• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Internet of Things(IoT)Security Enhancement Using XGboost Machine Learning Techniques

    2023-12-12 15:50:28DanaDoghramachiandSiddeeqAmeen
    Computers Materials&Continua 2023年10期

    Dana F.Doghramachi and Siddeeq Y.Ameen

    1Department of Information Systems Engineering Techniques,Erbil Technical Engineering College,Erbil Polytechnic University,Erbil,44001,Iraq

    2Department of Energy Engineering,Technical College of Engineering,Duhok Polytechnic University,Duhok,42001,Iraq

    ABSTRACT The rapid adoption of the Internet of Things (IoT) across industries has revolutionized daily life by providing essential services and leisure activities.However,the inadequate software protection in IoT devices exposes them to cyberattacks with severe consequences.Intrusion Detection Systems(IDS)are vital in mitigating these risks by detecting abnormal network behavior and monitoring safe network traffic.The security research community has shown particular interest in leveraging Machine Learning(ML)approaches to develop practical IDS applications for general cyber networks and IoT environments.However,most available datasets related to Industrial IoT suffer from imbalanced class distributions.This study proposes a methodology that involves dataset preprocessing,including data cleaning,encoding,and normalization.The class imbalance is addressed by employing the Synthetic Minority Oversampling Technique(SMOTE)and performing feature reduction using correlation analysis.Multiple ML classifiers,including Logistic Regression,multi-layer perceptron,Decision Trees,Random Forest,and XGBoost,are employed to model IoT attacks.The effectiveness and robustness of the proposed method evaluate using the IoTID20 dataset,which represents current imbalanced IoT scenarios.The results highlight that the XGBoost model,integrated with SMOTE,achieves outstanding attack detection accuracy of 0.99 in binary classification,0.99 in multi-class classification,and 0.81 in multiple sub-classifications.These findings demonstrate our approach’s significant improvements to attack detection in imbalanced IoT datasets,establishing its superiority over existing IDS frameworks.

    KEYWORDS IoT;detection system;machine learning;SMOTE;XGboost

    1 Introduction

    The IoT is gaining popularity in various industries,significantly impacting people’s daily lives by providing essential services and leisure activities [1,2].This innovative technology enables the connection of physical objects from anywhere in the world,thanks to its integration with the Internet[3,4].However,the majority of IoT devices lack sufficient software protection and contain both evident and unnoticed vulnerabilities [5].Consequently,the development of IoT networks exposes them to exploitation by malicious actors who can launch extensive cyberattacks.These attacks can lead to severe consequences such as infrastructure damage,service disruptions,significant financial losses,and reputational harm to large corporations.Consequently,identifying vulnerable IoT devices and disconnecting them from the Internet before they can be compromised and added to an IoT botnet is a crucial security measure against these attacks[6–8].

    Several strategies can be highlighted for identifying and isolating IoT networks through access routers,thereby separating IoT bots and preventing device takeovers[1,9].Another approach involves passive detection and identification of bot attacks by analyzing all internal and networked IoT activities.However,given the scarcity of human resources and the enormous amount of data to be processed within a specific timeframe,utilizing human analysis for this purpose becomes costly[4].Hence,the application of artificial intelligence (AI) and machine learning (ML) becomes more practical.ML,as a technical suite of artificial intelligence,is capable of discovering,analyzing,and categorizing data.AI,on the other hand,refers to the ability of a mechanical device to emulate human intellectual processes.Based on these concepts,algorithms can be developed to facilitate automatic development,configuration,and even independent operation[10].Moreover,this enables us to detect cyberattacks with minimal errors and high speed.

    This paper aims to model IoT attacks at the binary,multiple,and sub-classification levels using ML models while addressing the issue of imbalanced data through the use of SMOTE.The study proposes the employment of SMOTE with Ensemble Learning to protect current IoT networks from nine different types of attacks.Balancing the dataset is crucial,and if it exhibits an imbalance,the widely used technique known as SMOTE is applied.This ensures that the dataset is appropriately balanced and ready for further analysis.Furthermore,the size of the data collection is reduced by identifying highly correlated features within the dataset and performing feature reduction.Additionally,a group of ML-based classifiers,namely Logistic Regression (LR),multi-layer perceptron (MLP),Decision Trees (DT),Random Forest (RF),and XGBoost (XGB),were employed.Finally,the effectiveness of the proposed feature selection and categorization methodologies was evaluated and compared to existing methods.

    This paper covers the theoretical framework of ML algorithms used in IoT modeling and the data balancing technique.It also discusses related works that have utilized the same dataset,followed by the presentation of the proposed methodology and the implementation and evaluation of the analysis system.

    2 Contributions

    The study addresses the challenge of imbalanced class distributions in IoT security datasets,and the contributions can be summarized as follows:

    1.A proposed methodology includes dataset preprocessing techniques and using SMOTE to address the class imbalance.

    2.Multiple ML classifiers,including LR,MLP,DT,RF,and XGBoost,are evaluated for modeling IoT attacks,and XGBoost is identified as a superior model for attack detection accuracy.

    3.Evaluate the proposed method using the IoTID20 dataset,representing modern imbalanced IoT scenarios and demonstrating its effectiveness in different classification scenarios.

    4.The proposed approach outperforms existing IDS frameworks in detecting attacks in imbalanced IoT datasets based on accuracy metrics and comparison with other classifiers.

    3 Related Work

    Various ML techniques are used to detect attacks in IoT systems.Some studies have focused on identifying attacks by analyzing abnormal patterns in network traffic.One such approach is the Self-Evolving Host-based Intrusion Detection System (SEHIDS),which utilizes a lightweight Artificial Neural Network (ANN) IDS system for IoT networks [11].The core concept of SEHIDS involves equipping each IoT device with a miniature ANN architecture and a resource mechanism that enables the architecture to be trained and enhanced whenever the IoT device’s performance deteriorates.

