Paper
28 July 2023 Research on traffic attack behavior detection for IoT device security
ZhiLiang Xiao
Author Affiliations +
Proceedings Volume 12716, Third International Conference on Digital Signal and Computer Communications (DSCC 2023); 127161V (2023) https://doi.org/10.1117/12.2685487
Event: Third International Conference on Digital Signal and Computer Communications (DSCC 2023), 2023, Xi'an, China
Abstract
Compared with the Internet, the IoT has more potential security issues and the traffic is exposed to greater security risks. The number of IoT devices is large, and the generalization performance and accuracy of current traffic attack detection algorithms are not satisfactory. In order to improve the efficiency of traffic detection, the Cross validation feature selection random forest algorithm (CVFSRF) is used to select the effective features for different types of IoT devices, taking into account the characteristics of IoT devices themselves. information for different types of IoT devices to train the detection model. The traffic detection uses a semi-supervised learning strategy to improve the detection accuracy by optimizing the type and number of individual learners through integrated learning. After conducting simulation experiments, the average detection accuracy of the algorithm is 99.52% and the detection time is 1.26s, which can efficiently and accurately detect traffic attacks on different IoT devices to ensure device security.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
ZhiLiang Xiao "Research on traffic attack behavior detection for IoT device security", Proc. SPIE 12716, Third International Conference on Digital Signal and Computer Communications (DSCC 2023), 127161V (28 July 2023); https://doi.org/10.1117/12.2685487
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Detection and tracking algorithms

Machine learning

Feature extraction

Education and training

Feature selection

Evolutionary algorithms

Correlation coefficients

Back to Top