Mathematical & Computer Sciences
Permanent URI for this communityhttps://dspace-upgrade.is.ed.ac.uk/handle/10399/20
Browse
Item Behaviour-based security with machine learning on IoT networks(Heriot-Watt University, 2024-01) Kostas, Kahraman; Just, Doctor Mike; Lones, Doctor Michael A.The proliferation of Internet of Things (IoT) devices has transformed various aspects of human life, yet has brought forth significant security challenges due to device heterogeneity and limited resources. Addressing this, the thesis focuses on reliable and reproducible IoT security measures, specifically device identification (DI) and attack detection (AD). With over 10 billion devices currently connected and a projected 80 billion by 2026, securing IoT devices is critical. Traditional security approaches face hurdles due to device diversity, while IoT devices are prone to rapid attacks. Behaviour-based methods, particularly utilising machine learning, offer potential solutions for both DI and AD. However, existing studies suffer from limitations in addressing IoT heterogene ity, analysing information leakage features, understanding machine learning insights, and ensuring reproducibility. This research aims to bridge these gaps by developing robust, transparent, and generalizable solutions for IoT DI and AD. For DI, a novel aggregation algorithm addresses IP and non-IP device challenges, significantly improving accuracy. Comprehensive feature selection results in an optimal feature set, validated across diverse datasets. In AD, a packet-level expanding and rolling windows method detects attacks earlier, outperforming conventional flow methods. The models are evaluated on isolated first-time-seen attack datasets, showcasing their adaptability to novel attacks. Furthermore, machine learning models and features are analysed for deeper attack insights. The thesis underscores the interdependence of device identification and attack detection within IoT security, emphasising their mutual reinforcement for network safety. By offering reproducible methodologies, transparent analyses, and adaptable models, this work contributes to enhancing the security of IoT devices and networks. Ultimately, this research paves the way for a more secure IoT ecosystem by addressing the unique challenges posed by IoT heterogeneity, resource limitations, and dynamic attack patterns.