The increasing deployment of Internet of Things (IoT) devices has made networks more vulnerable to malicious activities, necessitating effective traffic classification methods. This study investigates machine learning-based approaches to classify network traffic using the CTU-IoT-Malware-Capture-3-1conn.log.labeled dataset, which includes over 150,000 records labeled as benign or malicious. Key numeric features such as packet counts, data volumes (bytes), protocol types, and source IP frequencies were selected to enhance the models' predictive capabilities. Preprocessing involved normalization with StandardScaler to ensure equal contribution of features to model predictions. Four machine learning algorithms were evaluated: Logistic Regression, Random Forest, Support Vector Machines (SVM), and Gradient Boosting. The experiments utilized a 5-fold cross-validation framework to ensure robustness and reliability. Gradient Boosting outperformed other models with a mean accuracy of 99.13%, followed by Random Forest at 99.11%. To address class imbalance, SMOTE was applied, significantly improving the recall of minority classes. This study demonstrates the potential of machine learning for improving IoT network security by identifying anomalous behaviors in real-world attack scenarios. The results underline the importance of preprocessing, feature selection, and evaluation in achieving high detection accuracy.
APPLICATION OF MACHINE LEARNING METHODS TO ANALYZE MALICIOUS NETWORK TRAFFIC
Published December 2025
0
Abstract
Language
English
How to Cite
[1]
Aksholak, G. and Magazov, R. 2025. APPLICATION OF MACHINE LEARNING METHODS TO ANALYZE MALICIOUS NETWORK TRAFFIC. Bulletin of Abai KazNPU. Series of Physical and Mathematical sciences. 92, 4 (Dec. 2025). DOI:https://doi.org/10.51889/2959-5894.2025.92.4.013.
https://orcid.org/0000-0001-8292-6939