.81 in multiple sub-classifications.These findings demonstrate our approach’s significant improvements to attack detection in imbalanced IoT datasets,establishing its superiority over existing IDS frameworks.

    KEYWORDS IoT;detection system;machine learning;SMOTE;XGboost

    1 Introduction

    The IoT is gaining popularity in various industries,significantly impacting people’s daily lives by providing essential services and leisure activities [1,2].This innovative technology enables the connection of physical objects from anywhere in the world,thanks to its integration with the Internet[3,4].However,the majority of IoT devices lack sufficient software protection and contain both evident and unnoticed vulnerabilities [5].Consequently,the development of IoT networks exposes them to exploitation by malicious actors who can launch extensive cyberattacks.These attacks can lead to severe consequences such as infrastructure damage,service disruptions,significant financial losses,and reputational harm to large corporations.Consequently,identifying vulnerable IoT devices and disconnecting them from the Internet before they can be compromised and added to an IoT botnet is a crucial security measure against these attacks[6–8].

    Several strategies can be highlighted for identifying and isolating IoT networks through access routers,thereby separating IoT bots and preventing device takeovers[1,9].Another approach involves passive detection and identification of bot attacks by analyzing all internal and networked IoT activities.However,given the scarcity of human resources and the enormous amount of data to be processed within a specific timeframe,utilizing human analysis for this purpose becomes costly[4].Hence,the application of artificial intelligence (AI) and machine learning (ML) becomes more practical.ML,as a technical suite of artificial intelligence,is capable of discovering,analyzing,and categorizing data.AI,on the other hand,refers to the ability of a mechanical device to emulate human intellectual processes.Based on these concepts,algorithms can be developed to facilitate automatic development,configuration,and even independent operation[10].Moreover,this enables us to detect cyberattacks with minimal errors and high speed.

    This paper aims to model IoT attacks at the binary,multiple,and sub-classification levels using ML models while addressing the issue of imbalanced data through the use of SMOTE.The study proposes the employment of SMOTE with Ensemble Learning to protect current IoT networks from nine different types of attacks.Balancing the dataset is crucial,and if it exhibits an imbalance,the widely used technique known as SMOTE is applied.This ensures that the dataset is appropriately balanced and ready for further analysis.Furthermore,the size of the data collection is reduced by identifying highly correlated features within the dataset and performing feature reduction.Additionally,a group of ML-based classifiers,namely Logistic Regression (LR),multi-layer perceptron (MLP),Decision Trees (DT),Random Forest (RF),and XGBoost (XGB),were employed.Finally,the effectiveness of the proposed feature selection and categorization methodologies was evaluated and compared to existing methods.

    This paper covers the theoretical framework of ML algorithms used in IoT modeling and the data balancing technique.It also discusses related works that have utilized the same dataset,followed by the presentation of the proposed methodology and the implementation and evaluation of the analysis system.

    2 Contributions

    The study addresses the challenge of imbalanced class distributions in IoT security datasets,and the contributions can be summarized as follows:

    1.A proposed methodology includes dataset preprocessing techniques and using SMOTE to address the class imbalance.

    2.Multiple ML classifiers,including LR,MLP,DT,RF,and XGBoost,are evaluated for modeling IoT attacks,and XGBoost is identified as a superior model for attack detection accuracy.

    3.Evaluate the proposed method using the IoTID20 dataset,representing modern imbalanced IoT scenarios and demonstrating its effectiveness in different classification scenarios.

    4.The proposed approach outperforms existing IDS frameworks in detecting attacks in imbalanced IoT datasets based on accuracy metrics and comparison with other classifiers.

    3 Related Work

    Various ML techniques are used to detect attacks in IoT systems.Some studies have focused on identifying attacks by analyzing abnormal patterns in network traffic.One such approach is the Self-Evolving Host-based Intrusion Detection System (SEHIDS),which utilizes a lightweight Artificial Neural Network (ANN) IDS system for IoT networks [11].The core concept of SEHIDS involves equipping each IoT device with a miniature ANN architecture and a resource mechanism that enables the architecture to be trained and enhanced whenever the IoT device’s performance deteriorates.

    Another collaborative IDS system,MidSiot,is introduced and deployed at Internet and IoT local gateways [12].This IDS system operates in three phases: firstly,it identifies each IoT device present in the IoT network;secondly,it distinguishes between legitimate and erroneous network traffic;and finally,it determines the types of attacks directed at IoT devices.However,it should be noted that these methods often suffer from drawbacks in terms of cost and resource requirements,making them less feasible in practical implementations.

    Meanwhile,a group of researchers proposed a model addressing the problem of selecting appropriate hyperparameters for ANN models to detect attacks[13].In this model,a portion of the dataset is used to determine the hyperparameters that are most suited for reducing the overhead associated with designing the ANN architecture,configuring its functionality,and evaluating its performance.The aim is to detect five categorical attacks and nine sub-categorical assaults.

    In addition,another approach suggested in[14]is a deep-convolutional neural network(DCNN)-based IDS.The DCNN architecture consists of three densely connected layers and two convolutional layers.The experiments in this study employed the IoTID20 dataset.The suggested model underwent various optimization approaches,and the performance of optimization algorithms such as Adam,AdaMax,and Nadam was evaluated,with Adam,AdaMax,and Nadam demonstrating the best performance.However,it is worth noting that in certain data types,neural networks may exhibit bias during training toward majority classes,potentially resulting in imbalanced performance.

