Idris Zakariyya
Resource efficient boosting method for IoT security monitoring.
Zakariyya, Idris; Al-Kadri, M. Omar; Kalutarage, Harsha
Abstract
Machine learning (ML) methods are widely proposed for security monitoring of Internet of Things (IoT). However, these methods can be computationally expensive for resource constraint IoT devices. This paper proposes an optimized resource efficient ML method that can detect various attacks on IoT devices. It utilizes Light Gradient Boosting Machine (LGBM). The performance of this approach was evaluated against four realistic IoT benchmark datasets. Experimental results show that the proposed method can effectively detect attacks on IoT devices with limited resources, and outperforms the state of the art techniques.
Citation
ZAKARIYYA, I., AL-KADRI, M.O. and KALUTARAGE, H. 2021. Resource efficient boosting method for IoT security monitoring. In Proceedings of 18th Institute of Electrical and Electronics Engineers (IEEE) Consumer communications and networking conference 2021 (CCNC 2021), 9-12 January 2021, [virtual event]. Piscataway: IEEE [online], article 9369620. Available from: https://doi.org/10.1109/ccnc49032.2021.9369620
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 18th Institute of Electrical and Electronics Engineers (IEEE) Consumer communications and networking conference 2021 (CCNC 2021) |
Start Date | Jan 9, 2021 |
End Date | Jan 12, 2021 |
Acceptance Date | Oct 16, 2020 |
Online Publication Date | Jan 12, 2021 |
Publication Date | Mar 11, 2021 |
Deposit Date | Mar 23, 2021 |
Publicly Available Date | Mar 23, 2021 |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Peer Reviewed | Peer Reviewed |
Series ISSN | 2331-9860 |
ISBN | 9781728197944 |
DOI | https://doi.org/10.1109/ccnc49032.2021.9369620 |
Keywords | Machine learning; Internet of things; Resource constraint; Light gradient boosting machine |
Public URL | https://rgu-repository.worktribe.com/output/1279971 |
Files
ZAKARIYYA 2021 Resource efficient
(916 Kb)
PDF
Copyright Statement
© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
You might also like
Reducing computational cost in IoT cyber security: case study of artificial immune system algorithm.
(2019)
Presentation / Conference Contribution
Memory efficient federated deep learning for intrusion detection in IoT networks.
(2021)
Presentation / Conference Contribution
Resource efficient federated deep learning for IoT security monitoring.
(2022)
Presentation / Conference Contribution
Downloadable Citations
About OpenAIR@RGU
Administrator e-mail: publications@rgu.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search