Comprehensive Analysis and Detection of IoT Network Attacks Using Recon Host Discovery Traffic Dataset
DOI:
https://doi.org/10.70715/jitcai.2024.v2.i1.003Keywords:
IoT Security, Network Traffic Analysis, Reconnaissance Attacks, Host Discovery, Intrusion Detection System, Feature Correlation, Traffic Profiling, Cybersecurity, Flow-Based Analysis, Machine Learning for IoT, TCP Flags Analysis, Data Visualization, Exploratory Data Analysis, Anomaly Detection, Correlation Heatmap, Packet Statistics, Flow Duration, Benign Traffic, Malicious Traffic, Hybrid ModelsAbstract
The proliferation of Internet of Things (IoT) devices has introduced unparalleled interconnectivity and significant security challenges. Reconnaissance attacks, particularly Host Discovery, are often precursors to more severe cyber threats. In this study, we examine a labeled network traffic flow dataset to analyze patterns and identify key indicators of Recon Host Discovery attacks. Leveraging exploratory data analysis and feature correlation techniques, we uncover critical traffic behaviors, such as short flow durations and anomalous packet statistics, that distinguish benign from malicious activities. The findings lay the groundwork for developing robust detection mechanisms for IoT networks, emphasizing the importance of targeted feature selection and real-time analytics.
References
[1] T. Sasi, A. H. Lashkari, R. Lu, P. Xiong, and S. Iqbal, "An Efficient Self Attention-Based 1D-CNN-LSTM Network for IoT Attack Detection and Identification Using Network Traffic," Journal of Information and Intelligence, 2024. DOI: https://doi.org/10.1016/j.jiixd.2024.09.001
A. H. Lashkari et al., "Feature Selection for Network Intrusion Detection Using CICFlowMeter," International Journal of Computer Applications, 2019.
[2] N. Ye et al., "Statistical Analysis of Network Traffic for Intrusion Detection," IEEE Transactions on Systems, Man, and Cybernetics, 2002.
[3] G. Creech and J. Hu, "A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns," IEEE Transactions on Computers, 2014. DOI: https://doi.org/10.1109/TC.2013.13
[4] Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, "Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization," ICISSP, 2018. DOI: https://doi.org/10.5220/0006639801080116
[5] A. Al Zaidy, “Counteracting Cybercrimes in Florida”, Journal of IT, Cybersecurity, & AI, vol. 1, no. 1, pp. 1–8, Oct. 2024, doi: https://doi.org/10.70715/jitcai.2024.v1.i1.001 DOI: https://doi.org/10.70715/jitcai.2024.v1.i1.001
[6] A. Al Zaidy, “Digital Crimes and Digital Terrorism: The New Frontier of Threats in Cyberspace”, Journal of IT, Cybersecurity, & AI, vol. 1, no. 1, pp. 18–29, Nov. 2024, doi: https://doi.org/10.70715/jitcai.2024.v1.i1.003 DOI: https://doi.org/10.70715/jitcai.2024.v1.i1.003
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Ahmed Al Zaidy (Author)
This work is licensed under a Creative Commons Attribution 4.0 International License.