    While most studies have employed traditional ML algorithms and ensemble learning,a particular study [15] investigated the performance of various ML algorithms,such as DT,RF,and XGBoost(XGB),in predicting network attacks on IoT devices.The authors found that DT algorithms generally exhibit higher accuracy than RF and gradient-boosting machines.However,RF algorithms outperformed others regarding Area Under the ROC Curve (AUC) scores since they combined the results of multiple DTs.The study[16]employed the RF algorithm and One Hot Encoding technique with the IoTID20 dataset,which includes three targets,to validate their approach.Their findings reinforced that RF is typically the most accurate algorithm.In another study [17],multiple ML algorithms were applied to detect unusual behavior in IoT networks using the IoTID20 dataset.The researchers identified essential and strongly connected features and ranked them based on importance.They evaluated the dataset using 15 popular ML algorithms and concluded that Gradient Boosting performs best as a classifier.

    Additionally,the study[18]proposed a system for identifying compromised IoT devices utilizing various ML methods.The ML model was constructed using the IoTID20 dataset to detect abnormal behavior in IoT networks.For the experiment,4,000 random records from the dataset were selected.Two algorithms,Pearson’s correlation,and LR,were employed to choose the characteristics.Fifteen features were selected to classify packets as normal or anomalous.Based on the performance criteria outlined in the article,except for time,the results indicated that RF and AdaBoost classifiers provided highly similar and top-performing results.Overall,these studies demonstrate the efficacy of different ML algorithms in detecting attacks and unusual behavior in IoT networks,with DT,RF,and Gradient Boosting often exhibiting strong performance.

    The study[19]proposes a hybrid ML model that combines the XGBoost algorithm with decision tree-based feature selection techniques for IoT intrusion detection.The model achieved improved accuracy compared to traditional ML algorithms.In[20],the authors propose an intrusion detection system(IDS)for IoT networks using ensemble techniques such as bagging and boosting.They evaluate various ML algorithms and ensemble combinations to enhance the detection accuracy of IoT attacks.Le et al.[21]presents an ML-based IDS for IoT networks.It incorporates feature selection methods and voting ensemble techniques to improve the detection accuracy of attacks in IoT environments.In[22],the authors compare the performance of multiple ML algorithms,including DT,RF,support vector machines,and neural networks for intrusion detection in IoT networks.They evaluate the algorithms based on accuracy,precision,recall,and F1-score metrics.The study[23]proposes an IDS for IoT systems using ML algorithms.The authors compare the performance of LR,DT,and RF for detecting attacks in IoT networks.Paper[24]proposes an anomaly-based intrusion detection system(IDS) specifically designed for IoT applications.The system aims to detect attacks by identifying abnormal behavior patterns in IoT networks.The authors describe the architecture and functioning of the IDS,which involves collecting network traffic data,feature extraction,and anomaly detection using ML techniques.The study evaluates the performance of the proposed IDS using a dataset of IoT network traffic and compares it with other existing IDS approaches.In[25],they present a quantum trust and consultative transaction-based blockchain cybersecurity model for healthcare systems.The research focuses on addressing the security challenges in healthcare IoT applications.The proposed model incorporates quantum trust and blockchain technology to enhance the security and privacy of healthcare data.The authors discuss the model’s architecture,which involves using quantum key distribution,blockchain consensus mechanisms,and smart contracts.The study highlights the model’s potential to provide robust security for healthcare IoT systems.In [26],the authors present a novel measurement scheme for evaluating the security and privacy aspects of IoT applications utilizing ML algorithms.The research focuses on developing a comprehensive framework to assess the security and privacy levels of IoT applications.The authors proposed a set of security and privacy metrics and utilize ML algorithms to evaluate and classify IoT applications based on these metrics.The study discusses the implementation of the framework and presents experimental results using real-world IoT datasets.The findings demonstrate the effectiveness of the proposed scheme in assessing the security and privacy aspects of IoT applications.

    The gap in the research on methods of detecting IoT attacks using ML algorithms can be summarized in achieving performance accuracy with smaller datasets and fewer attributes that affect attack detection.As a result,the problem can be defined by the need for more recent IoTID20 datasets with many characteristics.Even when dataset sizes grow,most predictions are made using conventional ML techniques that do not improve attack detection accuracy,making it difficult to choose the optimum ML methodology for specific data.Moreover,most studies that use the IoTID20 dataset distinguish the presence of the attack and do not consider the type of attack and its sub-classification.Moreover,there is no indication of the imbalance between the data and its treatment.Finally,studies used single methods to identify feature selection,while more than one method could be hybridized.

    4 Machine Learning for IoT Security

    The primary focus of this study is the use of ML to detect and categorize system traffic threats.Various supervised ML techniques include LR,MLP,DT,RF,and XGB.In addition to data balancing using SMOTE,LR is one of the ML algorithms and one of the most popular classification algorithms because its steps are simple.It is a classification algorithm to classify data into separate classes when the response variable is categorical [11].LR aims to find a relationship between properties and the probability of a given outcome [27].A DT functions by removing representative items from a data collection and arranging them in trees according to the object’s value[11,28].A tree node represents each characteristic,and branches branching from this node indicate the relevant values [29].The starting node of the tree is at any functional node that best bisects the tree.Different criteria,such as the Gini index and the Information Gain,that best split the training data sets are utilized to pinpoint the first node[30].Multiple DTs are used in constructing RF to forecast more accurate and fault-tolerant categorization outcomes[15].Randomly built DTs are taught to provide categorization outcomes based on votes from most participants [31].While DTs may be seen as parts of RF,there are two different classification algorithms because,in contrast to DTs,which develop a set of rules during training to categorize incoming samples further,RF develops a subset of rules utilizing all DT members[11].

    Extreme Gradient Boosting is often known as an extreme boosting tree or an expanded version of the Gradient Boosting Machine technique[32].The Boosting ensemble algorithm can form a strong classifier with higher accuracy after the weighted superposition of multiple weak classifiers with lower accuracy to reduce errors and improve accuracy [33].The extreme gradient boosting algorithm is improved based on the Boosting algorithm.The objective function is minimized by using gradient descent for each generated tree and based on all the trees generated in the previous step[34].At the same time,the second-order Taylor expansion of the loss function is carried out in the XGB algorithm,and a regular term is added to the cost function to control the complexity of the model[11].

