A hybrid approach using support vector machine rule-based system: detecting cyber threats in internet of things

M. Wasim Abbas Ashraf, Arvind R. Singh*, A. Pandian, Rajkumar Singh Rathore, Mohit Bajaj*, Ievgen Zaitsev*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

While the proliferation of the Internet of Things (IoT) has revolutionized several industries, it has also created severe data security concerns. The security of these network devices and the dependability of IoT networks depend on efficient threat detection. Device heterogeneity, computing resource constraints, and the ever-changing nature of cyber threats are a few of the obstacles that make detecting cyber threats in IoT systems difficult. Complex threats often go undetected by conventional security measures, requiring more sophisticated, adaptive detection methods. Therefore, this study presents the Hybrid approach based on the Support Vector Machines Rule-Based Detection (HSVMR-D) method for an all-encompassing approach to identifying cyber threats to the IoT. The HSVMR-D employs SVM to categorize known and unknown threats using attributes acquired from IoT data. Identifying known attack signatures and patterns using rule-based approaches improves detection efficiency without retraining by adapting pre-trained models to new IoT contexts. Moreover, protecting vital infrastructure and sensitive data, HSVMR-D provides a thorough and adaptable solution to improve the security posture of IoT deployments. Comprehensive experiment analysis and simulation results compared to the baseline study have confirmed the efficiency of the proposed HSVMR-D. Furthermore, increased resilience to completely novel changing threats, fewer false positives, and improved accuracy in threat detection are all outcomes that show the proposed work outperforms others. The HSVMR-D approach is helpful where the primary objective is a secure environment in the Internet of Things (IoT) when resources are limited.
Original languageEnglish
Article number27058
Pages (from-to)27058
JournalScientific Reports
Volume14
Issue number1
Early online date7 Nov 2024
DOIs
Publication statusPublished - 7 Nov 2024

Keywords

  • Integrating
  • Hybrid
  • Machine learning
  • Transfer learning
  • Internet of things
  • Cyber threats detection
  • Heuristic algorithms
  • Anomaly Detection
  • Support Vector Machine

Cite this