Reference Hub2
Network Traffic Analysis Using Machine Learning Techniques in IoT Networks

Network Traffic Analysis Using Machine Learning Techniques in IoT Networks

Shailendra Mishra
Copyright: © 2021 |Volume: 9 |Issue: 4 |Pages: 17
ISSN: 2166-7160|EISSN: 2166-7179|EISBN13: 9781799862796|DOI: 10.4018/IJSI.289172
Cite Article Cite Article

MLA

Mishra, Shailendra. "Network Traffic Analysis Using Machine Learning Techniques in IoT Networks." IJSI vol.9, no.4 2021: pp.107-123. http://doi.org/10.4018/IJSI.289172

APA

Mishra, S. (2021). Network Traffic Analysis Using Machine Learning Techniques in IoT Networks. International Journal of Software Innovation (IJSI), 9(4), 107-123. http://doi.org/10.4018/IJSI.289172

Chicago

Mishra, Shailendra. "Network Traffic Analysis Using Machine Learning Techniques in IoT Networks," International Journal of Software Innovation (IJSI) 9, no.4: 107-123. http://doi.org/10.4018/IJSI.289172

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Internet of things devices are not very intelligent and resource-constrained; thus, they are vulnerable to cyber threats. Cyber threats would become potentially harmful and lead to infecting the machines, disrupting the network topologies, and denying services to their legitimate users. Artificial intelligence-driven methods and advanced machine learning-based network investigation prevent the network from malicious traffics. In this research, a support vector machine learning technique was used to classify normal and abnormal traffic. Network traffic analysis has been done to detect and prevent the network from malicious traffic. Static and dynamic analysis of malware has been done. Mininet emulator was selected for network design, VMware fusion for creating a virtual environment, hosting OS was Ubuntu Linux, network topology was a tree topology. Wireshark was used to open an existing pcap file that contains network traffic. The support vector machine classifier demonstrated the best performance with 99% accuracy.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.