    Another collaborative IDS system,MidSiot,is introduced and deployed at Internet and IoT local gateways [12].This IDS system operates in three phases: firstly,it identifies each IoT device present in the IoT network;secondly,it distinguishes between legitimate and erroneous network traffic;and finally,it determines the types of attacks directed at IoT devices.However,it should be noted that these methods often suffer from drawbacks in terms of cost and resource requirements,making them less feasible in practical implementations.

    Meanwhile,a group of researchers proposed a model addressing the problem of selecting appropriate hyperparameters for ANN models to detect attacks[13].In this model,a portion of the dataset is used to determine the hyperparameters that are most suited for reducing the overhead associated with designing the ANN architecture,configuring its functionality,and evaluating its performance.The aim is to detect five categorical attacks and nine sub-categorical assaults.

    In addition,another approach suggested in[14]is a deep-convolutional neural network(DCNN)-based IDS.The DCNN architecture consists of three densely connected layers and two convolutional layers.The experiments in this study employed the IoTID20 dataset.The suggested model underwent various optimization approaches,and the performance of optimization algorithms such as Adam,AdaMax,and Nadam was evaluated,with Adam,AdaMax,and Nadam demonstrating the best performance.However,it is worth noting that in certain data types,neural networks may exhibit bias during training toward majority classes,potentially resulting in imbalanced performance.

    While most studies have employed traditional ML algorithms and ensemble learning,a particular study [15] investigated the performance of various ML algorithms,such as DT,RF,and XGBoost(XGB),in predicting network attacks on IoT devices.The authors found that DT algorithms generally exhibit higher accuracy than RF and gradient-boosting machines.However,RF algorithms outperformed others regarding Area Under the ROC Curve (AUC) scores since they combined the results of multiple DTs.The study[16]employed the RF algorithm and One Hot Encoding technique with the IoTID20 dataset,which includes three targets,to validate their approach.Their findings reinforced that RF is typically the most accurate algorithm.In another study [17],multiple ML algorithms were applied to detect unusual behavior in IoT networks using the IoTID20 dataset.The researchers identified essential and strongly connected features and ranked them based on importance.They evaluated the dataset using 15 popular ML algorithms and concluded that Gradient Boosting performs best as a classifier.

    Additionally,the study[18]proposed a system for identifying compromised IoT devices utilizing various ML methods.The ML model was constructed using the IoTID20 dataset to detect abnormal behavior in IoT networks.For the experiment,4,000 random records from the dataset were selected.Two algorithms,Pearson’s correlation,and LR,were employed to choose the characteristics.Fifteen features were selected to classify packets as normal or anomalous.Based on the performance criteria outlined in the article,except for time,the results indicated that RF and AdaBoost classifiers provided highly similar and top-performing results.Overall,these studies demonstrate the efficacy of different ML algorithms in detecting attacks and unusual behavior in IoT networks,with DT,RF,and Gradient Boosting often exhibiting strong performance.

    The study[19]proposes a hybrid ML model that combines the XGBoost algorithm with decision tree-based feature selection techniques for IoT intrusion detection.The model achieved improved accuracy compared to traditional ML algorithms.In[20],the authors propose an intrusion detection system(IDS)for IoT networks using ensemble techniques such as bagging and boosting.They evaluate various ML algorithms and ensemble combinations to enhance the detection accuracy of IoT attacks.Le et al.[21]presents an ML-based IDS for IoT networks.It incorporates feature selection methods and voting ensemble techniques to improve the detection accuracy of attacks in IoT environments.In[22],the authors compare the performance of multiple ML algorithms,including DT,RF,support vector machines,and neural networks for intrusion detection in IoT networks.They evaluate the algorithms based on accuracy,precision,recall,and F1-score metrics.The study[23]proposes an IDS for IoT systems using ML algorithms.The authors compare the performance of LR,DT,and RF for detecting attacks in IoT networks.Paper[24]proposes an anomaly-based intrusion detection system(IDS) specifically designed for IoT applications.The system aims to detect attacks by identifying abnormal behavior patterns in IoT networks.The authors describe the architecture and functioning of the IDS,which involves collecting network traffic data,feature extraction,and anomaly detection using ML techniques.The study evaluates the performance of the proposed IDS using a dataset of IoT network traffic and compares it with other existing IDS approaches.In[25],they present a quantum trust and consultative transaction-based blockchain cybersecurity model for healthcare systems.The research focuses on addressing the security challenges in healthcare IoT applications.The proposed model incorporates quantum trust and blockchain technology to enhance the security and privacy of healthcare data.The authors discuss the model’s architecture,which involves using quantum key distribution,blockchain consensus mechanisms,and smart contracts.The study highlights the model’s potential to provide robust security for healthcare IoT systems.In [26],the authors present a novel measurement scheme for evaluating the security and privacy aspects of IoT applications utilizing ML algorithms.The research focuses on developing a comprehensive framework to assess the security and privacy levels of IoT applications.The authors proposed a set of security and privacy metrics and utilize ML algorithms to evaluate and classify IoT applications based on these metrics.The study discusses the implementation of the framework and presents experimental results using real-world IoT datasets.The findings demonstrate the effectiveness of the proposed scheme in assessing the security and privacy aspects of IoT applications.

    The gap in the research on methods of detecting IoT attacks using ML algorithms can be summarized in achieving performance accuracy with smaller datasets and fewer attributes that affect attack detection.As a result,the problem can be defined by the need for more recent IoTID20 datasets with many characteristics.Even when dataset sizes grow,most predictions are made using conventional ML techniques that do not improve attack detection accuracy,making it difficult to choose the optimum ML methodology for specific data.Moreover,most studies that use the IoTID20 dataset distinguish the presence of the attack and do not consider the type of attack and its sub-classification.Moreover,there is no indication of the imbalance between the data and its treatment.Finally,studies used single methods to identify feature selection,while more than one method could be hybridized.

