2021
DOI: 10.1109/access.2021.3087175
|View full text |Cite
|
Sign up to set email alerts
|

ML-LGBM: A Machine Learning Model Based on Light Gradient Boosting Machine for the Detection of Version Number Attacks in RPL-Based Networks

Abstract: Internet of Things (IoT) has caused significant digital disruption to the future of the digital world. With the emergence of the 5G technology, IoT would shift rapidly from aspirational vision to realworld applications. However, one of the most pressing issues in IoT is security. Routing protocols of the IoT, such as the Routing Protocol for Low-power and lossy network protocol (RPL), are vulnerable to both insider and outsider attacks with the insider ones being more challenging because they are more difficul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 55 publications
(25 citation statements)
references
References 28 publications
0
24
0
1
Order By: Relevance
“…On the contrary, DL, a subset of ML, requires a vast quantity of data to train the system and takes a long time, but it usually gives higher accuracy [28,29]. In that sense, ML and DL are the most successful computational techniques for providing embedded intelligence in the IoT context due to their ability to deal with a tremendous amount of data, maximize feature engineering, learn from latent abnormal patterns, and reduce the time for detecting known and unknown attacks [30][31][32][33]. Thus, the ML and DL approaches improve the IoT security and RPL network in particular and overcome the weaknesses of other conventional solutions.…”
Section: Machine Learning (Ml) and Deep Learning (Dl) Technique For R...mentioning
confidence: 99%
See 2 more Smart Citations
“…On the contrary, DL, a subset of ML, requires a vast quantity of data to train the system and takes a long time, but it usually gives higher accuracy [28,29]. In that sense, ML and DL are the most successful computational techniques for providing embedded intelligence in the IoT context due to their ability to deal with a tremendous amount of data, maximize feature engineering, learn from latent abnormal patterns, and reduce the time for detecting known and unknown attacks [30][31][32][33]. Thus, the ML and DL approaches improve the IoT security and RPL network in particular and overcome the weaknesses of other conventional solutions.…”
Section: Machine Learning (Ml) and Deep Learning (Dl) Technique For R...mentioning
confidence: 99%
“…Osman et al [31] proposed a lightweight ML approach for detecting VN attacks in RPL-based IoT networks. The proposed approach, named ML-LGBM, used Gradient Boosting Machine for detecting the attacks.…”
Section: The Feature Ranking Technique Work By Measuring the Pearson'...mentioning
confidence: 99%
See 1 more Smart Citation
“…A lightweight Version Number Attacks VNA detection model called ML-LGBM is suggested by Osman, M. et al [27]. The construction of a large VNA dataset, a feature extraction technique, an LGBM algorithm, and the highest parameter optimization are all part of the ML-LGBM model's effort.…”
Section: Related Workmentioning
confidence: 99%
“…Dentro desta vertente, as Self-driving Networks [Júnior et al 2021, Mai et al 2021, Jacobs et al 2018] têm ganhado grande notoriedade. Um elemento importante dessas abordagens refere-se ao uso de técnicas de aprendizado de máquina [Osman et al 2021] e de intenc ¸ões definidas pelo gerente da rede seguindo o conceito de Intent-Driven Networks [Davoli et al 2019]. O presente trabalho, contudo, emprega um algoritmo de tomada de decisão que age em tempo de execuc ¸ão à medida que coleta métricas da rede em tempo real.…”
Section: Trabalhos Relacionadosunclassified