The authors implemented an attack scenario simulating attacks to
compromise node and sensor data. This research proposes a framework with algorithms
that generate automated malicious commands, which conform to device protocol
standards and bypass compromise detection. The authors performed attack detection
testing with three different home setup simulations and referred to accuracy of
detection, ease of precision, and attack recall, with F1-score as the parameters. The
results obtained for anomaly detection of IoT logs and messages used K-nearest
neighbor, multi-layer perceptron, logistic regression, random forest, and linear support
vector classifier models. The attack results presented false-positive responses with and
without the proposed framework and false-negative responses for different models.
This research calculated precision, accuracy, F1-score, and recall as attack detection
performance models. Finally, the authors evaluated the performance of the proposed
IoT communication protocol attack framework by evaluating a range of anomalies and
compared them with the maliciously generated log messages. IoT Home #1 in which
the model involved IP Camera and NAS device traffic displayed 97.7% Accuracy,
96.54% Precision, 97.29% Recall, and 96.88% F-1 Score. This demonstrated the model
classified the Home #1 dataset consistently.