Treffer: Identify spoofing attacks in Internet of Things (IoT) environments using machine learning algorithms.

Title:
Identify spoofing attacks in Internet of Things (IoT) environments using machine learning algorithms.
Authors:
Vajrobol, Vajratiya1 (AUTHOR), Saxena, Geetika Jain2 (AUTHOR), Pundir, Amit2 (AUTHOR), Singh, Sanjeev1 (AUTHOR), B. Gupta, Brij3,4,5 (AUTHOR) gupta.brij@gmail.com, Gaurav, Akshat6 (AUTHOR), Rahaman, Mosiur7 (AUTHOR)
Source:
Journal of High Speed Networks. Feb2025, Vol. 31 Issue 1, p61-70. 10p.
Database:
Business Source Premier

Weitere Informationen

With the growing adoption of Internet of Things (IoT) devices, security concerns are becoming increasingly urgent. Protecting IoT systems from cyberattacks is crucial to safeguard sensitive information. Spoofing, particularly Domain Name System (DNS) and Address Resolution Protocol (ARP) spoofing, is a type of attack that can manipulate network traffic and compromise data integrity. DNS spoofing redirects users to fraudulent websites by altering domain name resolutions, while ARP spoofing tricks the network by associating a legitimate internet protocol address with a malicious MAC address, allowing attackers to intercept or modify communication. This study aims to develop an efficient method for detecting these types of spoofing attacks in IoT environments using machine learning techniques. The results show that the random forest algorithm outperforms other models, achieving remarkable performance with a 95.1% accuracy, a precision score of 95.2%, and a strong F1 score of 95.1%. A key contribution of this research is the simultaneous detection of both DNS and ARP spoofing within a unified framework, utilizing a comprehensive set of 46 features. These findings underscore the importance of ensuring robust protection against spoofing attacks to maintain the security and integrity of IoT systems. [ABSTRACT FROM AUTHOR]

Copyright of Journal of High Speed Networks is the property of Sage Publications Inc. and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)

Volltext ist im Gastzugang nicht verfügbar.