Claim Missing Document
Check
Articles

Found 6 Documents
Search

Towards robust security in WSN: a comprehensive analytical review and future research directions Zhukabayeva, Tamara; Zholshiyeva, Lazzat; Ven-Tsen, Khu; Mardenov, Yerik; Adamova, Aigul; Karabayev, Nurdaulet; Abdildayeva, Assel; Baumuratova, Dilaram
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 1: October 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i1.pp318-337

Abstract

One of the most important aspects of the effective functioning of wireless sensor network (WSN) is their security. Despite significant progress in WSN security, there are still several unresolved issues. Many review studies have been published on the problems of possible attacks on WSN and their identification. However, due to the lack of their systematic analysis, it is not possible to fully substantiate practical recommendations for the effective application of the proposed solutions in the field of WSN security. In particular, the creation of methods that provide a high degree of security while minimizing computational effort and costs, and the development of effective methods for detecting and preventing attacks on WSN. The purpose of this document is to fill this gap. The article presents the results of the study in the form of a systematic analysis of the literature with a targeted selection of sources to identify the most effective methods for detecting and preventing attacks on WSN. By identifying the security of WSN, which has not yet been addressed in research works, the review aims to reduce its impact. As a result, our extended taxonomy is presented, including attack types, datasets, effective WSN attack detection methods, countermeasures, and intrusion detection systems (IDS).
Enhancing internet of things security against structured query language injection and brute force attacks through federated learning Adamova, Aigul; Zhukabayeva, Tamara; Mukanova, Zhanna; Oralbekova, Zhanar
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i1.pp1187-1199

Abstract

The internet of things (IoT) encompasses various devices for monitoring, data collection, tracking people and assets, and interacting with other gadgets without human intervention. Implementing a system for predicting the development and assessing the criticality of detected attacks is essential for ensuring security in IoT interactions. This work analyses existing methods for detecting attacks, including machine learning, deep learning, and ensemble methods, and explores the federated learning (FL) method. The aim is to study FL to enhance security, develop a methodology for predicting the development of attacks, and assess their criticality in real-time. FL enables devices and the aggregation server to jointly train a common global model while keeping the original data locally on each client. We demonstrate the performance of the proposed methodology against structured query language (SQL) injection and brute force attacks using the CICIOT2023 dataset. We used accuracy and F1 score metrics to evaluate the effectiveness of our proposed methodology. As a result, the accuracy in predicting SQL injection reached 100%, and for brute force attacks, it reached 98.25%. The high rates of experimental results clearly show that the proposed FL-based attack prediction methodology can be used to ensure security in IoT interactions.
Comprehensive Study on Detecting Multi-Class Classification of IoT Attack Using Machine Learning Methods Zhukabayeva, Tamara; Zholshiyeva, Lazzat; Ven-Tsen, Khu; Adamova, Aigul; Karabayev, Nurdaulet; Mardenov, Erik
Journal of Robotics and Control (JRC) Vol. 5 No. 6 (2024)
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18196/jrc.v5i6.22819

Abstract

The proliferation of IoT devices has heightened their susceptibility to cyberattacks, particularly botnets. Conventional security methods frequently prove inadequate because of the restricted processing capabilities of IoT devices. This paper suggests utilizing machine learning methods to enhance the detection of attacks in Internet of Things (IoT) environments. The paper presents a novel approach to detect different botnet assaults on IoT devices by utilizing ML methods such as XGBoost, Random Forest, LightGBM, and Decision Tree. These algorithms were examined using the N-BaIoT dataset to classify multi-class botnet attacks and were specifically designed to accommodate the limitations of IoT devices. The technique comprises the steps of data preparation, preprocessing, classifier training, and decision-making. The algorithms achieved high detection accuracy rates: XGBoost (99.18%), Random Forest (99.20%), LGBM (99.85%), and Decision Tree (99.17%). The LGBM model demonstrated exceptional performance. The incorporation of the attack evaluation model greatly enhanced the identification of botnets in IoT networks. The paper displays the efficacy of machine learning techniques in identifying botnet assaults in IoT networks. The models generated exhibit exceptional accuracy and can be seamlessly integrated into existing cybersecurity systems.
Tackling the anomaly detection challenge in large-scale wireless sensor networks Zhukabayeva, Tamara; Adamova, Aigul; Zholshiyeva, Lazzat; Mardenov, Yerik; Karabayev, Nurdaulet; Baumuratova, Dilaram
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp2479-2490