    In ML and data science,imbalanced data distribution is prevalent and usually occurs when observations in one category are much higher or lower than in other categories[35].ML algorithms tend to improve accuracy by minimizing errors,as they do not consider class distributions.This problem is prevalent in fraud detection,anomaly detection,facial recognition,etc.[36,37].On the other hand,SMOTE is one of the most commonly used oversampling methods to solve imbalance problems[38].It aims to balance the class distribution by randomly increasing minority class examples by replicating minority class examples[39].SMOTE synthesizes new minority instances among existing minority instances.It generates virtual training records by linear interpolation over the minority class.These synthetic training records are generated by randomly selecting one or more k-nearest neighbors for each example in the minority class[40,41].After the oversampling process,the data is reconstructed,and multiple classification models can be applied to the processed data[38].

    5 Proposed ML Techniques for IoT Security Enhancement

    5.1 System Layout

    To classify IoT attacks,data preprocessing was performed at the first preprocessing stage such that categorical data were converted into values using One-Hot encoding.Next,feature filtering to delete features without any effect on prediction accuracy,high correlation,and features with single values.To accomplish the tasks,three datasets are created according to the type of classification.The dataset is further divided into a training set and a test set.The training set is used to train ML models,and the dataset is used to test the performance of the selected models.After determining the best classifier to classify IoT attacks on the three levels,the balanced data is compared with the basic model,as shown in Fig.1.

    Figure 1:Proposed methodology for modeling IoT attacks

    Python has been used to develop models;the pseudocode of the proposed model is represented in Algorithm 1.

    Algorithm 1:Pseudocode OF XGB_SMOTE

    5.2 Dataset Preprocessing

    When developing an ML model,it is essential to decide which features should be used as input for the learning algorithm[32].Once data has been obtained from the IoTID20,the preprocessing is done using one-hot encoding.It is necessary to convert the tagged data into a numerical format because it is frequently not in a machine-readable form.In addition,the data contains features that are not useful in training classification algorithms,such as correlated or unimportant features.The unstructured data will thus be transformed into structured data using the following preprocessing methods.

    5.2.1 One-Hot Encoding

    One-Hot encoding is the representation of categorical variables as binary vectors.The One Hot encoding addresses the Category value that changed to a Column value of 0 or 1[42].The first column value corresponds to the true row values with a value of 1.The values in the other columns denote false,represented by the integer 0.The real value is between 0 and 1 if the values in the rows and columns match.To turn labels into numeric values,preprocessing one hot encoding is performed.

    5.2.2 Filtering Features

    In this study,two feature filtering techniques were used,the first is to delete the correlated features,and the second is to delete the features of importance that do not affect the classification accuracy.To find feature correlation,Pearson correlation was used.Pearson correlation generates a percentage correlation coefficient,abbreviated as r,that assesses the strength and direction of linear correlations between data groups [42,43].Features with a correlation of more than 98% were removed.Table 1 shows the correlation between the features.

    Table 1:Correlation of the features

    Feature importance analysis was performed using the built-in mechanism of the sklearn ensemble.The RF classifier method(feature_importances_attribute)implements the entropy approach to feature importance assessment.The results of the importance evaluation showed that there is zero importance in terms of classification accuracy,as shown in Table 2.

    Table 2:Lists of features with zero importance

    5.3 Dataset

    The IoTID20 data was created to find IoT network cyberattacks.SKT NGU and EZVIZ Wi-Fi cameras created the dataset utilizing smart home devices [44].This dataset’s key benefit is that it contains new information on detecting network interference and current communication data.This dataset has three label levels: binary,category,and subcategory,totaling 85 IoT network attributes.These categories are distributed for classification,as shown in Fig.2.

    Figure 2:Distribution of the target group at the level of(a)binary,(b)category,and(c)subcategory classifications

    5.4 Classification Problem

    When choosing a model for solving the considered classification problem,the quality of the most common ML models was assessed on a balanced and preprocessed subsample of IoT attacks of the IoTID20 dataset.The quality of the responses of classifiers (models) was compared using the following metrics(Accuracy,Precision,Recall,and F1).When determining the values of quality metrics,elements of the error matrix(confusion matrix)corresponding to the number of correct and incorrect answers based on the results of classifier testing should be found,as shown in Fig.3.

    Figure 3:Confusion matrix[45]

    In Fig.3,TP (True Positive) denotes a truly positive response,TN (True Negative) an actual negative response,FP(False Positive)a false positive response(False Positive,Type I error),FN(False Negative)a false negative response(missing attack,Type II error)[46].Taking into account the given designations,the used quality metrics are determined by the following expressions:

    Accuracy measures the proportion of all correctly classified instances(both positive and negative)out of the total number of instances evaluated.It provides an overall measure of how well the classifier performs.Precision is the proportion of True Positives(TP)to the total number of predicted positive instances (TP and FP).It represents the percentage of the correct positive predictions.Recall (also known as sensitivity or true positive rate)is the proportion of True Positives(TP)to the total number of actual positive instances (TP and FN).It represents the percentage of positive instances that are correctly identified by the classifier.Considering both metrics,the F1-score is a harmonic mean of precision and recall.It ranges from 0 to 1,with 1 being the best possible score.

    6 Results and Discussion

    6.1 Results

    In this study,the Python language was used in practical experiments.The Sklearn library was used to build ML models.Scikit-learn(sklearn)is a popular ML library in Python that provides a variety of tools for building predictive models.It is built on top of NumPy,SciPy,and the matplotlib libraries and offers a simple and efficient way to implement a wide range of ML algorithms,including classification,regression,clustering,and dimensionality reduction.The quality of the classifiers was assessed on an imbalanced,preprocessed IoT attack subsample of the IoTID20 dataset with an 80:20 ratio of normal and abnormal traffic (55 of the most significant features).The investigation was conducted with the IoTID20 dataset using a set of ML algorithms and suggested using the XGB algorithm for classification with SMOTE to balance data in the case of subcategory classifications.

