The digital transformation faces tremendous security challenges. In particular, the growing number of cyber-attacks targeting Internet of Things (IoT) systems restates the need for a reliable detection of malicious network activity. This paper presents a comparative analysis of supervised, unsupervised and reinforcement learning techniques on nine malware captures of the IoT-23 dataset, considering both binary and multi-class classification scenarios. The developed models consisted of Support Vector Machine (SVM), Extreme Gradient Boosting (XGBoost), Light Gradient Boosting Machine (LightGBM), Isolation Forest (iForest), Local Outlier Factor (LOF) and a Deep Reinforcement Learning (DRL) model based on a Double Deep Q-Network (DDQN), adapted to the intrusion detection context. The most reliable performance was achieved by LightGBM. Nonetheless, iForest displayed good anomaly detection results and the DRL model demonstrated the possible benefits of employing this methodology to continuously improve the detection. Overall, the obtained results indicate that the analyzed techniques are well suited for IoT intrusion detection.
翻译:数字转换面临巨大的安全挑战。特别是,越来越多的针对物联网(IoT)系统的网络攻击重申需要可靠地探测恶意网络活动。本文件对IoT-23数据集的九种恶意捕获软件的受监督、不受监督和强化的学习技术进行比较分析,同时考虑到二进制和多级分类设想。开发模型包括支持矢量机(SVM)、极端梯级推动(XGBost)、轻重推动机(LightGBM)、隔离森林(IForest)、地方外层因素(LOF)和基于双深Q-网络(DDQN)的深强化学习模型,该模型适应入侵探测环境。最可靠的性能是由LightGBM取得的。然而,IForest展示了良好的异常探测结果,DRL模型显示了利用这一方法不断改进探测的可能好处。总体而言,所获得的结果表明,分析技术非常适合IOT入侵探测。