    4 Machine Learning for IoT Security

    The primary focus of this study is the use of ML to detect and categorize system traffic threats.Various supervised ML techniques include LR,MLP,DT,RF,and XGB.In addition to data balancing using SMOTE,LR is one of the ML algorithms and one of the most popular classification algorithms because its steps are simple.It is a classification algorithm to classify data into separate classes when the response variable is categorical [11].LR aims to find a relationship between properties and the probability of a given outcome [27].A DT functions by removing representative items from a data collection and arranging them in trees according to the object’s value[11,28].A tree node represents each characteristic,and branches branching from this node indicate the relevant values [29].The starting node of the tree is at any functional node that best bisects the tree.Different criteria,such as the Gini index and the Information Gain,that best split the training data sets are utilized to pinpoint the first node[30].Multiple DTs are used in constructing RF to forecast more accurate and fault-tolerant categorization outcomes[15].Randomly built DTs are taught to provide categorization outcomes based on votes from most participants [31].While DTs may be seen as parts of RF,there are two different classification algorithms because,in contrast to DTs,which develop a set of rules during training to categorize incoming samples further,RF develops a subset of rules utilizing all DT members[11].

    Extreme Gradient Boosting is often known as an extreme boosting tree or an expanded version of the Gradient Boosting Machine technique[32].The Boosting ensemble algorithm can form a strong classifier with higher accuracy after the weighted superposition of multiple weak classifiers with lower accuracy to reduce errors and improve accuracy [33].The extreme gradient boosting algorithm is improved based on the Boosting algorithm.The objective function is minimized by using gradient descent for each generated tree and based on all the trees generated in the previous step[34].At the same time,the second-order Taylor expansion of the loss function is carried out in the XGB algorithm,and a regular term is added to the cost function to control the complexity of the model[11].

    In ML and data science,imbalanced data distribution is prevalent and usually occurs when observations in one category are much higher or lower than in other categories[35].ML algorithms tend to improve accuracy by minimizing errors,as they do not consider class distributions.This problem is prevalent in fraud detection,anomaly detection,facial recognition,etc.[36,37].On the other hand,SMOTE is one of the most commonly used oversampling methods to solve imbalance problems[38].It aims to balance the class distribution by randomly increasing minority class examples by replicating minority class examples[39].SMOTE synthesizes new minority instances among existing minority instances.It generates virtual training records by linear interpolation over the minority class.These synthetic training records are generated by randomly selecting one or more k-nearest neighbors for each example in the minority class[40,41].After the oversampling process,the data is reconstructed,and multiple classification models can be applied to the processed data[38].

    5 Proposed ML Techniques for IoT Security Enhancement

    5.1 System Layout

    To classify IoT attacks,data preprocessing was performed at the first preprocessing stage such that categorical data were converted into values using One-Hot encoding.Next,feature filtering to delete features without any effect on prediction accuracy,high correlation,and features with single values.To accomplish the tasks,three datasets are created according to the type of classification.The dataset is further divided into a training set and a test set.The training set is used to train ML models,and the dataset is used to test the performance of the selected models.After determining the best classifier to classify IoT attacks on the three levels,the balanced data is compared with the basic model,as shown in Fig.1.

    Figure 1:Proposed methodology for modeling IoT attacks

    Python has been used to develop models;the pseudocode of the proposed model is represented in Algorithm 1.

    Algorithm 1:Pseudocode OF XGB_SMOTE

    5.2 Dataset Preprocessing

    When developing an ML model,it is essential to decide which features should be used as input for the learning algorithm[32].Once data has been obtained from the IoTID20,the preprocessing is done using one-hot encoding.It is necessary to convert the tagged data into a numerical format because it is frequently not in a machine-readable form.In addition,the data contains features that are not useful in training classification algorithms,such as correlated or unimportant features.The unstructured data will thus be transformed into structured data using the following preprocessing methods.

    5.2.1 One-Hot Encoding

    One-Hot encoding is the representation of categorical variables as binary vectors.The One Hot encoding addresses the Category value that changed to a Column value of 0 or 1[42].The first column value corresponds to the true row values with a value of 1.The values in the other columns denote false,represented by the integer 0.The real value is between 0 and 1 if the values in the rows and columns match.To turn labels into numeric values,preprocessing one hot encoding is performed.

    5.2.2 Filtering Features

    In this study,two feature filtering techniques were used,the first is to delete the correlated features,and the second is to delete the features of importance that do not affect the classification accuracy.To find feature correlation,Pearson correlation was used.Pearson correlation generates a percentage correlation coefficient,abbreviated as r,that assesses the strength and direction of linear correlations between data groups [42,43].Features with a correlation of more than 98% were removed.Table 1 shows the correlation between the features.

    Table 1:Correlation of the features

    Feature importance analysis was performed using the built-in mechanism of the sklearn ensemble.The RF classifier method(feature_importances_attribute)implements the entropy approach to feature importance assessment.The results of the importance evaluation showed that there is zero importance in terms of classification accuracy,as shown in Table 2.

    Table 2:Lists of features with zero importance

    5.3 Dataset

    The IoTID20 data was created to find IoT network cyberattacks.SKT NGU and EZVIZ Wi-Fi cameras created the dataset utilizing smart home devices [44].This dataset’s key benefit is that it contains new information on detecting network interference and current communication data.This dataset has three label levels: binary,category,and subcategory,totaling 85 IoT network attributes.These categories are distributed for classification,as shown in Fig.2.

    Figure 2:Distribution of the target group at the level of(a)binary,(b)category,and(c)subcategory classifications

    5.4 Classification Problem

    When choosing a model for solving the considered classification problem,the quality of the most common ML models was assessed on a balanced and preprocessed subsample of IoT attacks of the IoTID20 dataset.The quality of the responses of classifiers (models) was compared using the following metrics(Accuracy,Precision,Recall,and F1).When determining the values of quality metrics,elements of the error matrix(confusion matrix)corresponding to the number of correct and incorrect answers based on the results of classifier testing should be found,as shown in Fig.3.