    Initially,all models,DT,LR,MLP,RF,and XGB,values of quality measures are obtained using binary classification as shown in Fig.4.

    Figure 4:Performance of classification algorithms in binary classification

    It is clear from Fig.4 that DT and XGB models achieved the best accuracy,as it was 0.99 on various scales,followed by RF,which was 0.99 using accuracy and precision,and 0.98 using the Recall scale.While the performance of MLP and LR was acceptable on the Accuracy scale.MLP and LR were low on the Recall scale,indicating that these two models have a bias due to the imbalanced data set.In the second stage,models were tested in the case of multiple classifications of the attack type.The average precision and recall rates were taken in the results since the classification is multi-class.

    Another test on the five models compares different models’performance in predicting the attack type,as shown in Fig.5.

    Figure 5:Performance of classification models in category classification

    It is clear from Fig.5 that in the case of multiple classifications,DT and XGB achieved the best performance,as it was 0.99 for the three measures,followed by RF,which was 0.98.It is also noted that the performance of the models is balanced for the various algorithms,as it was 0.77 using MLP and 0.73 using LR for the three measures.

    Extra test for classification is achieved on the models based on the types of attacks and their subclassifications.It is important to note that SMOTE data balancing techniques are used even if classes are imbalanced.This will increase the number of tested models to six to have XGB_SMOTE.The results of this test are shown in Fig.6.

    Figure 6:Performance of classification models in subcategory classification

    It is clear from Fig.6 that in the multiple classification and subclassification,the SMOTE algorithm with XGB achieved the best performance was 0.81 according to accuracy and recall and 0.83 according to the precision scale,followed by the XGB algorithm without the balancing technique 0.79 for the three measures.To evaluate the performance of the proposed model,the receiver operating characteristic curve(ROC)is used to determine the discrimination threshold for each class in the submultiple classification.Fig.7 presents the ROC for each attack.

    To determine the proposed method’s efficiency,a comparison was made with previous studies that used the IoTID20 data set.The studies of [14,47] dealt with binary,multiple,and branching classifications,and the studies of [12,24] dealt with binary and multiple classifications,as shown in Table 3.In contrast,the studies of [27,33] dealt with binary classification;Table 3 presents the accuracy-based comparison for the three classification levels.

    Table 3:Accuracy comparison with previous studies

    In comparison with previous studies,it was concluded that the accuracy was approximately 0.99 by various methods in the case of binary classification.However,in the case of multiple classifications,the study of [12] achieved 0.99 as in the proposed method.In contrast,in the case of multiple subclassifications,the proposed method achieved the best performance with an accuracy of 0.81.

    Assessment and analysis of the results showed the possibility of applying modern ML methods in IoT attack detection systems.Moreover,the results of the proposed XGB with SMOTE for multiclass subcategory classification for a binary and multi-class category can classify attacks.The results showed that DT,RF,and XGB algorithms could identify the presence of an attack at the binary classification level with high accuracy,as shown in Fig.4.The superiorities of DT and XGB were noted in multiple classifications.In the case of multiple sub-classifications,the performance of collective learning algorithms was the best compared to DT,whereas the XGB is superior.The results indicate that boosting learning is suitable for modeling IoT attacks at the three levels.Despite the superiority of the boosting algorithm,it is still with an accuracy of 0.79.The results showed that the model’s performance improved when SMOTE technique was applied to balance the data,as the accuracy reached 0.81.Compared with previous studies,the proposed system achieves better accuracy.

    Figure 7:XGB_SMOTE ROC for each attack

    6.2 Discussion

    The discussion section provides a comprehensive analysis and interpretation of the study’s results.It thoroughly examines the findings’significance and implications,draws comparisons to existing literature,and addresses potential limitations and future research directions.

    This study proposed a methodology utilizing XGBoost ML techniques to enhance IoT security.The methodology encompassed various preprocessing techniques for the dataset,including data cleaning,encoding,and normalization to ensure data quality and consistency.Furthermore,it tackled the challenge of imbalanced class distributions in IoT security datasets by incorporating the SMOTE.

    The study’s results demonstrated the proposed method’s effectiveness and robustness in detecting IoT attacks.Evaluated multiple ML classifiers,including LR,MLP,DT,RF,and XGBoost.Among these classifiers,XGBoost integrated with SMOTE achieved outstanding attack detection accuracy.In binary classification,the XGBoost model achieved an accuracy of 0.99,while in multi-class classification,it achieved an accuracy of 0.99.In multiple sub-classifications,the XGBoost model achieved an accuracy of 0.81.These findings highlight the superiority of the proposed approach over existing IDS frameworks in detecting attacks in imbalanced IoT datasets.

    The significance of the study lies in its contribution to addressing the challenge of imbalanced class distributions in IoT security datasets.Imbalanced datasets are common in real-world scenarios,and traditional ML algorithms often struggle to achieve accurate results in such datasets.Employing SMOTE effectively balanced the class distribution and improved the performance of the ML models.

    The comparison with existing literature revealed that our approach outperformed previous studies that used the same IoTID20 dataset.For example,studies using traditional ML algorithms like DT and RF achieved lower accuracy scores compared to our proposed XGBoost model.This indicates that XGBoost is a more suitable algorithm for detecting IoT attacks in imbalanced datasets.

