{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{-“日期-部件”:[[2024,2,6]],“日期-时间”:“2024-02-06T18:27:29Z”,“时间戳”:1707244049921},“引用-计数”:54,“发布者”:“IGI Global”,“问题”:“4”,“许可证”:[{“开始”:{-date-parts”:[2021,10,1]],”日期-时间“:”2021-1 0-01T00:00:00Z“,”时间戳“:163304640000},“content-version”:“vor”,“delay-in-days”:0,“URL”:“http://\/creativecommons.org\/licenses\/by\/3.0\/dode.en_US”},{“start”:{“date-parts”:[[2021,10,1]],“date-time”:“2021-10-01T00:00:00Z”,“timestamp”:163304640000},“content-version”:“am”,“delay-in-days”:“0,”URL“http://creativecommons-org\/licenses\/by\/3.0\/dote.en_US“},{“start”:{“date-parts”用法:[2021,10,1]],“date-time”:“2021-10-01T00:00:00Z”,“timestamp”:1633046400000},“content-version”:“tdm”,“delay-in-days”:0,“URL”:“http://\/creativecommons.org\/licenses\/by\/3.0\/dode.en_US”}],“content-domain”:{“domain”:[],“crossmark-restriction”:false},”short-container-title“:[],”published-print“:{”date parts“:[[2021,10,1]]},”抽象“:”

本研究旨在分析机器学习模型在利用最新物联网数据集检测物联网恶意软件方面的性能。使用九种著名的机器学习技术对物联网数据集进行了实验,包括Logistic Regression(LR)、Naive Bayes(NB)、Decision Tree(DT)、k-Nearest Neighbors(KNN)、Support Vector Machines(SVM)、Neural Networks(NN),Random Forest(RF)、Bagging(BG)和Stacking(ST)。结果表明,该模型对DT、SVM、RF、BG等IoT恶意软件的检测准确率达到100%;LR、NB、KNN、NN约99.9%;ST分类器仅为28.16%。该研究还表明,与在相同数据集上评估的其他拟议机器学习模型相比,该模型具有更高的性能。因此,本研究的结果可以帮助研究人员和应用程序开发人员为物联网设备设计和构建智能恶意软件检测系统<\/p> “,”DOI“:”10.4018\/ijcini.286768“,”type“:”journal-article“,”created“:{”date-parts“:[2021,8,25]],”date-time“:”2021-08-25T17:20:50Z“,”timestamp“:1629912050000},”page“:“1-18”,“source”:“Crossref”,“is-referenced-by-count”:3,”title“:[”检测互联网恶意软件的机器学习方法“],”前缀“:”104018“,“卷”:“15”,“作者”:[{ORCID“:”http://\/ORCID.org\/0000-0001-7756-1832“,”authenticated-ORCID“:true,”given“:“Winfred”,”family“:”Yaokumah“,”sequence“:”first“,”affiliation“:[{”name“:”University of Ghana,Ghana“}]},{“ORCID”:“http://\/ORCID.org\/0000-0003-2798-4524”,”authonticated-ocid“:true,”gived“:”Justice Kwame“,”faily“:“Appati”,“sequence”:“附加”,“从属关系”:[{name“:”加纳大学“}]},{“ORCID”:“http://\/ORCID.org\/00000-0002-2387-0821”,“authenticated-ORCID”:true,“given”:”Daniel“,“family”:“Kumah”,“sequence”:“additional”,“affiliation”:[{“name”:“Hightel Consults Ltd.,Ghana”}]}],“member”:“2432”,“reference”:[[{”key“:”IJCINI.286768-0“,”doi-asserted-by“publisher”,“doi”:“10.1186\/s13638-021-01893-8“},{“key”:“IJCINI.286768-1”,“doi-asserted-by”:“publisher”,“doi”:“10.30534\/ijeter\/2020\/230892020”},}“key”:”IJCINI.286768-2“,”doi-assert-by“:”publisher“,”doi“:”10.1109\/JIOT.2019.2925929“}:“publisher”,“doi”:“10.1109\/CNS.2018.8433203”},{“key”:“IJCINI.286768-4”,“doi-asserted-by“:”publisher“,”doi“:”10.14569\/IJACSA.2019.0101280“},{“key”:“IJCINI.286768-5”,“doi-assert-by”:“publisher”,“doi”:“10.1016\/j.com.2017.02.003”},“key“:”IJCINI.286768-6“,”doi-assered-by“:”prisher“INI.286768-7“,“doi-asserted-by”:“publisher”,“doi”:“10.1007\/978-3-030-55190-2_53”},{“key”:“IJCINI.286768-8”,“doi-asserted-by”:“publisher”,”doi“:”10.1109\/ICSTM.2015.7225395“},{”key“:”IJCINI.286768-9“,”doi-assert-by“:”publisher“,“doi”:“10.1016\/j.artmed.2018.05.005”},“key 8-3-030-45778-5_4“},{“key”:“IJCINI.286768-11”,“unstructured”:“Dataquest Reviews。