Comprehensive Analysis and Detection of IoT Network Attacks Using Recon Host Discovery Traffic Dataset

Authors

DOI:

https://doi.org/10.70715/jitcai.2024.v2.i1.003

Keywords:

IoT Security, Network Traffic Analysis, Reconnaissance Attacks, Host Discovery, Intrusion Detection System, Feature Correlation, Traffic Profiling, Cybersecurity, Flow-Based Analysis, Machine Learning for IoT, TCP Flags Analysis, Data Visualization, Exploratory Data Analysis, Anomaly Detection, Correlation Heatmap, Packet Statistics, Flow Duration, Benign Traffic, Malicious Traffic, Hybrid Models

Abstract

The proliferation of Internet of Things (IoT) devices has introduced unparalleled interconnectivity and significant security challenges. Reconnaissance attacks, particularly Host Discovery, are often precursors to more severe cyber threats. In this study, we examine a labeled network traffic flow dataset to analyze patterns and identify key indicators of Recon Host Discovery attacks. Leveraging exploratory data analysis and feature correlation techniques, we uncover critical traffic behaviors, such as short flow durations and anomalous packet statistics, that distinguish benign from malicious activities. The findings lay the groundwork for developing robust detection mechanisms for IoT networks, emphasizing the importance of targeted feature selection and real-time analytics.

References

[1] T. Sasi, A. H. Lashkari, R. Lu, P. Xiong, and S. Iqbal, "An Efficient Self Attention-Based 1D-CNN-LSTM Network for IoT Attack Detection and Identification Using Network Traffic," Journal of Information and Intelligence, 2024. DOI: https://doi.org/10.1016/j.jiixd.2024.09.001

A. H. Lashkari et al., "Feature Selection for Network Intrusion Detection Using CICFlowMeter," International Journal of Computer Applications, 2019.

[2] N. Ye et al., "Statistical Analysis of Network Traffic for Intrusion Detection," IEEE Transactions on Systems, Man, and Cybernetics, 2002.

[3] G. Creech and J. Hu, "A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns," IEEE Transactions on Computers, 2014. DOI: https://doi.org/10.1109/TC.2013.13

[4] Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, "Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization," ICISSP, 2018. DOI: https://doi.org/10.5220/0006639801080116

[5] A. Al Zaidy, “Counteracting Cybercrimes in Florida”, Journal of IT, Cybersecurity, & AI, vol. 1, no. 1, pp. 1–8, Oct. 2024, doi: https://doi.org/10.70715/jitcai.2024.v1.i1.001 DOI: https://doi.org/10.70715/jitcai.2024.v1.i1.001

[6] A. Al Zaidy, “Digital Crimes and Digital Terrorism: The New Frontier of Threats in Cyberspace”, Journal of IT, Cybersecurity, & AI, vol. 1, no. 1, pp. 18–29, Nov. 2024, doi: https://doi.org/10.70715/jitcai.2024.v1.i1.003 DOI: https://doi.org/10.70715/jitcai.2024.v1.i1.003

Downloads

Published

01/15/2025

How to Cite

Al Zaidy, A. (2025). Comprehensive Analysis and Detection of IoT Network Attacks Using Recon Host Discovery Traffic Dataset. Journal of Information Technology, Cybersecurity, and Artificial Intelligence, 2(1), 18-24. https://doi.org/10.70715/jitcai.2024.v2.i1.003

Share