    7 Conclusion

    The study concluded that the collective learning algorithms were the best in binary and multiple classifications.In the case of subcategory classifications,the XGB algorithm is the best,and the use of the SMOTE increased the accuracy of the classification.The final model achieved 0.81 accuracies and recalled 0.83 according to the precision,which was the best comparison.Comparison of the proposed algorithms also demonstrated superiority over previous studies using the same dataset.However,the security analysis considers only a static mesh topology of IoT devices,while the IoT network is more dynamic,complicated,and diversified.As a result,statistical distribution will use to simulate the dynamic character of expansive IoT networks for future investigation.The proposed study will also pave the way for other studies on lateral movement avoidance in IoT networks.

    8 Limitations and Future Work

    The study primarily focuses on employing a specific ML technique,namely XGBoost,for IoT attack detection.It is worth noting that different ML algorithms may yield varied outcomes.Furthermore,the evaluation of the proposed method solely relies on a single dataset (IoTID20),necessitating further investigation into its generalizability across diverse datasets and real-world scenarios.Future work should delve into this aspect to enhance the robustness and applicability of the proposed method:

    1.The study concentrated on intrusion detection at the network level,and future research could explore the integration of host-based intrusion detection techniques to bolster the overall security of IoT systems.

    2.The proposed method can be regarded as real-time or near-real-time attack detection in dynamic IoT environments.

    3.Research on the scalability and efficiency of the proposed is better for conducting large-scale IoT deployments with a high volume of network traffic.

    4.The impact of adversarial attacks and defenses against them enhance the robustness of the proposed method in real-world scenarios.

    Acknowledgement:The authors would like to thank the associate editor and the reviewers for their Time and effort were provided to review the manuscript.

    Funding Statement:The authors received no specific funding for this study.

