Enhancing Cyberattack Detection in IoT Environments Through Advanced Resampling Techniques
As the world increasingly relies on emerging technologies like the Internet of Things, there is a growing demand for large-scale distributed software to perform various tasks, facilitate communication, and share resources between devices. However, the implementation and configuration of such softwar...
Saved in:
Published in | International Conference on Systems, Signals, and Image Processing (Online) pp. 1 - 6 |
---|---|
Main Authors | , , , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
09.07.2024
|
Subjects | |
Online Access | Get full text |
ISSN | 2157-8702 |
DOI | 10.1109/IWSSIP62407.2024.10634015 |
Cover
Loading…
Abstract | As the world increasingly relies on emerging technologies like the Internet of Things, there is a growing demand for large-scale distributed software to perform various tasks, facilitate communication, and share resources between devices. However, the implementation and configuration of such softwares can create openings for intrusion attacks through vulnerabilities and weaknesses. To address this concern, we have developed a machine-learning solution that leverages Logistic Regression and Random Forest classifiers with data balancing techniques to classify intrusion attacks accurately. Our experiments demonstrated the most effective results using the Random Forest classifier and oversampling techniques. |
---|---|
AbstractList | As the world increasingly relies on emerging technologies like the Internet of Things, there is a growing demand for large-scale distributed software to perform various tasks, facilitate communication, and share resources between devices. However, the implementation and configuration of such softwares can create openings for intrusion attacks through vulnerabilities and weaknesses. To address this concern, we have developed a machine-learning solution that leverages Logistic Regression and Random Forest classifiers with data balancing techniques to classify intrusion attacks accurately. Our experiments demonstrated the most effective results using the Random Forest classifier and oversampling techniques. |
Author | Passos, Leandro A. Papa, Joao Paulo Rodrigues, Douglas Prado, Simone G. D. Da Costa, Kelton A. P. Tojeiro, Carlos A. C. Lucas, Thiago J. |
Author_xml | – sequence: 1 givenname: Carlos A. C. surname: Tojeiro fullname: Tojeiro, Carlos A. C. email: carlos.tojeiro@unesp.br organization: São Paulo State University,Department of Computing,Bauru,Brazil – sequence: 2 givenname: Thiago J. surname: Lucas fullname: Lucas, Thiago J. email: t.lucas@unesp.br organization: São Paulo State University,Department of Computing,Bauru,Brazil – sequence: 3 givenname: Leandro A. surname: Passos fullname: Passos, Leandro A. email: leandro.passos@unesp.br organization: São Paulo State University,Department of Computing,Bauru,Brazil – sequence: 4 givenname: Douglas surname: Rodrigues fullname: Rodrigues, Douglas email: d.rodrigues@unesp.br organization: São Paulo State University,Department of Computing,Bauru,Brazil – sequence: 5 givenname: Simone G. D. surname: Prado fullname: Prado, Simone G. D. email: simone.prado@unesp.br organization: São Paulo State University,Department of Computing,Bauru,Brazil – sequence: 6 givenname: Joao Paulo surname: Papa fullname: Papa, Joao Paulo email: joao.papa@unesp.br organization: São Paulo State University,Department of Computing,Bauru,Brazil – sequence: 7 givenname: Kelton A. P. surname: Da Costa fullname: Da Costa, Kelton A. P. email: kelton.costa@unesp.br organization: São Paulo State University,Department of Computing,Bauru,Brazil |