(2020)656名学习者结果分析。检索自https:\/\/www.dataquest.io\/blog\/topics\/dataquest-updates\/“},{“key”:“IJCINI.286768-12”,“doi-serted-by”:“publisher”,”doi“:”10.1016\/j.jnca.2020.102662“}”,{”key“:”IJCINI.286768-13“,”doi-sered-by“:”publisher 8-14“,”doi-asserted-by“:”publisher“,”doi“:”10.3390\/s20164583“},{“key“:”IJCINI.286768-15“,”doi-asserted-by“:”publisher“,“doi”:“10.1159\/000491488”},{“key”:“IJCINI.286768-16”,“doi-assert-by”:“publisher”,”doi“:“10.1109\/TEM.2019.2922936”}、{“密钥”:“I JCINI.286768-17”,“首页”:“14”,“article-title”:“使用机器学习算法的入侵检测系统集成方法”,“作者”:“R.K.S.Gautam”,“年份:“2018”,“新闻标题”:“云计算、数据科学与工程国际会议(Confluence)”},{“key”:“IJCINI.286768-18”,“doi-asserted-by”:“publisher”,”doi“:”10.1016\/j.future.2013.01010“},”{“key”:”IJCINI.286768-19“,”非结构化“:”Guhathakurta,R.(2017)物联网如何改变零售业的基础。检索自https:\/\/trak.in\/tags\/business\/2016\/08\/30\/物联网改变零售业的基本原理“},{“key”:“IJCINI.286768-20”,“doi断言者”:“publisher”,“doi”:“10.1016\/j.iot.2019.100059”},{“key”:“IJCINI.286768-21”,“doi断言者”:“publisher”,“doi”:“10.1016\/j.inca.2013.08.001”},{“key”:“IJCINI.286768-21”768-22”,“作者”:“P。N.Howard”,“年份”:“2015”,“期刊标题”:“Pax Technica:物联网如何让我们自由,或将我们锁定”},{“密钥”:“IJCINI.286768-23”,“doi断言”:“出版商”,“doi”:“10.1016\/j.neucom.2005.12 26”},{“密钥”:“IJCINI.286768-24”,“首页”:“71”,“文章标题”:“分布式环境中身份验证攻击与对策的调查”,“卷”:“5”,“作者”:“A.Jesudoss”,“年份”:“2014年”,“期刊标题”:“印度计算机科学工程杂志”},{“密钥”:“IJCINI.286768-25”,“非结构化”:“Kern,R.(2014)特征工程、知识发现和数据挖掘。检索自http:\/\/kti.tugraz.at \/staff\/denis\/courcess\/kddm1\/featureengineering.pdf“},{“key”:“IJCINI.286768-26”,“doi-asserted-by”:“publisher”,“doi”:“10.1186\/s42400-021-00077-7”},}“key”:”IJCINI.286768-237“,“doi-asserted-by”:”publisher“,”doi“:”10.1109\/MC.2017.201“}”,{”key“:”IJCINI.286768-28“,”doi-asserted-by“:”publisher“,”doi“:”10.1016\/j.future.2019.05.041“},{“key”:“IJCINI.286768-29”,“doi-asserted-by”:“publisher”,“doi”:“10.1016\/j.cose.2021.102260”},}“密钥”:“I JCINI.286768-30”,”doi-assert-by“:”publisher“,”doi“:”10.1109\/iThings-GreenCom-CPSCom-SmartData-Cybermatics50389.2020.00058“}”,{”key“:”IJCINI。286768-31“,”doi-asserted-by“:”publisher“,”doi“:”10.1109\/JIOT.2018.2869847“},{“key”:“IJCINI.286768-32”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/3418293”},“key“:”IJCINI.286768-233“,”doi-assert-by“:”crossref“,”unstructured“:”Moustafa,N.,Turnbull,B.,&Choo,K.K.R.(2018a)实现IIoT网络中漏洞和漏洞识别的自动化。2018 IEEE工业互联网国际会议,ICII,139\u2013145.