Enhancing Cyberattack Detection in IoT Environments Through Advanced Resampling Techniques

As the world increasingly relies on emerging technologies like the Internet of Things, there is a growing demand for large-scale distributed software to perform various tasks, facilitate communication, and share resources between devices. However, the implementation and configuration of such softwar...

Full description

Saved in:
Bibliographic Details
Published inInternational Conference on Systems, Signals, and Image Processing (Online) pp. 1 - 6
Main Authors Tojeiro, Carlos A. C., Lucas, Thiago J., Passos, Leandro A., Rodrigues, Douglas, Prado, Simone G. D., Papa, Joao Paulo, Da Costa, Kelton A. P.
Format Conference Proceeding
LanguageEnglish
Published IEEE 09.07.2024
Subjects
Online AccessGet full text
ISSN2157-8702
DOI10.1109/IWSSIP62407.2024.10634015

Cover

Loading…
Abstract As the world increasingly relies on emerging technologies like the Internet of Things, there is a growing demand for large-scale distributed software to perform various tasks, facilitate communication, and share resources between devices. However, the implementation and configuration of such softwares can create openings for intrusion attacks through vulnerabilities and weaknesses. To address this concern, we have developed a machine-learning solution that leverages Logistic Regression and Random Forest classifiers with data balancing techniques to classify intrusion attacks accurately. Our experiments demonstrated the most effective results using the Random Forest classifier and oversampling techniques.
AbstractList As the world increasingly relies on emerging technologies like the Internet of Things, there is a growing demand for large-scale distributed software to perform various tasks, facilitate communication, and share resources between devices. However, the implementation and configuration of such softwares can create openings for intrusion attacks through vulnerabilities and weaknesses. To address this concern, we have developed a machine-learning solution that leverages Logistic Regression and Random Forest classifiers with data balancing techniques to classify intrusion attacks accurately. Our experiments demonstrated the most effective results using the Random Forest classifier and oversampling techniques.
Author Passos, Leandro A.
Papa, Joao Paulo
Rodrigues, Douglas
Prado, Simone G. D.
Da Costa, Kelton A. P.
Tojeiro, Carlos A. C.
Lucas, Thiago J.
Author_xml – sequence: 1
  givenname: Carlos A. C.
  surname: Tojeiro
  fullname: Tojeiro, Carlos A. C.
  email: carlos.tojeiro@unesp.br
  organization: São Paulo State University,Department of Computing,Bauru,Brazil
– sequence: 2
  givenname: Thiago J.
  surname: Lucas
  fullname: Lucas, Thiago J.
  email: t.lucas@unesp.br
  organization: São Paulo State University,Department of Computing,Bauru,Brazil
– sequence: 3
  givenname: Leandro A.
  surname: Passos
  fullname: Passos, Leandro A.
  email: leandro.passos@unesp.br
  organization: São Paulo State University,Department of Computing,Bauru,Brazil
– sequence: 4
  givenname: Douglas
  surname: Rodrigues
  fullname: Rodrigues, Douglas
  email: d.rodrigues@unesp.br
  organization: São Paulo State University,Department of Computing,Bauru,Brazil
– sequence: 5
  givenname: Simone G. D.
  surname: Prado
  fullname: Prado, Simone G. D.
  email: simone.prado@unesp.br
  organization: São Paulo State University,Department of Computing,Bauru,Brazil
– sequence: 6
  givenname: Joao Paulo
  surname: Papa
  fullname: Papa, Joao Paulo
  email: joao.papa@unesp.br
  organization: São Paulo State University,Department of Computing,Bauru,Brazil
– sequence: 7
  givenname: Kelton A. P.
  surname: Da Costa
  fullname: Da Costa, Kelton A. P.
