Abstract
The tremendous growth in the Internet of Things (IoT) creates great potential which provides us with incredible productivity and simplified our daily lives. But, due to resource constraints and computation, IoT networks are vulnerable to a variety of malicious activities. Thus, protecting the network from hostile attacks should be the top priority. This can be done by planning and implementing effective security measures, one of them is an intrusion detection system. It detects harmful activities on the network and monitors network traffic based on that detection. The aim of the intrusion detection system (IDS) is to afford various approaches for detecting the rapidly growing network attacks, as well as to stop the harmful activities that occur in the IoT devices. Various artificial intelligence methods were evaluated and concluded on various datasets, including BoT-IoT, IoT-23, UNSW-NB15, CSE-CIC-IDS2018, and MQTT-IOT-IDS2020, in search of a suitable algorithm that can easily learn the pattern of network attack activities. The feature extraction and pre-processing data were then fed into IDS as data to train the model for future anomaly detection, prediction, and analysis. This study focuses primarily on the various types of cyber-attacks and machine learning algorithms used to identify cyber-attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ullah I, Mahmoud QH (2021) A framework for anomaly detection in IoT networks using conditional generative adversarial networks. IEEE Access 9:165907–165931. https://doi.org/10.1109/ACCESS.2021.3132127
Akhtar MS, Feng T (2021) Deep learning-based framework for the detection of cyberattack using feature engineering. Secur Commun Netw 2021:1–12. https://doi.org/10.1155/2021/6129210
Popoola SI, Adebisi B, Ande R et al (2021) SMOTE-DRNN: a deep learning algorithm for botnet detection in the internet-of-things networks. Sensors 21:2985. https://doi.org/10.3390/s21092985
Sengodan T, Murugappan M, Misra S (2021) Advances in electrical and computer technologies. Springer Singapore, Singapore
Leevy JL, Hancock J, Khoshgoftaar TM, Peterson J (2021) Detecting information theft attacks in the bot-IoT dataset. In: 2021 20th IEEE international conference on machine learning and applications (ICMLA). IEEE, pp 807–812
Swarna Sugi SS, Ratna SR (2020) Investigation of machine learning techniques in intrusion detection system for IoT network. In: 2020 3rd international conference on intelligent sustainable systems (ICISS). IEEE, pp 1164–1167
Thamaraiselvi R, Mary SAS (2020) Attack and anomaly detection in IoT networks using machine learning 9:95–103. https://doi.org/10.47760/ijcsmc.2020.v09i10.012
Abdalgawad N, Member S (2022) Generative deep learning to detect cyberattacksfortheIoT-23dDataset.IEEEAccess10:6430–6441. https://doi.org/10.1109/ACCESS.2021.3140015
Alshamkhany M, Alshamkhany W, Mansour M et al (2020) Botnet attack detection using machine learning. In: 2020 14th international conference on innovations in information technology (IIT). IEEE, pp 203–208
Zeeshan M, Riaz Q, Bilal MA et al (2022) Protocol-based deep intrusion detection for DoS and DDoS attacks using UNSW-NB15 and Bot-IoT data-sets. IEEE Access 10:2269–2283. https://doi.org/10.1109/ACCESS.2021.3137201
Farhan BI, Jasim AD (2022) Performance analysis of intrusion detection for deep learning model based on Performance analysis of intrusion detection for deep learning model based on CSE ‑ CIC ‑ IDS2018 dataset. 1165–1172. https://doi.org/10.11591/ijeecs.v26.i2.pp1165-1172
Dwibedi S, Pujari M, Sun W (2020) A comparative study on contemporary intrusion detection datasets for machine learning research. In: 2020 IEEE international conference on intelligence and security informatics (ISI). IEEE, pp 1–6
Oussous A, Benjelloun F-Z, Ait Lahcen A, Belfkih S (2018) Big Data technologies: A survey. J King Saud Univ - Comput Inf Sci 30:431–448. https://doi.org/10.1016/j.jksuci.2017.06.001
Syamsuddin I, Barukab OM (2022) SUKRY: suricata IDS with enhanced kNN algorithm on raspberry Pi for classifying IoT botnet attacks. Electronics 11:737. https://doi.org/10.3390/electronics11050737