BookMark | eNo1kM1OwkAURkejiYi8gYvxAYp3Zjp_S4KoTUg0UmPihkynt3QUptgWEt5ejLr5zuqcxXdJzmITkZAbBmPGwN5mb4tF9qx4CnrMgadjBkqkwOQJGVltjZAgLDNGnZIBZ1InRgO_IKOu-wAAwRnTXAzI-yzWLvoQV3R6KLB1fe_8J73DHn0fmkhDpFmT01nch7aJG4x9R_O6bXarmk7K_dHFkr5g5zbb9U8lR1_H8LXD7oqcV27d4eiPQ_J6P8unj8n86SGbTuZJYFr1iSidN14zZ5TyspJGCqtSQGcZGCOZFM5YxIJXx9W8MFJrp6XAtASHZSqG5Pq3GxBxuW3DxrWH5f8d4huh_Fen |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/IWSSIP62407.2024.10634015 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISBN | 9798350391886 |
EISSN | 2157-8702 |
EndPage | 6 |
ExternalDocumentID | 10634015 |
Genre | orig-research |
GrantInformation_xml | – fundername: Petrobras funderid: 10.13039/501100004225 |
GroupedDBID | 6IE 6IL 6IN AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK OCL RIE RIL |
ID | FETCH-LOGICAL-i176t-3dac8c71a866c5f58539640ea910885153a89eeb2f9ee72b8577a753e4d0aed43 |
IEDL.DBID | RIE |
IngestDate | Wed Aug 27 02:30:58 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i176t-3dac8c71a866c5f58539640ea910885153a89eeb2f9ee72b8577a753e4d0aed43 |
PageCount | 6 |
ParticipantIDs | ieee_primary_10634015 |
PublicationCentury | 2000 |
PublicationDate | 2024-July-9 |
PublicationDateYYYYMMDD | 2024-07-09 |
PublicationDate_xml | – month: 07 year: 2024 text: 2024-July-9 day: 09 |
PublicationDecade | 2020 |
PublicationTitle | International Conference on Systems, Signals, and Image Processing (Online) |
PublicationTitleAbbrev | IWSSIP |
PublicationYear | 2024 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0003211723 |
Score | 1.8784592 |
Snippet | As the world increasingly relies on emerging technologies like the Internet of Things, there is a growing demand for large-scale distributed software to... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Cyberattack Cybersecurity Image processing Internet of Things Intrusion Detection Logistic regression Performance evaluation Random forests Resampling Software Task analysis |
Title | Enhancing Cyberattack Detection in IoT Environments Through Advanced Resampling Techniques |
URI | https://ieeexplore.ieee.org/document/10634015 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1dS8MwFA1uD6Ivfk38JoKvrV2TpumjzA0nOIZ0OHwZaZroGGTiugf99d6k7ZyC4EspgYaQS3NzknPORehKQlgDoWOP6oR6NNTEE8xeIYaZTiItg8wJhR8G7G5E78fRuBKrOy2MUsqRz5RvX91dfj6XS3tUBn84I4AHogZqAHIrxVqrAxUCUCYOySa6rHw0r_tPsCANmcUsAARD6tff_6ik4hJJbwcN6iGU_JGZvywyX37-cmf89xh3Uetbs4eHq2y0hzaU2Ufba3aDB-i5a16tvYZ5wZ2PzLopF0LO8K0qHB_L4KnB_XmKu2viN5yWhXzwTUUWwI9qISwNHXpJawPYRQuNet20c-dVtRW8aTtmhUdyIbmM24IzJiMNoIEkECMlYPvAYRcWEcETBbBbwzMOMx7FsQBoo2geCJVTcoiaZm7UEcKRygnJKRe2XSZtLqxBjAxUwLiGFHmMWnaaJm-lfcaknqGTP9pP0ZaNluPEJmeoWbwv1Tlk_iK7cBH_Aj4ZrbU |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1dS8MwFA06wY8XvyZ-G8HXzq5p0vRR5mTTbQzpcPgy0jTRMejEdQ_6671J2zkFwZdS8hBCLu29JznnXISuJITVFTpwfB36ju9p4ghmrhC9WIdUSze2QuFuj7UG_v2QDguxutXCKKUs-UzVzKu9y0-mcm6OyuALZwTwAF1Fa9SocXO51uJIhQCYCTyyji4LJ83r9hP8kvrMoBaAgp5fK2f40UvFppK7bdQrF5EzSCa1eRbX5Ocvf8Z_r3IHVb9Ve7i_yEe7aEWle2hryXBwHz0301djsJG-4MZHbPyUMyEn-FZllpGV4nGK29MIN5fkbzjKW_ngm4IugB_VTBgiOswSlRawsyoa3DWjRsspuis443rAMockQnIZ1AVnTFINsIGEECUloIDgUIdRInioAHhreAZezGkQCAA3yk9coRKfHKBKOk3VIcJUJYQkPhdmXIZ1LoxFjHSVy7iGJHmEqmabRm-5gcao3KHjP8Yv0EYr6nZGnXbv4QRtmshZhmx4iirZ-1ydQR2Qxec2-l97A7D9 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=International+Conference+on+Systems%2C+Signals%2C+and+Image+Processing+%28Online%29&rft.atitle=Enhancing+Cyberattack+Detection+in+IoT+Environments+Through+Advanced+Resampling+Techniques&rft.au=Tojeiro%2C+Carlos+A.+C.&rft.au=Lucas%2C+Thiago+J.&rft.au=Passos%2C+Leandro+A.&rft.au=Rodrigues%2C+Douglas&rft.date=2024-07-09&rft.pub=IEEE&rft.eissn=2157-8702&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FIWSSIP62407.2024.10634015&rft.externalDocID=10634015 |