    Figure 3:Confusion matrix[45]

    In Fig.3,TP (True Positive) denotes a truly positive response,TN (True Negative) an actual negative response,FP(False Positive)a false positive response(False Positive,Type I error),FN(False Negative)a false negative response(missing attack,Type II error)[46].Taking into account the given designations,the used quality metrics are determined by the following expressions:

    Accuracy measures the proportion of all correctly classified instances(both positive and negative)out of the total number of instances evaluated.It provides an overall measure of how well the classifier performs.Precision is the proportion of True Positives(TP)to the total number of predicted positive instances (TP and FP).It represents the percentage of the correct positive predictions.Recall (also known as sensitivity or true positive rate)is the proportion of True Positives(TP)to the total number of actual positive instances (TP and FN).It represents the percentage of positive instances that are correctly identified by the classifier.Considering both metrics,the F1-score is a harmonic mean of precision and recall.It ranges from 0 to 1,with 1 being the best possible score.

    6 Results and Discussion

    6.1 Results

    In this study,the Python language was used in practical experiments.The Sklearn library was used to build ML models.Scikit-learn(sklearn)is a popular ML library in Python that provides a variety of tools for building predictive models.It is built on top of NumPy,SciPy,and the matplotlib libraries and offers a simple and efficient way to implement a wide range of ML algorithms,including classification,regression,clustering,and dimensionality reduction.The quality of the classifiers was assessed on an imbalanced,preprocessed IoT attack subsample of the IoTID20 dataset with an 80:20 ratio of normal and abnormal traffic (55 of the most significant features).The investigation was conducted with the IoTID20 dataset using a set of ML algorithms and suggested using the XGB algorithm for classification with SMOTE to balance data in the case of subcategory classifications.

    Initially,all models,DT,LR,MLP,RF,and XGB,values of quality measures are obtained using binary classification as shown in Fig.4.

    Figure 4:Performance of classification algorithms in binary classification

    It is clear from Fig.4 that DT and XGB models achieved the best accuracy,as it was 0.99 on various scales,followed by RF,which was 0.99 using accuracy and precision,and 0.98 using the Recall scale.While the performance of MLP and LR was acceptable on the Accuracy scale.MLP and LR were low on the Recall scale,indicating that these two models have a bias due to the imbalanced data set.In the second stage,models were tested in the case of multiple classifications of the attack type.The average precision and recall rates were taken in the results since the classification is multi-class.

    Another test on the five models compares different models’performance in predicting the attack type,as shown in Fig.5.

    Figure 5:Performance of classification models in category classification

    It is clear from Fig.5 that in the case of multiple classifications,DT and XGB achieved the best performance,as it was 0.99 for the three measures,followed by RF,which was 0.98.It is also noted that the performance of the models is balanced for the various algorithms,as it was 0.77 using MLP and 0.73 using LR for the three measures.

    Extra test for classification is achieved on the models based on the types of attacks and their subclassifications.It is important to note that SMOTE data balancing techniques are used even if classes are imbalanced.This will increase the number of tested models to six to have XGB_SMOTE.The results of this test are shown in Fig.6.

    Figure 6:Performance of classification models in subcategory classification

    It is clear from Fig.6 that in the multiple classification and subclassification,the SMOTE algorithm with XGB achieved the best performance was 0.81 according to accuracy and recall and 0.83 according to the precision scale,followed by the XGB algorithm without the balancing technique 0.79 for the three measures.To evaluate the performance of the proposed model,the receiver operating characteristic curve(ROC)is used to determine the discrimination threshold for each class in the submultiple classification.Fig.7 presents the ROC for each attack.

    To determine the proposed method’s efficiency,a comparison was made with previous studies that used the IoTID20 data set.The studies of [14,47] dealt with binary,multiple,and branching classifications,and the studies of [12,24] dealt with binary and multiple classifications,as shown in Table 3.In contrast,the studies of [27,33] dealt with binary classification;Table 3 presents the accuracy-based comparison for the three classification levels.

    Table 3:Accuracy comparison with previous studies

    In comparison with previous studies,it was concluded that the accuracy was approximately 0.99 by various methods in the case of binary classification.However,in the case of multiple classifications,the study of [12] achieved 0.99 as in the proposed method.In contrast,in the case of multiple subclassifications,the proposed method achieved the best performance with an accuracy of 0.81.

    Assessment and analysis of the results showed the possibility of applying modern ML methods in IoT attack detection systems.Moreover,the results of the proposed XGB with SMOTE for multiclass subcategory classification for a binary and multi-class category can classify attacks.The results showed that DT,RF,and XGB algorithms could identify the presence of an attack at the binary classification level with high accuracy,as shown in Fig.4.The superiorities of DT and XGB were noted in multiple classifications.In the case of multiple sub-classifications,the performance of collective learning algorithms was the best compared to DT,whereas the XGB is superior.The results indicate that boosting learning is suitable for modeling IoT attacks at the three levels.Despite the superiority of the boosting algorithm,it is still with an accuracy of 0.79.The results showed that the model’s performance improved when SMOTE technique was applied to balance the data,as the accuracy reached 0.81.Compared with previous studies,the proposed system achieves better accuracy.

    Figure 7:XGB_SMOTE ROC for each attack

    6.2 Discussion

    The discussion section provides a comprehensive analysis and interpretation of the study’s results.It thoroughly examines the findings’significance and implications,draws comparisons to existing literature,and addresses potential limitations and future research directions.

    This study proposed a methodology utilizing XGBoost ML techniques to enhance IoT security.The methodology encompassed various preprocessing techniques for the dataset,including data cleaning,encoding,and normalization to ensure data quality and consistency.Furthermore,it tackled the challenge of imbalanced class distributions in IoT security datasets by incorporating the SMOTE.

    The study’s results demonstrated the proposed method’s effectiveness and robustness in detecting IoT attacks.Evaluated multiple ML classifiers,including LR,MLP,DT,RF,and XGBoost.Among these classifiers,XGBoost integrated with SMOTE achieved outstanding attack detection accuracy.In binary classification,the XGBoost model achieved an accuracy of 0.99,while in multi-class classification,it achieved an accuracy of 0.99.In multiple sub-classifications,the XGBoost model achieved an accuracy of 0.81.These findings highlight the superiority of the proposed approach over existing IDS frameworks in detecting attacks in imbalanced IoT datasets.