    Author Contributions:The authors confirm contribution to the paper as follows: study conception and design:Dana F Doghramachi,Siddeeq Y Ameen;data collection:Dana F Doghramachi;analysis and interpretation of results:Dana F Doghramachi,Siddeeq Y Ameen;draft manuscript preparation:Siddeeq Y Ameen.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The publicly available data set can be found at: https://ieeedataport.org/open-access/iot-network-intrusion-dataset.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    av中文乱码字幕在线| 757午夜福利合集在线观看| 免费在线观看影片大全网站| 在线免费观看的www视频| 最近最新中文字幕大全免费视频| 精品日产1卡2卡| 午夜免费男女啪啪视频观看 | 99国产综合亚洲精品| 一本一本综合久久| 九色国产91popny在线| 国产探花极品一区二区| 美女大奶头视频| or卡值多少钱| 两人在一起打扑克的视频| 脱女人内裤的视频| 一区二区三区高清视频在线| 国产精品日韩av在线免费观看| 亚洲黑人精品在线| 99久久精品国产亚洲精品| 国产精品久久电影中文字幕| 成人国产综合亚洲| 九九久久精品国产亚洲av麻豆| 麻豆成人av在线观看| 国产成人系列免费观看| 亚洲av熟女| 女人被狂操c到高潮| 免费av观看视频| 成人国产一区最新在线观看| 乱人视频在线观看| 欧美一级毛片孕妇| 国产精品99久久久久久久久| 五月伊人婷婷丁香| 午夜亚洲福利在线播放| 国产精品亚洲av一区麻豆| 欧美高清成人免费视频www| 国产爱豆传媒在线观看| 噜噜噜噜噜久久久久久91| 少妇人妻精品综合一区二区 | 国产成+人综合+亚洲专区| 此物有八面人人有两片| 国产一区二区三区在线臀色熟女| 国产97色在线日韩免费| 欧美精品啪啪一区二区三区| 日本 av在线| av视频在线观看入口| 国产精品亚洲av一区麻豆| 搡老熟女国产l中国老女人| 日本五十路高清| 丰满乱子伦码专区| 亚洲人成伊人成综合网2020| 日韩国内少妇激情av| 村上凉子中文字幕在线| 亚洲欧美日韩卡通动漫| 亚洲国产精品久久男人天堂| 国产精品久久久久久久电影 | 天堂av国产一区二区熟女人妻| 日本黄大片高清| 男女床上黄色一级片免费看| 可以在线观看的亚洲视频| 窝窝影院91人妻| 每晚都被弄得嗷嗷叫到高潮| 精品久久久久久久毛片微露脸| 黄色片一级片一级黄色片| 窝窝影院91人妻| 精品人妻偷拍中文字幕| 国产一区二区三区在线臀色熟女| 成熟少妇高潮喷水视频| 波野结衣二区三区在线 | 国产69精品久久久久777片| 91在线观看av| 国产真人三级小视频在线观看| 亚洲av第一区精品v没综合| 蜜桃亚洲精品一区二区三区| av天堂中文字幕网| 波多野结衣高清作品| 国产精品嫩草影院av在线观看 | 午夜精品久久久久久毛片777| 欧美一级a爱片免费观看看| 国产午夜福利久久久久久| 丰满人妻一区二区三区视频av | 人人妻人人看人人澡| 老司机深夜福利视频在线观看| av天堂在线播放| 最新中文字幕久久久久| 色精品久久人妻99蜜桃| 国产在视频线在精品| 九九在线视频观看精品| 日本精品一区二区三区蜜桃| 亚洲人与动物交配视频| 亚洲va日本ⅴa欧美va伊人久久| 午夜福利在线在线| 日日干狠狠操夜夜爽| 欧美日韩亚洲国产一区二区在线观看| 欧美不卡视频在线免费观看| 国产91精品成人一区二区三区| 十八禁人妻一区二区| 亚洲av成人精品一区久久| 国产一级毛片七仙女欲春2| 长腿黑丝高跟| aaaaa片日本免费| 国产精品亚洲美女久久久| 日韩成人在线观看一区二区三区| 亚洲精品久久国产高清桃花| 免费人成在线观看视频色| 亚洲 国产 在线| 偷拍熟女少妇极品色| 亚洲第一欧美日韩一区二区三区| 亚洲电影在线观看av| АⅤ资源中文在线天堂| 亚洲精品456在线播放app | 搡老熟女国产l中国老女人| 成人三级黄色视频| 午夜福利视频1000在线观看| 99久久99久久久精品蜜桃| 日本与韩国留学比较| 男女之事视频高清在线观看| 制服人妻中文乱码| 国内少妇人妻偷人精品xxx网站| 久久久国产精品麻豆| 两人在一起打扑克的视频| 欧美日韩瑟瑟在线播放| 日本 av在线| 亚洲五月婷婷丁香| 亚洲国产日韩欧美精品在线观看 | 日韩欧美国产在线观看| 99国产极品粉嫩在线观看| 性色av乱码一区二区三区2| 法律面前人人平等表现在哪些方面| 国产老妇女一区| 亚洲精品美女久久久久99蜜臀| 在线观看免费午夜福利视频| 白带黄色成豆腐渣| 琪琪午夜伦伦电影理论片6080| 很黄的视频免费| 天天一区二区日本电影三级| 长腿黑丝高跟| 成年女人毛片免费观看观看9| 老熟妇乱子伦视频在线观看| 国产一区二区在线av高清观看| 成年免费大片在线观看| 一区二区三区激情视频| 国产精品女同一区二区软件 | 99久久精品国产亚洲精品| 亚洲欧美日韩东京热| 亚洲激情在线av| 亚洲成人久久爱视频| 在线国产一区二区在线| 国产精品久久久人人做人人爽| 久久九九热精品免费| 丁香六月欧美| 一区福利在线观看| 在线观看日韩欧美| 亚洲av二区三区四区| 综合色av麻豆| 亚洲人成网站在线播| 久久香蕉精品热| 久久久久久久午夜电影| 国产成人啪精品午夜网站| 欧美日韩黄片免| 精品久久久久久久毛片微露脸| 成熟少妇高潮喷水视频| 久久精品人妻少妇| 性色avwww在线观看| 美女被艹到高潮喷水动态| 少妇人妻一区二区三区视频| 亚洲成av人片免费观看| 老司机深夜福利视频在线观看| 久久精品国产亚洲av香蕉五月| 一本一本综合久久| 99久久九九国产精品国产免费| 国产精品免费一区二区三区在线| 免费在线观看成人毛片| av福利片在线观看| 国产精品女同一区二区软件 | 