Abstract

One of the areas of ensuring the security of a wireless sensor network (WSN) is anomaly detection, which identifies deviations from normal behavior. In our paper, we investigate the optimal anomaly detection algorithms in a WSN. We highlight the problems in anomaly detection, and we also propose a new methodology using machine learning. The effectiveness of the k-nearest neighbor (kNN) and Z Score methods is evaluated on the data obtained from WSN devices in real time. According to the experimental study, the Z Score methodology showed a 98.9% level of accuracy, which was much superior to the kNN 43.7% method. In order to ensure accurate anomaly detection, it is crucial to have access to high-quality data when conducting a study. Our research enhances the field of WSN security by offering a novel approach for detecting anomalies. We compare the performance of two methods and provide evidence of the superior effectiveness of the Z Score method. Our future research will focus on exploring and comparing several approaches to identify the most effective anomaly detection method, with the ultimate goal of enhancing the security of WSN.
Assessing the knowledge and practices of internet of things security and privacy among higher education students Adamova, Aigul; Zhukabayeva, Tamara; Zhartybayeva, Makpal; Zhumabayeva, Laula
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 4: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i4.pp4074-4086

Abstract

When multiple internet of things (IoT) devices interact, there are risks of privacy breaches, personal data leaks, various attacks, and device manipulation. Security is one of the most important technological research problems that currently exist for the IoT. The main purpose of the present paper is to determine the level of awareness of university students about existing security issues when using IoT devices. The paper presented the methodology of the survey. A questionnaire was developed covering four areas, such as fact-finding about general concepts of the IoT, security measures when using IoT devices, security threats and the presence of vulnerabilities of IoT devices, general policies, practices and shared responsibilities. A methodology for calculating the Awareness Level Index is proposed. This study has potential limitations. The effect estimates in the model are based on a survey of undergraduate and master’s degree students in “Computer Science” and “Software Engineering” within several universities. A total of 370 undergraduate and master’s students participated in the survey. The data processing resulted in the development of recommendations and suggested measures. This study will be useful for both stakeholders and researchers to develop effective strategies and make informed decisions.
Network Attack Detection Using NeuroEvolution of Augmenting Topologies (NEAT) Algorithm Zhukabayeva, Tamara; Adamova, Aigul; Ven-Tsen, Khu; Nurlan, Zhanserik; Mardenov, Yerik; Karabayev, Nurdaulet
JOIV : International Journal on Informatics Visualization Vol 8, No 1 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.1.2220

Abstract

The imperfection of existing intrusion detection methods and the changing nature of malicious actions on the attacker's part led to the Internet of Things (IoT) network interaction in an unsafe state. The actual problem of improving the technology of the IOT is counteracting malicious network impacts. In this regard, research and development aimed at creating effective tools for solving applied problems within the framework of this problem are becoming increasingly important.  This study seeks to develop tools for detecting anomalous network conditions resulting from malicious attacks. In particular, the accuracy of the identification of DoS and DDoS attacks is sufficient for operational use. This study analyzes various multi-level architectures, relevant communication protocols, and different types of network attacks. The presented research was conducted on open datasets TON_IOT DATASETS, which include multiple data sources collected from IoT sensors. The modified HyperNEAT algorithm was used as the basis for the development. The NEAT methodology used in the study allows you to combine various network nodes. Results of the study: a neuro-evolutionary algorithm for identifying DoS and DDoS attacks was implemented, integrated, and real-tested based on a multi-level analysis of network traffic combined with various adaptive modules. The accuracy of identifying DoS and DDoS attacks is 0.9242 in the Accuracy metric. The study implies that the proposed approach can be recommended for network intrusion detection, ensuring security when interacting with the IoT.