    The significance of the study lies in its contribution to addressing the challenge of imbalanced class distributions in IoT security datasets.Imbalanced datasets are common in real-world scenarios,and traditional ML algorithms often struggle to achieve accurate results in such datasets.Employing SMOTE effectively balanced the class distribution and improved the performance of the ML models.

    The comparison with existing literature revealed that our approach outperformed previous studies that used the same IoTID20 dataset.For example,studies using traditional ML algorithms like DT and RF achieved lower accuracy scores compared to our proposed XGBoost model.This indicates that XGBoost is a more suitable algorithm for detecting IoT attacks in imbalanced datasets.

    7 Conclusion

    The study concluded that the collective learning algorithms were the best in binary and multiple classifications.In the case of subcategory classifications,the XGB algorithm is the best,and the use of the SMOTE increased the accuracy of the classification.The final model achieved 0.81 accuracies and recalled 0.83 according to the precision,which was the best comparison.Comparison of the proposed algorithms also demonstrated superiority over previous studies using the same dataset.However,the security analysis considers only a static mesh topology of IoT devices,while the IoT network is more dynamic,complicated,and diversified.As a result,statistical distribution will use to simulate the dynamic character of expansive IoT networks for future investigation.The proposed study will also pave the way for other studies on lateral movement avoidance in IoT networks.

    8 Limitations and Future Work

    The study primarily focuses on employing a specific ML technique,namely XGBoost,for IoT attack detection.It is worth noting that different ML algorithms may yield varied outcomes.Furthermore,the evaluation of the proposed method solely relies on a single dataset (IoTID20),necessitating further investigation into its generalizability across diverse datasets and real-world scenarios.Future work should delve into this aspect to enhance the robustness and applicability of the proposed method:

    1.The study concentrated on intrusion detection at the network level,and future research could explore the integration of host-based intrusion detection techniques to bolster the overall security of IoT systems.

    2.The proposed method can be regarded as real-time or near-real-time attack detection in dynamic IoT environments.

    3.Research on the scalability and efficiency of the proposed is better for conducting large-scale IoT deployments with a high volume of network traffic.

    4.The impact of adversarial attacks and defenses against them enhance the robustness of the proposed method in real-world scenarios.

    Acknowledgement:The authors would like to thank the associate editor and the reviewers for their Time and effort were provided to review the manuscript.

    Funding Statement:The authors received no specific funding for this study.

