Analysis of different IDS-based machine learning models for secure data transmission in IoT networks
The Internet of Things (IoT) encompasses a network of interconnected devices that collect, analyze, and exchange vast amounts of data. However, this connectivity creates opportunities for various types of cyberattacks, making IoT systems vulnerable and potentially leading to the compromise of sensit...
Saved in:
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
De Gruyter
2025-07-01
|
| Series: | Open Computer Science |
| Subjects: | |
| Online Access: | https://doi.org/10.1515/comp-2025-0032 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | The Internet of Things (IoT) encompasses a network of interconnected devices that collect, analyze, and exchange vast amounts of data. However, this connectivity creates opportunities for various types of cyberattacks, making IoT systems vulnerable and potentially leading to the compromise of sensitive information. Therefore, developing effective intrusion detection system (IDS) is one of the key challenges in IoT network security. The aim of this study is to develop a machine learning (ML) model for network traffic classification and attack detection in IoT environments. Through a comparative analysis of different algorithms, the study seeks to identify the model with the best performance, which could serve as a foundation for efficient IDS solutions tailored to the specific characteristics of IoT networks. The RT-IoT2022 dataset was used for experimental analysis, providing realistic framework for testing ML models, including k-nearest neighbors, Random Forest, XGBoost, multilayer perceptron, and various 1D convolutional neural network architectures. The study examines preprocessing techniques, focusing on dimensionality reduction (principal component analysis, variance inflation factor, Pearson’s test), outlier detection (interquartile range, Z-score, Isolation Forest), and transformation methods (Box–Cox, RobustScaler, Winsorization). Based on the results of the experiment, the most effective model and preprocessing technique were proposed. |
|---|---|
| ISSN: | 2299-1093 |