Ullah I, Mahmoud QH (2021) Design and development of a deep learning-based model for anomaly detection in IoT networks. IEEE Access 9:103906–103926. https://doi.org/10.1109/ACCESS.2021.3094024
Idrissi I, Azizi M, Moussaoui O (2022) A lightweight optimized deep learning-based host-intrusion detection system deployed on the edge for IoT. Int J Comput Digit Syst 11:209–216. https://doi.org/10.12785/ijcds/110117
Snehi M, Bhandari A (2022) IoT-based DDoS on cyber physical systems: research challenges, datasets and future prospects. In: 2022 IEEE international IOT, electronics and mechatronics conference (IEMTRONICS). IEEE, pp 1–8
Gorbett M, Shirazi H, Ray I (2022) WiP: the intrinsic dimensionality of IoT networks. In: Proceedings of the 27th ACM on symposium on access control models and technologies. ACM, New York, pp 245–250
Maurya S, Kumar S, Garg U, Kumar M (2022) An efficient framework for detection and classification of IoT botnet traffic. ECS Sens Plus 1:026401. https://doi.org/10.1149/2754-2726/ac7abc
Souhail et al M (2019) Network based intrusion detection using the UNSW- NB15dataset.IntJComputDigitSyst8:477–487. https://doi.org/10.12785/ijcds/080505
Zolotukhin M, Hämäläinen T, Kotilainen P (2022) Intelligent solutions for attack mitigation in zero-trust environments, pp 403–417
Karatas G, Demir O, Koray Sahingoz O (2018) Deep learning in intrusion detection systems. In: 2018 international congress on big data, deep learning and fighting cyber terrorism (IBIGDELFT). IEEE, pp 113–116
Barolli L, Terzo O (2018) Complex, intelligent, and software intensive systems. Springer International Publishing, Cham
Thomas L, Bhat S (2021) Machine learning and deep learning techniques for IoT-based intrusion detection systems: a literature review machine learning and deep learning techniques for IoT-based intrusion detection systems: a literature review 6:296–314
Al RM, Javeed D, Khan MT et al (2022) Cyber threats detection in smart environments using SDN-enabled DNN-LSTM hybrid framework. IEEE Access 10:53015–53026. https://doi.org/10.1109/ACCESS.2022.3172304
Sommer R, Paxson V (2010) Outside the closed world: on using machine learning for network intrusion detection. In: 2010 IEEE symposium on security and privacy. IEEE, pp 305–316
Sagu A, Gill NS (2020) Machine learning techniques for securing IoT environment, pp 977–982. https://doi.org/10.35940/ijitee.D1209.029420
Abdalgawad N, Sajun A, Kaddoura Y et al (2022) Generative deep learning to detect cyberattacks for the IoT-23 dataset. IEEE Access 10:6430–6441. https://doi.org/10.1109/ACCESS.2021.3140015
Douiba M, Benkirane S, Guezzaz A, Azrour M (2022) Anomaly detection model based on gradient boosting and decision tree for IoT environments security. J Reliab Intell Environ. https://doi.org/10.1007/s40860-022-00184-3
Mohamed TS, Aydin S (2021) IoT-based intrusion detection systems: a review. Smart Sci 1–18. https://doi.org/10.1080/23080477.2021.1972914
Sagu A, Gill NS (2020) Machine learning techniques for securing IoT environment. Int J Innov Technol Explor Eng 9:977–982. https://doi.org/10.35940/ijitee.D1209.029420
Yang Z, Liu X, Li T et al (2022) A systematic literature review of methods and datasets for anomaly-based network intrusion detection. Comput Secur 116:102675. https://doi.org/10.1016/j.cose.2022.102675
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Aarthi, G., Sharon Priya, S., Aisha Banu, W. (2023). Comparative Study on Different Intrusion Detection Datasets Using Machine Learning and Deep Learning Algorithms. In: Venkataraman, N., Wang, L., Fernando, X., Zobaa, A.F. (eds) Big Data and Cloud Computing. ICBCC 2022. Lecture Notes in Electrical Engineering, vol 1021. Springer, Singapore. https://doi.org/10.1007/978-981-99-1051-9_8
Download citation
DOI: https://doi.org/10.1007/978-981-99-1051-9_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-1050-2
Online ISBN: 978-981-99-1051-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)