  email: kelton.costa@unesp.br
  organization: São Paulo State University,Department of Computing,Bauru,Brazil
BookMark eNo1kM1OwkAURkejiYi8gYvxAYp3Zjp_S4KoTUg0UmPihkynt3QUptgWEt5ejLr5zuqcxXdJzmITkZAbBmPGwN5mb4tF9qx4CnrMgadjBkqkwOQJGVltjZAgLDNGnZIBZ1InRgO_IKOu-wAAwRnTXAzI-yzWLvoQV3R6KLB1fe_8J73DHn0fmkhDpFmT01nch7aJG4x9R_O6bXarmk7K_dHFkr5g5zbb9U8lR1_H8LXD7oqcV27d4eiPQ_J6P8unj8n86SGbTuZJYFr1iSidN14zZ5TyspJGCqtSQGcZGCOZFM5YxIJXx9W8MFJrp6XAtASHZSqG5Pq3GxBxuW3DxrWH5f8d4huh_Fen
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/IWSSIP62407.2024.10634015
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9798350391886
EISSN 2157-8702
EndPage 6
ExternalDocumentID 10634015
Genre orig-research
GrantInformation_xml – fundername: Petrobras
  funderid: 10.13039/501100004225
GroupedDBID 6IE
6IL
6IN
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
OCL
RIE
RIL
ID FETCH-LOGICAL-i176t-3dac8c71a866c5f58539640ea910885153a89eeb2f9ee72b8577a753e4d0aed43
IEDL.DBID RIE
IngestDate Wed Aug 27 02:30:58 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i176t-3dac8c71a866c5f58539640ea910885153a89eeb2f9ee72b8577a753e4d0aed43
PageCount 6
ParticipantIDs ieee_primary_10634015
PublicationCentury 2000
PublicationDate 2024-July-9
PublicationDateYYYYMMDD 2024-07-09
PublicationDate_xml – month: 07
  year: 2024
  text: 2024-July-9
  day: 09
PublicationDecade 2020
PublicationTitle International Conference on Systems, Signals, and Image Processing (Online)
PublicationTitleAbbrev IWSSIP
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0003211723
Score 1.8784592
Snippet As the world increasingly relies on emerging technologies like the Internet of Things, there is a growing demand for large-scale distributed software to...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Cyberattack
Cybersecurity
Image processing
Internet of Things
Intrusion Detection
Logistic regression
Performance evaluation
Random forests
Resampling
Software
Task analysis
Title Enhancing Cyberattack Detection in IoT Environments Through Advanced Resampling Techniques
URI https://ieeexplore.ieee.org/document/10634015
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1dS8MwFA1uD6Ivfk38JoKvrV2TpumjzA0nOIZ0OHwZaZroGGTiugf99d6k7ZyC4EspgYaQS3NzknPORehKQlgDoWOP6oR6NNTEE8xeIYaZTiItg8wJhR8G7G5E78fRuBKrOy2MUsqRz5RvX91dfj6XS3tUBn84I4AHogZqAHIrxVqrAxUCUCYOySa6rHw0r_tPsCANmcUsAARD6tff_6ik4hJJbwcN6iGU_JGZvywyX37-cmf89xh3Uetbs4eHq2y0hzaU2Ufba3aDB-i5a16tvYZ5wZ2PzLopF0LO8K0qHB_L4KnB_XmKu2viN5yWhXzwTUUWwI9qISwNHXpJawPYRQuNet20c-dVtRW8aTtmhUdyIbmM24IzJiMNoIEkECMlYPvAYRcWEcETBbBbwzMOMx7FsQBoo2geCJVTcoiaZm7UEcKRygnJKRe2XSZtLqxBjAxUwLiGFHmMWnaaJm-lfcaknqGTP9pP0ZaNluPEJmeoWbwv1Tlk_iK7cBH_Aj4ZrbU
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1dS8MwFA06wY8XvyZ-G8HXzq5p0vRR5mTTbQzpcPgy0jTRMejEdQ_6671J2zkFwZdS8hBCLu29JznnXISuJITVFTpwfB36ju9p4ghmrhC9WIdUSze2QuFuj7UG_v2QDguxutXCKKUs-UzVzKu9y0-mcm6OyuALZwTwAF1Fa9SocXO51uJIhQCYCTyyji4LJ83r9hP8kvrMoBaAgp5fK2f40UvFppK7bdQrF5EzSCa1eRbX5Ocvf8Z_r3IHVb9Ve7i_yEe7aEWle2hryXBwHz0301djsJG-4MZHbPyUMyEn-FZllpGV4nGK29MIN5fkbzjKW_ngm4IugB_VTBgiOswSlRawsyoa3DWjRsspuis443rAMockQnIZ1AVnTFINsIGEECUloIDgUIdRInioAHhreAZezGkQCAA3yk9coRKfHKBKOk3VIcJUJYQkPhdmXIZ1LoxFjHSVy7iGJHmEqmabRm-5gcao3KHjP8Yv0EYr6nZGnXbv4QRtmshZhmx4iirZ-1ydQR2Qxec2-l97A7D9
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=International+Conference+on+Systems%2C+Signals%2C+and+Image+Processing+%28Online%29&rft.atitle=Enhancing+Cyberattack+Detection+in+IoT+Environments+Through+Advanced+Resampling+Techniques&rft.au=Tojeiro%2C+Carlos+A.+C.&rft.au=Lucas%2C+Thiago+J.&rft.au=Passos%2C+Leandro+A.&rft.au=Rodrigues%2C+Douglas&rft.date=2024-07-09&rft.pub=IEEE&rft.eissn=2157-8702&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FIWSSIP62407.2024.10634015&rft.externalDocID=10634015