Leveraging Machine Learning for IoT Traffic Analysis: Enhancing Privacy and Detecting Malicious Behavior

Authors

DOI:

https://doi.org/10.54536/ajise.v4i2.4439

Keywords:

Internet of Things (IoT), Privacy Protection, Societal Impact of IoT, Supervised Learning, Traffic Classification

Abstract

With businesses making more and more use of IoT devices, they are benefited with improved connectivity and simpler operations. But at the same time, this expansion in technology also brings along some critical data security and privacy risk. Pre-determined rule-based security measures might be inadequate in the face of adaptive cyber threats. For this, real-time traffic analysis of IoT, fueled by advanced machine learning (ML) technologies, is gaining more and more relevance to counter such threats. This work utilizes ML-based techniques to increase threat detection, identify malicious activities, and strengthen data security. Our approach consists of supervised and unsupervised learning models, utilizing Random Forest for intrusion detection and t-SNE with K-Means clustering for anomaly detection. The research utilizes the publicly available N-BaIoT dataset with careful feature engineering and standardization to achieve optimal performance. Our results demonstrate that the Random Forest model has an accuracy rate of 91% clustering methods efficiently distinguish between normal and malicious traffic. These outcomes indicate the potential of ML-based solutions to increase threat detection efficiency and minimize false positives compared to traditional approaches. Subsequent studies will explore real-time deployment, computational efficiency optimization, and compliance of AI models with regulations in order to offer effective IoT security. This study is part of the ongoing efforts to improve cyber threat defense mechanisms without infringing on user privacy in connected environments.

Downloads

Download data is not yet available.

References

Ahmad, T., & Zhang, D. (2021). Using the internet of things in smart energy systems and networks. Sustainable Cities and Society, 68, 102783. https://doi.org/10.1016/j.scs.2021.102783

Alshohoumi, F., & Sarrab, M. (2020). Privacy Concerns In IoT A Deeper Insight into Privacy Concerns in IoT Based Healthcare. International Journal of Computing and Digital Systems, 9(3), 399–418. https://doi.org/10.12785/ijcds/090306

Alwarafy, A., Al-Thelaya, K. A., Abdallah, M., Schneider, J., & Hamdi, M. (2020). A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet of Things. IEEE Internet of Things Journal, 1–1. https://doi.org/10.1109/jiot.2020.3015432

Babun, L., Denney, K., Celik, Z. B., McDaniel, P., & Uluagac, A. S. (2021). A survey on IoT platforms: Communication, security, and privacy perspectives. Computer Networks, 192, 108040. https://doi.org/10.1016/j.comnet.2021.108040

Cichy, P., Salge, T. O., & Kohli, R. (2021). Privacy Concerns and Data Sharing in the Internet of Things: Mixed Methods Evidence from Connected Cars. MIS Quarterly, 45(4), 1863–1892. https://doi.org/10.25300/misq/2021/14165

Dwivedi, Y. K., Hughes, L., Ismagilova, E., Aarts, G., Coombs, C., Crick, T., Duan, Y., Dwivedi, R., Edwards, J., Eirug, A., Galanos, V., Ilavarasan, P. V., Janssen, M., Jones, P., Kar, A. K., Kizgin, H., Kronemann, B., Lal, B., Lucini, B., & Medaglia, R. (2021). Artificial Intelligence (AI): Multidisciplinary Perspectives on Emerging challenges, opportunities, and Agenda for research, Practice and Policy. International Journal of Information Management, 57(101994). https://doi.org/10.1016/j.ijinfomgt.2019.08.002

Emami-Naeini, P., Agarwal, Y., Cranor, L. F., & Hibshi, H. (2020, May). Ask the experts: What should be on an IoT privacy and security label?. In 2020 IEEE Symposium on Security and Privacy (SP) (pp. 447-464). IEEE.. https://doi.org/10.1109/SP40000.2020.00043

Emami-Naeini, P., Dheenadhayalan, J., Agarwal, Y., & Cranor, L. F. (2021). Which Privacy and Security Attributes Most Impact Consumers’ Risk Perception and Willingness to Purchase IoT Devices? 2021 IEEE Symposium on Security and Privacy (SP). https://doi.org/10.1109/sp40001.2021.00112

Feng, Y., Yao, Y., & Sadeh, N. (2021). A Design Space for Privacy Choices: Towards Meaningful Privacy Control in the Internet of Things. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. https://doi.org/10.1145/3411764.3445148

Ferrag, M. A., & Shu, L. (2021). The Performance Evaluation of Blockchain-based Security and Privacy Systems for the Internet of Things: A Tutorial. IEEE Internet of Things Journal, 1–1. https://doi.org/10.1109/jiot.2021.3078072

Firoozjaei, M. D., Lu, R., & Ghorbani, A. A. (2020). An evaluation framework for privacy‐preserving solutions applicable for blockchain‐based internet‐of‐things platforms. Security and Privacy. https://doi.org/10.1002/spy2.131

