Leveraging Machine Learning for IoT Traffic Analysis: Enhancing Privacy and Detecting Malicious Behavior
DOI:
https://doi.org/10.54536/ajise.v4i2.4439Keywords:
Internet of Things (IoT), Privacy Protection, Societal Impact of IoT, Supervised Learning, Traffic ClassificationAbstract
With businesses making more and more use of IoT devices, they are benefited with improved connectivity and simpler operations. But at the same time, this expansion in technology also brings along some critical data security and privacy risk. Pre-determined rule-based security measures might be inadequate in the face of adaptive cyber threats. For this, real-time traffic analysis of IoT, fueled by advanced machine learning (ML) technologies, is gaining more and more relevance to counter such threats. This work utilizes ML-based techniques to increase threat detection, identify malicious activities, and strengthen data security. Our approach consists of supervised and unsupervised learning models, utilizing Random Forest for intrusion detection and t-SNE with K-Means clustering for anomaly detection. The research utilizes the publicly available N-BaIoT dataset with careful feature engineering and standardization to achieve optimal performance. Our results demonstrate that the Random Forest model has an accuracy rate of 91% clustering methods efficiently distinguish between normal and malicious traffic. These outcomes indicate the potential of ML-based solutions to increase threat detection efficiency and minimize false positives compared to traditional approaches. Subsequent studies will explore real-time deployment, computational efficiency optimization, and compliance of AI models with regulations in order to offer effective IoT security. This study is part of the ongoing efforts to improve cyber threat defense mechanisms without infringing on user privacy in connected environments.
Downloads
References
Ahmad, T., & Zhang, D. (2021). Using the internet of things in smart energy systems and networks. Sustainable Cities and Society, 68, 102783. https://doi.org/10.1016/j.scs.2021.102783
Alshohoumi, F., & Sarrab, M. (2020). Privacy Concerns In IoT A Deeper Insight into Privacy Concerns in IoT Based Healthcare. International Journal of Computing and Digital Systems, 9(3), 399–418. https://doi.org/10.12785/ijcds/090306
Alwarafy, A., Al-Thelaya, K. A., Abdallah, M., Schneider, J., & Hamdi, M. (2020). A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet of Things. IEEE Internet of Things Journal, 1–1. https://doi.org/10.1109/jiot.2020.3015432
Babun, L., Denney, K., Celik, Z. B., McDaniel, P., & Uluagac, A. S. (2021). A survey on IoT platforms: Communication, security, and privacy perspectives. Computer Networks, 192, 108040. https://doi.org/10.1016/j.comnet.2021.108040
Cichy, P., Salge, T. O., & Kohli, R. (2021). Privacy Concerns and Data Sharing in the Internet of Things: Mixed Methods Evidence from Connected Cars. MIS Quarterly, 45(4), 1863–1892. https://doi.org/10.25300/misq/2021/14165
Dwivedi, Y. K., Hughes, L., Ismagilova, E., Aarts, G., Coombs, C., Crick, T., Duan, Y., Dwivedi, R., Edwards, J., Eirug, A., Galanos, V., Ilavarasan, P. V., Janssen, M., Jones, P., Kar, A. K., Kizgin, H., Kronemann, B., Lal, B., Lucini, B., & Medaglia, R. (2021). Artificial Intelligence (AI): Multidisciplinary Perspectives on Emerging challenges, opportunities, and Agenda for research, Practice and Policy. International Journal of Information Management, 57(101994). https://doi.org/10.1016/j.ijinfomgt.2019.08.002
Emami-Naeini, P., Agarwal, Y., Cranor, L. F., & Hibshi, H. (2020, May). Ask the experts: What should be on an IoT privacy and security label?. In 2020 IEEE Symposium on Security and Privacy (SP) (pp. 447-464). IEEE.. https://doi.org/10.1109/SP40000.2020.00043
Emami-Naeini, P., Dheenadhayalan, J., Agarwal, Y., & Cranor, L. F. (2021). Which Privacy and Security Attributes Most Impact Consumers’ Risk Perception and Willingness to Purchase IoT Devices? 2021 IEEE Symposium on Security and Privacy (SP). https://doi.org/10.1109/sp40001.2021.00112
Feng, Y., Yao, Y., & Sadeh, N. (2021). A Design Space for Privacy Choices: Towards Meaningful Privacy Control in the Internet of Things. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. https://doi.org/10.1145/3411764.3445148
Ferrag, M. A., & Shu, L. (2021). The Performance Evaluation of Blockchain-based Security and Privacy Systems for the Internet of Things: A Tutorial. IEEE Internet of Things Journal, 1–1. https://doi.org/10.1109/jiot.2021.3078072
