Red Paper
International Journal of Engineering in Computer Science

Impact Factor (RJIF): 5.52, P-ISSN: 2663-3582, E-ISSN: 2663-3590
Printed Journal   |   Refereed Journal   |   Peer Reviewed Journal
Peer Reviewed Journal

2025, Vol. 7, Issue 1, Part B

Machine learning and IOT Security: A review


Author(s): Sonia Mahesh Verma and Priyank Nahar

Abstract: We are living in a connected world which encompasses various types of devices and networks. The most widely used network in modern age is Internet of Things (IoT). It is a type of network where IOT devices can communicate with each other without human intervention. The life of people is transformed with the evolution of smart city, smart home concepts. The areas are not limited. It ranges from healthcare, medical, transportation to banking, smart grid, agriculture. It has transformed the lives of people by providing ease and comfort of completing the tasks in less time with less overhead. However, there is a negative side of IoT and that is it lacks the implementation of sound and effective security measures. There are various risks associated with use of IoT. Some of them are risk of unauthorized access of data, node spoofing and different cyber-attacks like denial of service (DoS), Botnet, Ransom ware, eavesdropping, zero day attack. So, the main concern addressed here is how to detect intrusions into the network using Machine Learning. Machine Learning (ML) plays an important role in designing of intrusion detection systems to detect the anomalies in the network. The ML techniques are very efficient in detection of different types of cyber-attacks. This paper presents the review of different ML techniques in detection of intrusions into IoT networks. Different ML techniques like Random Forest, Neural Network, support vector machine etc. are useful in detection of anomalies in the network. Different datasets like UNSW-NB 15, CICIDS-2017, KDD-99, NSL-KDD, TON_IoT and ECU-IOHT are available which consists of data related to different types of cyber-attacks and are used to form intrusion detection systems. This paper presents the application of different ML algorithms in detection of abnormalities in the network, comparative analysis of different feature selection and machine learning techniques along with challenges and issues present in traditional intrusion detection systems(IDS) in IOT networks.

DOI: 10.33545/26633582.2025.v7.i1b.161

Pages: 98-105 | Views: 578 | Downloads: 288

Download Full Article: Click Here

International Journal of Engineering in Computer Science
How to cite this article:
Sonia Mahesh Verma, Priyank Nahar. Machine learning and IOT Security: A review. Int J Eng Comput Sci 2025;7(1):98-105. DOI: 10.33545/26633582.2025.v7.i1b.161
International Journal of Engineering in Computer Science

International Journal of Engineering in Computer Science

International Journal of Engineering in Computer Science
Call for book chapter
Journals List Click Here Research Journals Research Journals