91麻豆av在线| 亚洲成人久久性| 精品久久久久久久毛片微露脸| 国产精品久久电影中文字幕| 99国产极品粉嫩在线观看| 母亲3免费完整高清在线观看| 国产探花在线观看一区二区| 国内揄拍国产精品人妻在线| 国内精品久久久久久久电影| 黄色成人免费大全| 一个人免费在线观看的高清视频| 午夜久久久久精精品| 在线观看av片永久免费下载| 亚洲五月天丁香| 免费在线观看日本一区| 久久精品国产亚洲av香蕉五月| 国产真实乱freesex| 两性午夜刺激爽爽歪歪视频在线观看| 国产欧美日韩精品亚洲av| 美女高潮的动态| 又紧又爽又黄一区二区| 免费看美女性在线毛片视频| 夜夜躁狠狠躁天天躁| 久久人人精品亚洲av| 中国美女看黄片| 看片在线看免费视频| 国产真人三级小视频在线观看| tocl精华| 手机成人av网站| АⅤ资源中文在线天堂| 精品99又大又爽又粗少妇毛片 | 欧美日韩精品网址| 亚洲av电影在线进入| 亚洲男人的天堂狠狠| 国产极品精品免费视频能看的| 露出奶头的视频| 一卡2卡三卡四卡精品乱码亚洲| 亚洲国产高清在线一区二区三| 90打野战视频偷拍视频| 国产高清videossex| 在线观看av片永久免费下载| 免费人成视频x8x8入口观看| 中文字幕av在线有码专区| av国产免费在线观看| 国产精品嫩草影院av在线观看 | 婷婷丁香在线五月| 嫩草影视91久久| 久久亚洲真实| 国产成+人综合+亚洲专区| 免费电影在线观看免费观看| www国产在线视频色| 欧美三级亚洲精品| 国产高清有码在线观看视频| 国产激情偷乱视频一区二区| 黄色女人牲交| 狂野欧美激情性xxxx| 久久精品91蜜桃| 偷拍熟女少妇极品色| 最新美女视频免费是黄的| 日韩欧美 国产精品| 国产黄色小视频在线观看| 欧美大码av| 精品人妻1区二区| 国模一区二区三区四区视频| 香蕉久久夜色| 亚洲熟妇熟女久久| 成人18禁在线播放| 亚洲欧美日韩无卡精品| 国产麻豆成人av免费视频| 一个人看的www免费观看视频| 女生性感内裤真人,穿戴方法视频| 欧美另类亚洲清纯唯美| 日本免费一区二区三区高清不卡| 日韩欧美精品免费久久 | 日本五十路高清| 欧美xxxx黑人xx丫x性爽| 国产探花在线观看一区二区| 欧美午夜高清在线| 亚洲精品456在线播放app | av天堂中文字幕网| 少妇裸体淫交视频免费看高清| 九色国产91popny在线| 日韩成人在线观看一区二区三区| 麻豆国产av国片精品| 国内精品一区二区在线观看| 女生性感内裤真人,穿戴方法视频| 蜜桃久久精品国产亚洲av| 两个人的视频大全免费| 欧美激情在线99| 中文字幕久久专区| 丰满的人妻完整版| 中国美女看黄片| 欧美最黄视频在线播放免费| 久久久久亚洲av毛片大全| 一个人看的www免费观看视频| 五月伊人婷婷丁香| 夜夜爽天天搞| 久久久国产成人精品二区| 两个人看的免费小视频| 两人在一起打扑克的视频| 精品无人区乱码1区二区| 国产成人a区在线观看| xxx96com| 搞女人的毛片| 在线观看av片永久免费下载| 欧美黄色片欧美黄色片| 久久久色成人| 色综合婷婷激情| 男女午夜视频在线观看| 成人午夜高清在线视频| 国内久久婷婷六月综合欲色啪| 精品国产亚洲在线| 丰满乱子伦码专区| 精品午夜福利视频在线观看一区| 国产乱人伦免费视频| 国产精品,欧美在线| 国产精品嫩草影院av在线观看 | 在线观看66精品国产| 18禁国产床啪视频网站| 99在线视频只有这里精品首页| 国产亚洲精品综合一区在线观看| 色噜噜av男人的天堂激情| 久久九九热精品免费| 欧美区成人在线视频| 久久亚洲精品不卡| 国产成人影院久久av| 亚洲av成人精品一区久久| 日韩精品青青久久久久久| 国产伦人伦偷精品视频| 精品日产1卡2卡| 国产精品久久久久久久电影 | 免费人成在线观看视频色| 国产三级在线视频| 亚洲欧美日韩卡通动漫| 国产在线精品亚洲第一网站| 嫩草影视91久久| 国产精品久久久久久人妻精品电影| 国产aⅴ精品一区二区三区波| 国产高清视频在线播放一区| 在线观看美女被高潮喷水网站 | 一级黄片播放器| 成人特级黄色片久久久久久久| 91久久精品国产一区二区成人 | 欧美性猛交黑人性爽| 制服人妻中文乱码| 在线免费观看的www视频| 久久伊人香网站| 97人妻精品一区二区三区麻豆| 精品熟女少妇八av免费久了| 我的老师免费观看完整版| 黄片大片在线免费观看| 九九在线视频观看精品| 18禁裸乳无遮挡免费网站照片| 白带黄色成豆腐渣| 天天躁日日操中文字幕| 亚洲国产精品合色在线| 超碰av人人做人人爽久久 | 亚洲国产欧洲综合997久久,| 国产色婷婷99| 九色成人免费人妻av| 精品久久久久久久久久久久久| 最新中文字幕久久久久| 成熟少妇高潮喷水视频| 一a级毛片在线观看| 少妇的丰满在线观看| 午夜免费成人在线视频| 在线看三级毛片| 日本免费一区二区三区高清不卡| 日韩有码中文字幕| 男人舔奶头视频| 18禁黄网站禁片午夜丰满| 日本黄色视频三级网站网址| 毛片女人毛片| 每晚都被弄得嗷嗷叫到高潮| 欧美日韩一级在线毛片| 老熟妇仑乱视频hdxx| 国产欧美日韩一区二区精品| 99久久久亚洲精品蜜臀av| 真人一进一出gif抽搐免费| 国产极品精品免费视频能看的| 一本久久中文字幕| 身体一侧抽搐| 可以在线观看的亚洲视频| 一进一出抽搐gif免费好疼| 午夜精品在线福利| 午夜福利高清视频| 亚洲人与动物交配视频| 女人高潮潮喷娇喘18禁视频| 欧美色欧美亚洲另类二区| 男人舔奶头视频| 中文字幕精品亚洲无线码一区| 久久精品人妻少妇| e午夜精品久久久久久久| 亚洲真实伦在线观看| 国产日本99.免费观看| 亚洲精品在线观看二区| 国产69精品久久久久777片| 国产野战对白在线观看| 性欧美人与动物交配| 在线视频色国产色| 99热这里只有精品一区| 99久久精品热视频| 国产 一区 欧美 日韩| 一进一出好大好爽视频| 夜夜躁狠狠躁天天躁| 国产欧美日韩精品亚洲av| 脱女人内裤的视频| 一个人免费在线观看的高清视频| 成人永久免费在线观看视频| 69人妻影院| 久久久久国产精品人妻aⅴ院| 女人十人毛片免费观看3o分钟| 亚洲欧美日韩东京热| av视频在线观看入口| 欧美不卡视频在线免费观看| 午夜老司机福利剧场| 欧美区成人在线视频| 男插女下体视频免费在线播放| 熟女电影av网| 麻豆成人午夜福利视频| 又粗又爽又猛毛片免费看| 午夜激情欧美在线| 国产野战对白在线观看| 色综合欧美亚洲国产小说| av欧美777| 亚洲男人的天堂狠狠| 久久精品国产亚洲av香蕉五月| www.