sify anomalous traffic in real-world IoT traffic flows.
We assess several methods, from traditional tech-
niques with supervised learning to deep neural net-
works. We initially performed the binary classifica-
tion of traffic flows, where the system classifies each
new flow into normal or anomalous. The random
forest algorithm and the multilayer neural network
achieved the best (and satisfying) performance values.
We also evaluated a multiclass classification ap-
proach, on which the classifier should identify the
type of attack of each flow it classifies as anomalous.
The results in this approach were considerably worse
than the ones we got with binary classification. Al-
though the training and test sets are balanced in terms
of benign and malign traffic, they were unbalanced in
the types of malicious flows and some methods failed
when identifying some types of malign traffic. Even
though the training set counts with thousands of sam-
ples of one of such traffic, the relatively small number
of samples available for training had negatively im-
pacted the performance of the models. Still, a possi-
ble future work would be to evaluate the application
of multiclass identification methods only on flows that
binary classification methods identify as malign.
As future work, we also intend to expand the anal-
ysis of deep models with greater capacity to identify
temporal patterns and evaluate model resilience to ad-
versarial machine learning.
ACKNOWLEDGEMENTS
This work is funded by national funds through FCT
– Fundac¸
˜
ao para a Ci
ˆ
encia e a Tecnologia, I.P., un-
der the Scientific Employment Stimulus - Institutional
Call - CEECINST/00051/2018 and in the context of
the project UIDB/04524/2020.
REFERENCES
Al-Garadi, M. A., Mohamed, A., Al-Ali, A. K., Du, X., Ali,
I., and Guizani, M. (2020). A Survey of Machine and
Deep Learning Methods for Internet of Things (IoT)
Security. IEEE Communications Surveys and Tutori-
als, 22(3):1646–1685.
Ashraf, J., Keshk, M., Moustafa, N., Abdel-Basset, M.,
Khurshid, H., Bakhshi, A. D., and Mostafa, R. R.
(2021). Iotbot-ids: A novel statistical learning-
enabled botnet detection framework for protecting
networks of smart cities. Sustainable Cities and So-
ciety, 72:103041.
Austin, M. (2021). IoT Malicious Traffic Classification Us-
ing Machine Learning. Master’s thesis, Statler Col-
lege of Engineering and Mineral Resources - West
Virginia University.
Berman, D. S., Buczak, A. L., Chavis, J. S., and Corbett,
C. L. (2019). A survey of deep learning methods for
cyber security. Information (Switzerland), 10(4).
Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C.,
and Faruki, P. (2019). Network Intrusion Detection for
IoT Security Based on Learning Techniques. IEEE
Communications Surveys and Tutorials, 21(3):2671–
2701.
Chalapathy, R. and Chawla, S. (2019). Deep Learning for
Anomaly Detection: A Survey. arXiv preprint, pages
1–50.
Claise, B. (2008). Specification of the IP Flow Informa-
tion Export (IPFIX) Protocol for the Exchange of IP
Traffic Flow Information. RFC 5101.
Claise, B., Quittek, J., Meyer, J., Bryant, S., and Aitken, P.
(2008). Information Model for IP Flow Information
Export. RFC 5102.
Claise, B. and Trammell, B. (2013). Information Model for
IP Flow Information Export (IPFIX). RFC 7012.
Cup, K. (1999). Data/the uci kdd archive, information and
computer science. University of California, Irvine.
Garcia, S., Parmisano, A., and Erquiaga, M. J. (2020). IoT-
23: A labeled dataset with malicious and benign IoT
network traffic.
Hussain, F., Hussain, R., Hassan, S. A., and Hossain, E.
(2020). Machine Learning in IoT Security: Current
Solutions and Future Challenges. IEEE Communica-
tions Surveys and Tutorials, 22(3):1686–1721.
Kluyver, T., Ragan-Kelley, B., P
´
erez, F., Granger, B., Bus-
sonnier, M., Frederic, J., Kelley, K., Hamrick, J.,
Grout, J., Corlay, S., Ivanov, P., Avila, D., Abdalla, S.,
and Willing, C. (2016). Jupyter notebooks – a publish-
ing format for reproducible computational workflows.
In Loizides, F. and Schmidt, B., editors, Positioning
and Power in Academic Publishing: Players, Agents
and Agendas, pages 87 – 90. IOS Press.
Moustafa, N. and Slay, J. (2015). Unsw-nb15: a compre-
hensive data set for network intrusion detection sys-
tems (unsw-nb15 network data set). In 2015 military
communications and information systems conference
(MilCIS), pages 1–6. IEEE.
Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V.,
Thirion, B., Grisel, O., Blondel, M., Prettenhofer,
P., Weiss, R., Dubourg, V., Vanderplas, J., Passos,
A., Cournapeau, D., Brucher, M., Perrot, M., and
Duchesnay, E. (2011). Scikit-learn: Machine learning
in Python. Journal of Machine Learning Research,
12:2825–2830.
Santos, L., Gonc¸alves, R., Rabad
˜
ao, C., and Martins, J.
(2021). A flow-based intrusion detection framework
for Internet of Things networks. Cluster Computing,
pages 1–21.
Van Rossum, G. and Drake, F. L. (2009). Python 3 Refer-
ence Manual. CreateSpace, Scotts Valley, CA.
Zeadally, S. and Tsikerdekis, M. (2020). Securing Internet
of Things (IoT) with machine learning. International
Journal of Communication Systems, 33(1):e4169.
Evaluation of AI-based Malware Detection in IoT Network Traffic
585