Cybersecurity Mechanism for Automatic Detection of IoT Intrusions Using Machine Learning
- 1 Department of Information Systems, University of Nouakchott Al Aasriya, Nouakchott, Mauritania
- 2 Higher School of Polytechnic of Dakar, University Cheikh Anta Diop, Dakar, Senegal
- 3 Department of Mathematics and Computer Science, Nouakchott University, Nouakchott, Mauritania
Abstract
This article proposes an ML-based cyber security mechanism to optimize intrusion detection that attacks internet objects (IoT). Our approach consists of bringing together several learning methods namely supervised learning, unsupervised learning and reinforcement learning within the same Canvas. The objective is to choose among them the most optimal for classifying and predicting attacks while minimizing the impact linked to the learning costs of these attacks. In our proposed model, we have used a modular design to facilitate the implementation of the intrusion detection engine. The first Meta-learning module is used to collect metadata related to existing algorithmic parameters and learning methods in ML. As for the second module, it allows the use of a cost-sensitive learning technique so that the model is informed of the cost of intrusion detection scenarios. Therefore, among the ML classification algorithms, we choose the one whose automatic learning of intrusions is the least expensive in terms of its speed and its quality in predicting reality. This will make it possible to control the level of acceptable risk in relation to the typology of cyber-attacks. We then simulated our solution using the Weka tool. This led to questionable results, which can be subject to the evaluation of model performance. These results show that the classification quality rate is 93.66% and the classification consistency rate is 0.882 (close to unit 1). This proves the accuracy and performance of the model.
DOI: https://doi.org/10.3844/jcssp.2024.44.51
Copyright: © 2024 Cheikhane Seyed, MBaye Kebe, Mohamed El Moustapha El Arby, El Benany Mohamed Mahmoud and Cheikhne Mohamed Mahmoud Seyidi. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
- 1,643 Views
- 871 Downloads
- 1 Citations
Download
Keywords
- IA
- IoT
- Cyber Security
- Machine Learning
- Weka Tools
- Performance Evaluation