    Author Contributions:The authors confirm contribution to the paper as follows: study conception and design:Dana F Doghramachi,Siddeeq Y Ameen;data collection:Dana F Doghramachi;analysis and interpretation of results:Dana F Doghramachi,Siddeeq Y Ameen;draft manuscript preparation:Siddeeq Y Ameen.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The publicly available data set can be found at: https://ieeedataport.org/open-access/iot-network-intrusion-dataset.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    精品人妻熟女毛片av久久网站| 色综合欧美亚洲国产小说| 日日夜夜操网爽| 男人爽女人下面视频在线观看| 伊人久久大香线蕉亚洲五| 男女无遮挡免费网站观看| 国产成人精品在线电影| 国产一区二区在线观看av| 久久久久久久久免费视频了| 国产精品久久久久久精品古装| 热99久久久久精品小说推荐| 免费高清在线观看视频在线观看| 9色porny在线观看| 精品少妇一区二区三区视频日本电影| 亚洲成人国产一区在线观看 | 王馨瑶露胸无遮挡在线观看| 精品人妻一区二区三区麻豆| 夫妻性生交免费视频一级片| 日本一区二区免费在线视频| netflix在线观看网站| 在线亚洲精品国产二区图片欧美| 国产精品九九99| 日本色播在线视频| 亚洲中文日韩欧美视频| 精品人妻1区二区| 久久久久精品人妻al黑| 成在线人永久免费视频| 日本91视频免费播放| 真人做人爱边吃奶动态| 亚洲色图综合在线观看| 精品高清国产在线一区| 中文字幕高清在线视频| 精品高清国产在线一区| 免费在线观看视频国产中文字幕亚洲 | 久久人妻福利社区极品人妻图片 | 又黄又粗又硬又大视频| 老司机在亚洲福利影院| 悠悠久久av| 搡老岳熟女国产| 国产欧美日韩一区二区三 | 大香蕉久久成人网| 国产精品偷伦视频观看了| 成年av动漫网址| 久久久精品区二区三区| 午夜两性在线视频| 男人舔女人的私密视频| 91字幕亚洲| 大片电影免费在线观看免费| 777米奇影视久久| 欧美大码av| 9191精品国产免费久久| 亚洲欧美激情在线| 男人舔女人的私密视频| 韩国精品一区二区三区| 一个人免费看片子| 国产一卡二卡三卡精品| 国产成人精品在线电影| 电影成人av| 18禁黄网站禁片午夜丰满| 午夜激情久久久久久久| 人人妻人人添人人爽欧美一区卜| 精品久久久精品久久久| 一二三四在线观看免费中文在| 麻豆乱淫一区二区| 亚洲av在线观看美女高潮| 久久亚洲国产成人精品v| 日韩熟女老妇一区二区性免费视频| 国产欧美日韩综合在线一区二区| 日日摸夜夜添夜夜爱| 亚洲精品国产av蜜桃| videosex国产| 又粗又硬又长又爽又黄的视频| 亚洲一区中文字幕在线| 热99久久久久精品小说推荐| 国产极品粉嫩免费观看在线| 99九九在线精品视频| 精品亚洲乱码少妇综合久久| 亚洲av日韩在线播放| 成人国语在线视频| 国产黄色视频一区二区在线观看| 宅男免费午夜| 日本av免费视频播放| √禁漫天堂资源中文www| 大香蕉久久网| 亚洲图色成人| 欧美老熟妇乱子伦牲交| 久久天躁狠狠躁夜夜2o2o | 亚洲图色成人| 精品少妇黑人巨大在线播放| 亚洲人成电影观看| 亚洲成国产人片在线观看| 中文精品一卡2卡3卡4更新| 丰满迷人的少妇在线观看| 国产av国产精品国产| 中文乱码字字幕精品一区二区三区| 一级黄片播放器| 中文字幕制服av| av天堂在线播放| 女人高潮潮喷娇喘18禁视频| 国产成人系列免费观看| 在线精品无人区一区二区三| 久久女婷五月综合色啪小说| 高清黄色对白视频在线免费看| 只有这里有精品99| 日本av免费视频播放| 色婷婷av一区二区三区视频| 男女高潮啪啪啪动态图| 国产成人精品久久二区二区免费| 午夜激情av网站| 97在线人人人人妻| 一本一本久久a久久精品综合妖精| 狠狠婷婷综合久久久久久88av| 欧美日韩成人在线一区二区| 中文字幕色久视频| 久久 成人 亚洲| 一级黄色大片毛片| 一个人免费看片子| 国产三级黄色录像| 日韩一本色道免费dvd| 少妇的丰满在线观看| av电影中文网址| 美女中出高潮动态图| 婷婷色麻豆天堂久久| 亚洲成人国产一区在线观看 | 女性被躁到高潮视频| 热99久久久久精品小说推荐| 日韩一卡2卡3卡4卡2021年| 国语对白做爰xxxⅹ性视频网站| 国产免费又黄又爽又色| 国产色视频综合| 亚洲,一卡二卡三卡| 新久久久久国产一级毛片| 在线看a的网站| 久久午夜综合久久蜜桃| 超碰97精品在线观看| 人妻 亚洲 视频| 成年人免费黄色播放视频| 一边摸一边抽搐一进一出视频| 亚洲中文字幕日韩| 亚洲国产精品国产精品| 国产伦理片在线播放av一区| 在线看a的网站| 亚洲伊人久久精品综合| 一区二区三区四区激情视频| 亚洲欧美一区二区三区国产| 丝袜喷水一区| 九草在线视频观看| 在线观看免费日韩欧美大片| 国产精品欧美亚洲77777| 一级毛片我不卡| 中文字幕制服av| 在线精品无人区一区二区三| 丝袜人妻中文字幕| 亚洲国产中文字幕在线视频| 女性被躁到高潮视频| 亚洲成人免费av在线播放| 国产av精品麻豆| 日韩av免费高清视频| 黄网站色视频无遮挡免费观看| 五月开心婷婷网| 亚洲国产欧美在线一区| 久久久久久久大尺度免费视频| 99精国产麻豆久久婷婷| 久久ye,这里只有精品| 亚洲精品国产av蜜桃| 久久精品国产亚洲av高清一级| 中文字幕最新亚洲高清| 亚洲av成人不卡在线观看播放网 | 一区在线观看完整版| av电影中文网址| 亚洲人成网站在线观看播放| 桃花免费在线播放| 老汉色∧v一级毛片| 一级毛片黄色毛片免费观看视频| 午夜免费鲁丝| 美女中出高潮动态图| 午夜av观看不卡| 91九色精品人成在线观看| 