Gupta, B. B., & Quamara, M. (2018). An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols. Concurrency and Computation: Practice and Experience, 32(21), e4946. https://doi.org/10.1002/cpe.4946

Gupta, B. B., Quamara, M., Shafiq, M., Gu, Z., Cheikhrouhou, O., Alhakami, W., Hamam, H., Ahmad, T., Zhang, D., Karale, A., Dwivedi, Y. K., Hughes, L., Ismagilova, E., Aarts, G., Coombs, C., Crick, T., Duan, Y., Dwivedi, R., Edwards, J., & Eirug, A. (2021). A Design Space for Privacy Choices: Towards Meaningful Privacy Control in the Internet of Things. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, 13(19), https://doi.org/10.1145/3411764.3445148

Karale, A. (2021). The Challenges of IoT Addressing Security, Ethics, Privacy and Laws. Internet of Things, 15(1), 100420. https://doi.org/10.1016/j.iot.2021.100420

Koohang, A., Sargent, C. S., Nord, J. H., & Paliszkiewicz, J. (2022). Internet of Things (IoT): From awareness to continued use. International Journal of Information Management, 62(102442), 102442. https://doi.org/10.1016/j.ijinfomgt.2021.102442

Kumar, N., Madhuri, J., & ChanneGowda, M. (2017). Review on security and privacy concerns in Internet of Things. 2017 International Conference on IoT and Application (ICIOT). https://doi.org/10.1109/iciota.2017.8073640

Lee, A.-R. (2021). Investigating the Personalization–Privacy Paradox in Internet of Things (IoT) Based on Dual-Factor Theory: Moderating Effects of Type of IoT Service and User Value. Sustainability, 13(19), 10679. https://doi.org/10.3390/su131910679

Lee, C., & Ahmed, G. (2021). Improving IoT Privacy, Data Protection and Security Concerns. International Journal of Technology, Innovation and Management (IJTIM), 1(1), 18–33. https://doi.org/10.54489/ijtim.v1i1.12

Lee, H. (2020). Home IoT resistance: Extended privacy and vulnerability perspective. Telematics and Informatics, 49, 101377. https://doi.org/10.1016/j.tele.2020.101377

Mishra, S., & Tyagi, A. K. (2022). The Role of Machine Learning Techniques in Internet of Things-Based Cloud Applications. Internet of Things, 105–135. https://doi.org/10.1007/978-3-030-87059-1_4

Ogonji, M. M., Okeyo, G., & Wafula, J. M. (2020). A survey on privacy and security of Internet of Things. Computer Science Review, 38(38), 100312. https://doi.org/10.1016/j.cosrev.2020.100312

Ons Aouedi, Vu, T.-H., Sacco, A., Nguyen, D. C., Kandaraj Piamrat, Marchetto, G., & Pham, Q.-V. (2024). A Survey on Intelligent Internet of Things: Applications, Security, Privacy, and Future Directions. IEEE Communications Surveys & Tutorials, 1–1. https://doi.org/10.1109/comst.2024.3430368

Panalangin, M. L., Mantikayan, J. M., Abdulgani, M. A., & Mohamad, H. A. (2024). Integration of Iot-Knowledge-Based Architecture in the Development of the Daily Time Records System for the Ministry of Science and Technology, Philippines. American Journal of Innovation in Science and Engineering, 4(1), 9–20. https://doi.org/10.54536/ajise.v4i1.3947

Princi, E., & Krämer, N. C. (2020). Out of Control – Privacy Calculus and the Effect of Perceived Control and Moral Considerations on the Usage of IoT Healthcare Devices. Frontiers in Psychology, 11. https://doi.org/10.3389/fpsyg.2020.582054

Salama, R., Al-Turjman, F., Chaudhary, P., & Yadav, S. P. (2023, April). (Benefits of Internet of Things (IoT) Applications in Health care-An Overview). In 2023 International Conference on Computational Intelligence, Communication Technology and Networking (CICTN) (pp. 778-784). IEEE.https://doi.org/10.1109/cictn57981.2023.10141452

Shafiq, M., Gu, Z., Cheikhrouhou, O., Alhakami, W., & Hamam, H. (2022). The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT-Based Security Attacks. Wireless Communications and Mobile Computing, 2022(1), 1–12. https://doi.org/10.1155/2022/8669348

Sharma, V., You, I., Andersson, K., Palmieri, F., Rehmani, M. H., & Lim, J. (2020). Security, Privacy and Trust for Smart Mobile- Internet of Things (M-IoT): A Survey. IEEE Access, 8, 167123–167163. https://doi.org/10.1109/ACCESS.2020.3022661

Published

2025-05-09

How to Cite

Tulla, M. H. B., Mahbub, M., Rhaman, M. N., Mahmud , M., & Rabius , S. (2025). Leveraging Machine Learning for IoT Traffic Analysis: Enhancing Privacy and Detecting Malicious Behavior. American Journal of Innovation in Science and Engineering, 4(2), 31–40. https://doi.org/10.54536/ajise.v4i2.4439