Leveraging Artificial Intelligence to Secure Wireless Network: Exploring Threats, Existing Approaches, and Proposed Mitigation Strategies
Conference paper
Xin, A. L. N., Ramly, A., Behjati, M. and Sharif, S. 2024. Leveraging Artificial Intelligence to Secure Wireless Network: Exploring Threats, Existing Approaches, and Proposed Mitigation Strategies. 2024 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies. IEEE. https://doi.org/10.1109/3ict64318.2024.10824350
Authors | Xin, A. L. N., Ramly, A., Behjati, M. and Sharif, S. |
---|---|
Type | Conference paper |
Abstract | The exponential growth of network has introduced new Internet-of-Things (IoT) use cases that has enabling us convenience and comfort. The surge of IoT devices due to the capabilities brought by fifth generation (5G) have given rise to security threats and attacks, particularly malware attacks IoT botnets have been an alarming issue, where smart devices can be manipulated by malicious actors to commence subsequent attacks such as Denial of Service (DoS). Traditional and complex security techniques may not be a viable solution towards these resource-constrained devices with limited processing power. Machine Learning techniques (ML) are the rising trend, and it is often used in Intrusion Detection Systems and Network Anomaly Detection. This paper emphasizes on analyzing and comparing various ML models on the IoT-23 dataset. It aims to predict anomalies and conclude the model with optimal performance and least computational time cost that can be used for network anomaly detection systems with real-time data in future works. The ML models used in this paper are Decision Trees (DT), K-nearest neighbours (KNN), Random Forest (RF), Naïve Bayes (NB) and Histogram Gradient Boosting (HGB). DT displayed the best performance with an accuracy score of 73% and F1 score of 0.49 with a time cost of 28.22 seconds. |
Year | 2024 |
Conference | 2024 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies |
Publisher | IEEE |
Accepted author manuscript | License File Access Level Anyone |
File | File Access Level Repository staff only |
Publication dates | |
Online | 13 Jan 2025 |
Publication process dates | |
Completed | Nov 2024 |
Accepted | 02 Nov 2024 |
Deposited | 20 Dec 2024 |
Journal | 2024 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) |
Journal citation | pp. 266-273 |
ISSN | 2770-7466 |
2770-7458 | |
Book title | 2024 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) |
ISBN | 979-8-3315-3313-7 |
979-8-3315-3314-4 | |
Digital Object Identifier (DOI) | https://doi.org/10.1109/3ict64318.2024.10824350 |
Web address (URL) of conference proceedings | https://ieeexplore.ieee.org/xpl/conhome/10823647/proceeding |
Copyright holder | © 2024 IEEE |
Additional information | Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
https://repository.uel.ac.uk/item/8yvyz
Restricted files
Accepted author manuscript
101
total views0
total downloads7
views this month0
downloads this month