人妻 亚洲 视频| 别揉我奶头~嗯~啊~动态视频 | 精品国产一区二区三区四区第35| 在线观看免费午夜福利视频| 亚洲国产精品成人久久小说| 久久鲁丝午夜福利片| 首页视频小说图片口味搜索 | 精品久久久久久电影网| 建设人人有责人人尽责人人享有的| 亚洲av电影在线进入| 国产精品三级大全| 在线观看人妻少妇| 18在线观看网站| 好男人视频免费观看在线| 国产主播在线观看一区二区 | 日本欧美视频一区| 精品国产一区二区久久| 欧美成人午夜精品| 成年美女黄网站色视频大全免费| 丁香六月欧美| 黄片小视频在线播放| 99热网站在线观看| 午夜视频精品福利| 精品免费久久久久久久清纯 | 精品亚洲成a人片在线观看| 国产在线视频一区二区| 亚洲国产av新网站| av不卡在线播放| 日本欧美视频一区| cao死你这个sao货| 亚洲国产av影院在线观看| 一级毛片女人18水好多 | 一区福利在线观看| 最近最新中文字幕大全免费视频 | 日韩 欧美 亚洲 中文字幕| 男女下面插进去视频免费观看| 国产成人啪精品午夜网站| 国产精品免费视频内射| 18禁国产床啪视频网站| 国产色视频综合| 高清不卡的av网站| 乱人伦中国视频| 国产有黄有色有爽视频| 精品久久蜜臀av无| 亚洲精品中文字幕在线视频| 国产欧美亚洲国产| 国产欧美日韩综合在线一区二区| 亚洲国产最新在线播放| 婷婷色av中文字幕| 美女中出高潮动态图| 成年人免费黄色播放视频| 亚洲五月婷婷丁香| 50天的宝宝边吃奶边哭怎么回事| 悠悠久久av| 黑丝袜美女国产一区| 少妇的丰满在线观看| 欧美日韩av久久| 欧美变态另类bdsm刘玥| 久久九九热精品免费| av在线播放精品| 91字幕亚洲| 久久精品人人爽人人爽视色| 99久久精品国产亚洲精品| 五月天丁香电影| 日韩 欧美 亚洲 中文字幕| 大型av网站在线播放| 亚洲精品国产色婷婷电影| 97人妻天天添夜夜摸| 日本黄色日本黄色录像| 可以免费在线观看a视频的电影网站| 日本欧美国产在线视频| 80岁老熟妇乱子伦牲交| 免费人妻精品一区二区三区视频| 亚洲色图综合在线观看| 日韩视频在线欧美| 制服诱惑二区| 中文字幕精品免费在线观看视频| 免费在线观看完整版高清| 十分钟在线观看高清视频www| 亚洲中文字幕日韩| 人体艺术视频欧美日本| 日本猛色少妇xxxxx猛交久久| 无限看片的www在线观看| 国产精品一二三区在线看| 久久久精品免费免费高清| 纵有疾风起免费观看全集完整版| 日本猛色少妇xxxxx猛交久久| 亚洲精品成人av观看孕妇| 中文字幕人妻丝袜一区二区| 免费观看a级毛片全部| 又黄又粗又硬又大视频| 国产精品久久久人人做人人爽| 大陆偷拍与自拍| 麻豆av在线久日| 一级毛片我不卡| 成年动漫av网址| 中文字幕人妻熟女乱码| 免费日韩欧美在线观看| 精品一品国产午夜福利视频| 免费看十八禁软件| 啦啦啦中文免费视频观看日本| 久久久久久久国产电影| 叶爱在线成人免费视频播放| 欧美久久黑人一区二区| 国产精品久久久av美女十八| 日韩一本色道免费dvd| 9色porny在线观看| 国产精品一区二区精品视频观看| 1024香蕉在线观看| 99热网站在线观看| 亚洲中文字幕日韩| www.999成人在线观看| 桃花免费在线播放| 免费看av在线观看网站| 亚洲人成77777在线视频| www.熟女人妻精品国产| 黄色 视频免费看| 高清视频免费观看一区二区| 性少妇av在线| 亚洲五月色婷婷综合| 精品国产一区二区三区久久久樱花| 一本色道久久久久久精品综合| 国产日韩欧美视频二区| 色94色欧美一区二区| 国产片内射在线| av线在线观看网站| 青草久久国产| 午夜福利影视在线免费观看| 欧美老熟妇乱子伦牲交| 99热网站在线观看| 蜜桃国产av成人99| cao死你这个sao货| 91精品国产国语对白视频| 亚洲精品久久成人aⅴ小说| 别揉我奶头~嗯~啊~动态视频 | 国产男女内射视频| 少妇粗大呻吟视频| 成年美女黄网站色视频大全免费| 欧美久久黑人一区二区| 999久久久国产精品视频| 老司机影院毛片| 少妇人妻 视频| 99久久99久久久精品蜜桃| 亚洲 国产 在线| 国产成人精品在线电影| 老司机午夜十八禁免费视频| av国产久精品久网站免费入址| 成人国产一区最新在线观看 | 看免费av毛片| 每晚都被弄得嗷嗷叫到高潮| 黄色视频不卡| 日本wwww免费看| 好男人视频免费观看在线| 女人高潮潮喷娇喘18禁视频| 国产熟女欧美一区二区| 成人国语在线视频| 欧美国产精品va在线观看不卡| 国产淫语在线视频| 亚洲激情五月婷婷啪啪| 青春草亚洲视频在线观看| 建设人人有责人人尽责人人享有的| 一本一本久久a久久精品综合妖精| 国产成人免费观看mmmm| 97精品久久久久久久久久精品| 亚洲成av片中文字幕在线观看| 日韩制服骚丝袜av| 美女国产高潮福利片在线看| 在线精品无人区一区二区三| 日韩大片免费观看网站| 精品少妇一区二区三区视频日本电影| 成人亚洲精品一区在线观看| 丰满人妻熟妇乱又伦精品不卡| 亚洲精品国产av蜜桃| 大型av网站在线播放| 日日摸夜夜添夜夜爱| 久久亚洲精品不卡| 国产成人av教育| 97精品久久久久久久久久精品| 午夜福利在线免费观看网站| 激情五月婷婷亚洲| av线在线观看网站| 国产精品国产三级专区第一集| 91九色精品人成在线观看| 亚洲国产精品999| av又黄又爽大尺度在线免费看| 悠悠久久av| 一级,二级,三级黄色视频| 日韩 欧美 亚洲 中文字幕| 国产一区二区在线观看av| av线在线观看网站| 中文欧美无线码| 久久久久网色| 一二三四社区在线视频社区8| 国产成人一区二区三区免费视频网站 | 国产精品国产三级专区第一集| 亚洲欧洲精品一区二区精品久久久| 欧美成人精品欧美一级黄| 大型av网站在线播放| av国产精品久久久久影院| 日韩电影二区| 国产欧美日韩综合在线一区二区| 欧美日韩精品网址| 波野结衣二区三区在线| 欧美国产精品一级二级三级| 亚洲国产成人一精品久久久| 少妇裸体淫交视频免费看高清 | 午夜免费鲁丝| 新久久久久国产一级毛片| 国产色视频综合| 丝袜脚勾引网站| 久久人妻福利社区极品人妻图片 | 国产一卡二卡三卡精品| 亚洲伊人久久精品综合| 欧美 亚洲 国产 日韩一| 久久久欧美国产精品| 各种免费的搞黄视频| 亚洲精品国产区一区二| 国产免费福利视频在线观看| 高清不卡的av网站| 日韩视频在线欧美| 午夜老司机福利片| 建设人人有责人人尽责人人享有的| 国产高清不卡午夜福利| 国产片内射在线| 亚洲图色成人| 久久精品成人免费网站| 国产免费一区二区三区四区乱码| 亚洲,欧美精品.