Firoozjaei, M. D., Lu, R., & Ghorbani, A. A. (2020). An evaluation framework for privacy‐preserving solutions applicable for blockchain‐based internet‐of‐things platforms. Security and Privacy. https://doi.org/10.1002/spy2.131
Gupta, B. B., & Quamara, M. (2018). An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols. Concurrency and Computation: Practice and Experience, 32(21), e4946. https://doi.org/10.1002/cpe.4946
Gupta, B. B., Quamara, M., Shafiq, M., Gu, Z., Cheikhrouhou, O., Alhakami, W., Hamam, H., Ahmad, T., Zhang, D., Karale, A., Dwivedi, Y. K., Hughes, L., Ismagilova, E., Aarts, G., Coombs, C., Crick, T., Duan, Y., Dwivedi, R., Edwards, J., & Eirug, A. (2021). A Design Space for Privacy Choices: Towards Meaningful Privacy Control in the Internet of Things. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, 13(19), https://doi.org/10.1145/3411764.3445148
Karale, A. (2021). The Challenges of IoT Addressing Security, Ethics, Privacy and Laws. Internet of Things, 15(1), 100420. https://doi.org/10.1016/j.iot.2021.100420
Koohang, A., Sargent, C. S., Nord, J. H., & Paliszkiewicz, J. (2022). Internet of Things (IoT): From awareness to continued use. International Journal of Information Management, 62(102442), 102442. https://doi.org/10.1016/j.ijinfomgt.2021.102442
Kumar, N., Madhuri, J., & ChanneGowda, M. (2017). Review on security and privacy concerns in Internet of Things. 2017 International Conference on IoT and Application (ICIOT). https://doi.org/10.1109/iciota.2017.8073640
Lee, A.-R. (2021). Investigating the Personalization–Privacy Paradox in Internet of Things (IoT) Based on Dual-Factor Theory: Moderating Effects of Type of IoT Service and User Value. Sustainability, 13(19), 10679. https://doi.org/10.3390/su131910679
Lee, C., & Ahmed, G. (2021). Improving IoT Privacy, Data Protection and Security Concerns. International Journal of Technology, Innovation and Management (IJTIM), 1(1), 18–33. https://doi.org/10.54489/ijtim.v1i1.12
Lee, H. (2020). Home IoT resistance: Extended privacy and vulnerability perspective. Telematics and Informatics, 49, 101377. https://doi.org/10.1016/j.tele.2020.101377
Mishra, S., & Tyagi, A. K. (2022). The Role of Machine Learning Techniques in Internet of Things-Based Cloud Applications. Internet of Things, 105–135. https://doi.org/10.1007/978-3-030-87059-1_4
Ogonji, M. M., Okeyo, G., & Wafula, J. M. (2020). A survey on privacy and security of Internet of Things. Computer Science Review, 38(38), 100312. https://doi.org/10.1016/j.cosrev.2020.100312
Ons Aouedi, Vu, T.-H., Sacco, A., Nguyen, D. C., Kandaraj Piamrat, Marchetto, G., & Pham, Q.-V. (2024). A Survey on Intelligent Internet of Things: Applications, Security, Privacy, and Future Directions. IEEE Communications Surveys & Tutorials, 1–1. https://doi.org/10.1109/comst.2024.3430368
Panalangin, M. L., Mantikayan, J. M., Abdulgani, M. A., & Mohamad, H. A. (2024). Integration of Iot-Knowledge-Based Architecture in the Development of the Daily Time Records System for the Ministry of Science and Technology, Philippines. American Journal of Innovation in Science and Engineering, 4(1), 9–20. https://doi.org/10.54536/ajise.v4i1.3947
Princi, E., & Krämer, N. C. (2020). Out of Control – Privacy Calculus and the Effect of Perceived Control and Moral Considerations on the Usage of IoT Healthcare Devices. Frontiers in Psychology, 11. https://doi.org/10.3389/fpsyg.2020.582054
Salama, R., Al-Turjman, F., Chaudhary, P., & Yadav, S. P. (2023, April). (Benefits of Internet of Things (IoT) Applications in Health care-An Overview). In 2023 International Conference on Computational Intelligence, Communication Technology and Networking (CICTN) (pp. 778-784). IEEE.https://doi.org/10.1109/cictn57981.2023.10141452
Shafiq, M., Gu, Z., Cheikhrouhou, O., Alhakami, W., & Hamam, H. (2022). The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT-Based Security Attacks. Wireless Communications and Mobile Computing, 2022(1), 1–12. https://doi.org/10.1155/2022/8669348
Sharma, V., You, I., Andersson, K., Palmieri, F., Rehmani, M. H., & Lim, J. (2020). Security, Privacy and Trust for Smart Mobile- Internet of Things (M-IoT): A Survey. IEEE Access, 8, 167123–167163. https://doi.org/10.1109/ACCESS.2020.3022661
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Md Hamid Borkot Tulla, Mithil Mahbub, MD Naimur Rhaman, Mahmud Midul, Rabius Sany

This work is licensed under a Creative Commons Attribution 4.0 International License.