“,“DOI”:“10.1109\/ICII.2018.00023”},{“key”:“IJCINI.286768-34”,“DOI-asserted-by”:“publisher”,“DOI:”10.1109\/JIOT.2018.2871719“},”{“key”:”IJCINI.286768-235“,”DOI-assert-by“:”publisher“,”DOI“:”10.1007\/978-3030-45541-5_10“}”,{:“IJCINI.286768-36”,“DOI-asserted-by”:“publisher“,”DOI“:”10.1016\/j.icte.2020.04.005“},{“key”:“IJCINI.286768-37”,“DOI-asserted-by”:“publisher”,“DOI”:“10.1109\/KSE.2018.8573374”},“{”key“:”IJCINI.286768-38“,”DOI-assert-by“:”publisher,“DOI:”10.1007\/978-3030-38557-6_6“}”,{”key“:“IJSINI.28768-39”,“DOI-asserted-by”:“publisher”,“DOI”:“10.1007\/978-981-15-8439-8_52”},{“key”:“IJCINI.286768-40“,“非结构化”:“Rocca,J.(2019)。集成方法:打包、增强和堆叠-理解集成学习的关键概念。检索自https:\/\/towardsdastascience.com\/ensemble-methods-baging-boosting-and-stacking-c9214a10a205“},{“key”:“IJCINI.286768-41”,“文章标题”:“物联网(IoT)”,“卷”:“2019”,“作者”:“M.Rouse”,“年份”:“2019”,“期刊标题”:“议程(南非德班)”},{“key”:“IJCINI.286768-42”,“doi断言者”:“出版商”,“doi”:“10.1016\/j.sciaf.2020.e00500“},{“key”:“IJCINI.286768-43”,“doi-asserted-by”:“publisher”,“doi”:“10.1016\/j.cose.2020.101863”},“key“:”IJCINI.286768-4“,”doi-assert-by“:”publisher“,”doi“:”10.1016\\j.future.2020.02.017“}”,{”issue“:”3“,”key“:”IJCINI.286768-45“,“首页”:“1053”,“文章标题”:“使用机器学习技术的绿色物联网设备的高效僵尸网络检测方法。“,”volume“:”10“,”author“:”M.Shobana“,”year“:”2020“,”journal-title“:”journal of Green Engineering“},{“key”:“IJCINI.286768-46”,”unstructured“:”Simon,M.K.(2011).假设、限制和定界。检索自http://\/desertationrecipes.com\/wp-content\/uploads\/2011\/04\/AssumptionslimitationsdelimitationsX.pdf“}”,{IJCINI.286768-47“,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/JIOT.2015.2460”},{“key”:“IJCINI.286768-408”,“doo-asserted-by”:”publisher“,”doi“:”10.1109\/COMPSAC.2018.10315“},“key“:”IJCINI.286768-49“,”doi-assert-by“:”publister“,”doi“:“10.1016\/S1353-4858(11)70086-1“},{”key“:”IJCINI.286768-50“,”doi-asserted-by“:”publisher“,“doi”:“10.1109\/URTC.2017.8284194“},{“key”:“IJCINI.286768-51”,“unstructured”:“Waikato大学。(2018)。机器学习的工作台。WaikatoUniversity。检索自https:\/\/www.cs.Waikato.ac.nz\/ml\/weka\/”},}“key”:”IJCINI.286768-82“,”unstructure“:”Wakefield,K.(2020)机器学习算法及其应用指南。检索自https:\/\/www.sas.com/en_gb\/insights\/articles \/analysics\/machine-learning-algorithms.html“},{“key”:“IJCINI.286768-53”,“doi-asserted-by”:“publisher”,“doi”:“10.4018\/IJDAI.2020010102”}],“container-title”:[“International Journal of Cognitive Informatics and Natural Intelligence”],“original-title“:[],”language“:”ng“,”link“:[{”URL“:”https:\/\/www.igi-global.com/viewtitle.aspx?TitleId=286768“,”content-type“:”unspecified“,”content-version“:”vor“,”intended-application“:”similarity-checking“}],”deposed“:{”date-parts“:[2023,1,16]],”date-time“:“2023-01-16T21:48:52Z”,”timestamp“:1673905732000},”score“:1,”resource“:”{“primary”:{“URL”:“https:\/\/services.gigi-global.com\/resolvedoi\/result.aspx?doi=10.4018\/IJCINI.286768“}}”副标题“:[”“],“短标题”:[],“已发布”:{“日期部分”:[[2021,10,1]]},“引用计数”:54,“日志发布”:}“问题”:“4”,“发布版本”:{“日期部分“:[[2021,10]]}},”URL“:”http://\/dx.doi.org\/10.4018\/ijcini.286768“,”关系“:{}”,“ISSN”:[“1557-3958”,“1557-”3966“],”ISSN-type“:[{”value“:”1557-3958“,”type“:”print“},{”value“:”2557-3966“,”类型“:”电子“}”,“主题”:[],“已发布”:{“日期部分”:[[2021,10,1]]}}