熟女人妻精品国产| 日本精品一区二区三区蜜桃| 窝窝影院91人妻| 亚洲精品国产精品久久久不卡| 脱女人内裤的视频| 黄色视频,在线免费观看| 国产免费男女视频| 国产精品久久久久久人妻精品电影| 国产精品98久久久久久宅男小说| 亚洲五月婷婷丁香| 每晚都被弄得嗷嗷叫到高潮| aaaaa片日本免费| 亚洲欧美日韩无卡精品| 日本在线视频免费播放| 波多野结衣高清作品| 国产精品野战在线观看| 日韩欧美免费精品| 国产精品国产高清国产av| 亚洲七黄色美女视频| 亚洲国产精品合色在线| 一本久久中文字幕| 中文字幕av成人在线电影| aaaaa片日本免费| 国产成人系列免费观看| 99久久成人亚洲精品观看| 亚洲av免费在线观看| 成人一区二区视频在线观看| 国产精品自产拍在线观看55亚洲| 国产精品国产高清国产av| 国模一区二区三区四区视频| 国产免费一级a男人的天堂| 久99久视频精品免费| 日韩欧美国产在线观看| 久久中文看片网| 夜夜躁狠狠躁天天躁| 亚洲av日韩精品久久久久久密| 欧美日韩国产亚洲二区| 亚洲精品影视一区二区三区av| 全区人妻精品视频| 成人av在线播放网站| 日韩精品青青久久久久久| 亚洲一区高清亚洲精品| 国产免费av片在线观看野外av| 精品一区二区三区av网在线观看| 变态另类丝袜制服| 欧美乱色亚洲激情| 中亚洲国语对白在线视频| 亚洲成人免费电影在线观看| 久99久视频精品免费| 午夜免费成人在线视频| 狂野欧美激情性xxxx| 久久精品国产亚洲av香蕉五月| 制服人妻中文乱码| 久久久国产精品麻豆| 伊人久久精品亚洲午夜| 一本久久中文字幕| 波多野结衣高清无吗| 97超级碰碰碰精品色视频在线观看| 亚洲国产精品sss在线观看| 午夜福利成人在线免费观看| 国产精品免费一区二区三区在线| 小蜜桃在线观看免费完整版高清| 欧美一区二区亚洲| 国产乱人伦免费视频| 久久精品91无色码中文字幕| 欧美三级亚洲精品| 国产精品嫩草影院av在线观看 | 国产麻豆成人av免费视频| 三级国产精品欧美在线观看| 久久九九热精品免费| 成人国产一区最新在线观看| 一卡2卡三卡四卡精品乱码亚洲| 精品乱码久久久久久99久播| 99久久99久久久精品蜜桃| 欧美激情在线99| 精品国产亚洲在线| 桃色一区二区三区在线观看| 久久久成人免费电影| 18禁黄网站禁片午夜丰满| 久久人人精品亚洲av| 国产精品永久免费网站| 成年女人永久免费观看视频| 免费看光身美女| 国产成人影院久久av| 身体一侧抽搐| 又爽又黄无遮挡网站| 国产蜜桃级精品一区二区三区| 夜夜躁狠狠躁天天躁| 欧美性猛交黑人性爽| 国产亚洲精品综合一区在线观看| 最近最新中文字幕大全免费视频| 夜夜看夜夜爽夜夜摸| 99热6这里只有精品| av欧美777| 国产综合懂色| 亚洲无线在线观看| 熟妇人妻久久中文字幕3abv| 亚洲五月婷婷丁香| 国产99白浆流出| 国产真实乱freesex| 成人三级黄色视频| 精品一区二区三区av网在线观看| 免费看美女性在线毛片视频| 熟女电影av网| 国产亚洲欧美98| 香蕉av资源在线| 在线国产一区二区在线| 亚洲精华国产精华精| 每晚都被弄得嗷嗷叫到高潮| 91麻豆av在线| 亚洲,欧美精品.| 中文资源天堂在线| 日韩av在线大香蕉| 日本免费一区二区三区高清不卡| 首页视频小说图片口味搜索| 一区福利在线观看| 99精品在免费线老司机午夜| 国产高清有码在线观看视频| 麻豆久久精品国产亚洲av| www国产在线视频色| 美女高潮喷水抽搐中文字幕| 国产熟女xx| www.www免费av| 久久久久久人人人人人| 精品久久久久久成人av| 色吧在线观看| 久久精品国产综合久久久| 男女视频在线观看网站免费| 久久精品人妻少妇| 亚洲第一电影网av| 一个人免费在线观看的高清视频| 久久国产精品影院| 97超级碰碰碰精品色视频在线观看| 欧美午夜高清在线| 香蕉久久夜色| 欧美乱妇无乱码| 美女大奶头视频| 国产色婷婷99| 久久久久久久精品吃奶| 日韩人妻高清精品专区| 久久伊人香网站| 一个人免费在线观看的高清视频| 久久国产精品影院| e午夜精品久久久久久久| 丰满人妻一区二区三区视频av | 国产国拍精品亚洲av在线观看 | 一二三四社区在线视频社区8| av专区在线播放| 国产一区二区三区在线臀色熟女| 亚洲一区二区三区不卡视频| 亚洲欧美一区二区三区黑人| 国产精品一区二区三区四区免费观看 | 久久久色成人| 亚洲成人中文字幕在线播放| 一级毛片女人18水好多| av视频在线观看入口| 国产爱豆传媒在线观看| 成人18禁在线播放| 99国产综合亚洲精品| 精品一区二区三区视频在线观看免费| 欧美3d第一页| 五月玫瑰六月丁香| 日韩国内少妇激情av| 亚洲成av人片免费观看| 欧美+亚洲+日韩+国产| 久久草成人影院| 日韩欧美一区二区三区在线观看| 观看免费一级毛片| 国产一区二区亚洲精品在线观看| 中文资源天堂在线| 亚洲av熟女| 欧美日韩综合久久久久久 | 少妇高潮的动态图| 久久天躁狠狠躁夜夜2o2o| 国产99白浆流出| 中文字幕精品亚洲无线码一区| 精品久久久久久,| 内地一区二区视频在线| 丰满人妻一区二区三区视频av | 亚洲真实伦在线观看| 色av中文字幕| 久久中文看片网| 国产激情偷乱视频一区二区| 欧美一区二区亚洲| 欧美不卡视频在线免费观看| 高清毛片免费观看视频网站| 国产高清视频在线播放一区| 最新在线观看一区二区三区| 88av欧美| 国产精品国产高清国产av| 国产中年淑女户外野战色| 午夜免费观看网址| 免费看光身美女| 国产麻豆成人av免费视频| 国产私拍福利视频在线观看| 国产成+人综合+亚洲专区| 国产真实乱freesex| 色综合亚洲欧美另类图片| 内射极品少妇av片p| 久9热在线精品视频| 国产精品av视频在线免费观看| 日韩欧美在线乱码| 欧美成狂野欧美在线观看| 国产主播在线观看一区二区| 亚洲无线观看免费| 99在线视频只有这里精品首页| 九九久久精品国产亚洲av麻豆| 国产伦一二天堂av在线观看| 别揉我奶头~嗯~啊~动态视频| 久久这里只有精品中国| 91在线观看av| 久久久国产成人免费| 香蕉av资源在线| 成人高潮视频无遮挡免费网站|