| 自拍欧美九色日韩亚洲蝌蚪91| 欧美 日韩 精品 国产| 国产精品久久久久久人妻精品电影 | 亚洲激情五月婷婷啪啪| 韩国高清视频一区二区三区| 亚洲一卡2卡3卡4卡5卡精品中文| 日韩制服丝袜自拍偷拍| av又黄又爽大尺度在线免费看| 日韩精品免费视频一区二区三区| 久久影院123| 捣出白浆h1v1| 天天躁日日躁夜夜躁夜夜| 肉色欧美久久久久久久蜜桃| 亚洲精品日本国产第一区| 日韩一本色道免费dvd| 国产亚洲一区二区精品| 亚洲欧美成人综合另类久久久| 新久久久久国产一级毛片| av又黄又爽大尺度在线免费看| 午夜福利乱码中文字幕| 亚洲情色 制服丝袜| 国产精品国产av在线观看| 大码成人一级视频| 亚洲三区欧美一区| 九色亚洲精品在线播放| 色94色欧美一区二区| 亚洲国产精品一区三区| 免费黄频网站在线观看国产| 一区在线观看完整版| 在现免费观看毛片| 国产精品一区二区在线观看99| 久久午夜综合久久蜜桃| 精品亚洲乱码少妇综合久久| 嫁个100分男人电影在线观看 | 人妻 亚洲 视频| 大码成人一级视频| 97在线人人人人妻| 最黄视频免费看| 又紧又爽又黄一区二区| 亚洲精品av麻豆狂野| 性高湖久久久久久久久免费观看| 99国产精品一区二区三区| 久久免费观看电影| 999精品在线视频| 午夜老司机福利片| 精品一区二区三卡| 久久久久久久久免费视频了| 亚洲人成77777在线视频| 色婷婷久久久亚洲欧美| 国产黄频视频在线观看| av线在线观看网站| 午夜久久久在线观看| 黄片小视频在线播放| 国产免费视频播放在线视频| 久久精品国产亚洲av高清一级| 侵犯人妻中文字幕一二三四区| 亚洲天堂av无毛| 女人高潮潮喷娇喘18禁视频| 亚洲欧洲日产国产| 看免费成人av毛片| 我要看黄色一级片免费的| 亚洲激情五月婷婷啪啪| 999久久久国产精品视频| 各种免费的搞黄视频| 热99久久久久精品小说推荐| 国产免费视频播放在线视频| 高清黄色对白视频在线免费看| 欧美成人午夜精品| 亚洲国产av影院在线观看| 久久狼人影院| 一级毛片女人18水好多 | 秋霞在线观看毛片| 亚洲欧美成人综合另类久久久| 日本欧美视频一区| 91老司机精品| 国产熟女欧美一区二区| 国产视频一区二区在线看| 精品熟女少妇八av免费久了| 国产xxxxx性猛交| 国产男人的电影天堂91| 在线精品无人区一区二区三| 亚洲欧美清纯卡通| 亚洲人成电影观看| av天堂在线播放| 夫妻午夜视频| 亚洲中文av在线| 我要看黄色一级片免费的| 亚洲av国产av综合av卡| 亚洲av成人不卡在线观看播放网 | 国产精品99久久99久久久不卡| 午夜av观看不卡| 日本91视频免费播放| 中文字幕最新亚洲高清| 久久国产精品大桥未久av| 国产黄色视频一区二区在线观看| 国产欧美日韩综合在线一区二区| 美女中出高潮动态图| 亚洲精品久久午夜乱码| 久久精品国产亚洲av高清一级| 在线观看www视频免费| 国产精品秋霞免费鲁丝片| 在线观看免费视频网站a站| 精品少妇久久久久久888优播| 少妇裸体淫交视频免费看高清 | 国产亚洲av片在线观看秒播厂| www.熟女人妻精品国产| 亚洲成色77777| 九色亚洲精品在线播放| 亚洲av成人精品一二三区| 精品一品国产午夜福利视频| 啦啦啦视频在线资源免费观看| 亚洲七黄色美女视频| 亚洲精品国产区一区二| 可以免费在线观看a视频的电影网站| 熟女av电影| 一本久久精品| 国产精品成人在线| 国产野战对白在线观看| 青春草亚洲视频在线观看| 国产av精品麻豆| 99热全是精品| 亚洲免费av在线视频| 亚洲第一青青草原| 一本大道久久a久久精品| 国产精品成人在线| 国产在线观看jvid| 亚洲av成人不卡在线观看播放网 | 亚洲精品成人av观看孕妇| 日韩制服骚丝袜av| a级片在线免费高清观看视频| 午夜日韩欧美国产| 18在线观看网站| 女人高潮潮喷娇喘18禁视频| 亚洲国产精品一区三区| 狠狠婷婷综合久久久久久88av| 午夜两性在线视频| 首页视频小说图片口味搜索 | 日韩免费高清中文字幕av| 在线观看免费日韩欧美大片| 丝袜喷水一区| 亚洲精品久久午夜乱码| 欧美在线一区亚洲| 亚洲专区中文字幕在线| 夫妻午夜视频| 黑丝袜美女国产一区| 亚洲三区欧美一区| 爱豆传媒免费全集在线观看| 国产一区二区三区综合在线观看| 女性被躁到高潮视频| 欧美日韩福利视频一区二区| 午夜福利乱码中文字幕| 色播在线永久视频| 欧美日韩成人在线一区二区| 少妇精品久久久久久久| 啦啦啦中文免费视频观看日本| 精品福利永久在线观看| 99久久人妻综合| 久久影院123| 黄频高清免费视频| 黄色 视频免费看| 国产男女内射视频| 免费高清在线观看日韩| 激情视频va一区二区三区| 大码成人一级视频| 性高湖久久久久久久久免费观看| 亚洲精品第二区| 日韩大片免费观看网站| 亚洲精品美女久久av网站| 午夜激情av网站| 日本vs欧美在线观看视频| 高清视频免费观看一区二区| 亚洲一区中文字幕在线| 一区二区av电影网| 国产一卡二卡三卡精品| 不卡av一区二区三区| 亚洲人成电影免费在线| 男人添女人高潮全过程视频| 国产高清国产精品国产三级| 亚洲国产日韩一区二区| 成人亚洲欧美一区二区av| 国产成人a∨麻豆精品| 九草在线视频观看| 国产1区2区3区精品| 久久精品人人爽人人爽视色| 又黄又粗又硬又大视频| 亚洲av欧美aⅴ国产| 黄网站色视频无遮挡免费观看| 免费在线观看黄色视频的| 巨乳人妻的诱惑在线观看| 久久影院123| 国产一区二区激情短视频 | 国产一区二区 视频在线| 亚洲国产精品999| 午夜免费鲁丝| 亚洲国产日韩一区二区| 国语对白做爰xxxⅹ性视频网站| 欧美精品人与动牲交sv欧美| 飞空精品影院首页| 少妇人妻久久综合中文| 80岁老熟妇乱子伦牲交| 久久国产亚洲av麻豆专区| 欧美激情高清一区二区三区| 亚洲精品成人av观看孕妇| 国产极品粉嫩免费观看在线| 少妇精品久久久久久久| 欧美国产精品一级二级三级| 国产欧美亚洲国产| 五月天丁香电影| 久9热在线精品视频|