Detection of Adversary Nodes in Machine-To-Machine Communication Using Machine Learning Based Trust Model
Title | Detection of Adversary Nodes in Machine-To-Machine Communication Using Machine Learning Based Trust Model |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Eziama, Elvin, Ahmed, Saneeha, Ahmed, Sabbir, Awin, Faroq, Tepe, Kemal |
Conference Name | 2019 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT) |
Date Published | Dec. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-5341-4 |
Keywords | Adversary Models, advsersary node detection, binary particle swarm optimization, Computational modeling, Entropy, entropy based feature engineering, extreme gradient boosting model, false trust, feature extraction, Human Behavior, Internet of Things (IoTs), Internet of Vehi-cles(IoVs), learning (artificial intelligence), machine learning, Machine Learning Based Trust (MLBT), machine learning based trust evaluation model, machine-to-machine (M2M), machine-to-machine communication, machine-to-machine communications, malicious activity detection, Metrics, MLBT evaluation model, particle swarm optimisation, Peer-to-peer computing, policy-based governance, Policy-Governed Secure Collaboration, pubcrawl, resilience, Resiliency, Scalability, security, security solutions, security threats, Supervisory Control and Data Supervisory Acquisition (SCADA), telecommunication security, Trusted Computing, VBM2M-C network, vehicular ad hoc networks, vehicular based M2M-C network, XGBoost model |
Abstract | Security challenges present in Machine-to-Machine Communication (M2M-C) and big data paradigm are fundamentally different from conventional network security challenges. In M2M-C paradigms, "Trust" is a vital constituent of security solutions that address security threats and for such solutions,it is important to quantify and evaluate the amount of trust in the information and its source. In this work, we focus on Machine Learning (ML) Based Trust (MLBT) evaluation model for detecting malicious activities in a vehicular Based M2M-C (VBM2M-C) network. In particular, we present an Entropy Based Feature Engineering (EBFE) coupled Extreme Gradient Boosting (XGBoost) model which is optimized with Binary Particle Swarm optimization technique. Based on three performance metrics, i.e., Accuracy Rate (AR), True Positive Rate (TPR), False Positive Rate (FPR), the effectiveness of the proposed method is evaluated in comparison to the state-of-the-art ensemble models, such as XGBoost and Random Forest. The simulation results demonstrates the superiority of the proposed model with approximately 10% improvement in accuracy, TPR and FPR, with reference to the attacker density of 30% compared with the start-of-the-art algorithms. |
URL | https://ieeexplore.ieee.org/document/9001743 |
DOI | 10.1109/ISSPIT47144.2019.9001743 |
Citation Key | eziama_detection_2019 |
- security
- MLBT evaluation model
- particle swarm optimisation
- Peer-to-peer computing
- policy-based governance
- Policy-Governed Secure Collaboration
- pubcrawl
- resilience
- Resiliency
- Scalability
- Metrics
- security solutions
- security threats
- Supervisory Control and Data Supervisory Acquisition (SCADA)
- telecommunication security
- Trusted Computing
- VBM2M-C network
- vehicular ad hoc networks
- vehicular based M2M-C network
- XGBoost model
- Internet of Things (IoTs)
- advsersary node detection
- binary particle swarm optimization
- Computational modeling
- Entropy
- entropy based feature engineering
- extreme gradient boosting model
- false trust
- feature extraction
- Human behavior
- Adversary Models
- Internet of Vehi-cles(IoVs)
- learning (artificial intelligence)
- machine learning
- Machine Learning Based Trust (MLBT)
- machine learning based trust evaluation model
- machine-to-machine (M2M)
- machine-to-machine communication
- machine-to-machine communications
- malicious activity detection