{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T14:01:23Z","timestamp":1760623283908,"version":"build-2065373602"},"reference-count":42,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2022,10,12]],"date-time":"2022-10-12T00:00:00Z","timestamp":1665532800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100009105","name":"Ministry of Internal Affairs and Communications","doi-asserted-by":"publisher","award":["JPJ000254"],"award-info":[{"award-number":["JPJ000254"]}],"id":[{"id":"10.13039\/501100009105","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Network"],"abstract":"<jats:p>The rapid growth in the IoT network comes with a huge security threat. Network scanning is considered necessary to identify vulnerable IoT devices connected to IP networks. However, most existing network scanning tools or system do not consider the burden of scan packet traffic on the network, especially in the IoT network where resources are limited. It is necessary to know the status of the communication environment and the reason why network scanning failed. Therefore, this paper proposes a multimodel-based approach which can be utilized to estimate the cause of failure\/delay of network scanning over wireless networks where a scan packet or its response may sometimes be dropped or delayed. Specifically, the factors that cause network scanning failure\/delay were identified and categorized. Then, using a machine learning algorithm, we introduced a multimodel linear discriminant analysis (MM-LDA) to estimate the cause of scan failure\/delay based on the results of network scanning. In addition, a one-to-many model and a training data filtering technique were adopted to ensure that the estimation error was drastically reduced. The goal of our proposed method was to correctly estimate the causes of scan failure\/delay in IP-connected devices. The performance of the proposed method was evaluated using computer simulation assuming a cellular (LTE) network as the targeted IoT wireless network and using LTE-connected devices as the targeted IoT devices. The proposed MM-LDA correctly estimates the cause of failure\/delay of the network scan at an average probability of 98% in various scenarios. In comparison to other conventional machine learning classifiers, the proposed MM-LDA outperforms various classification methods in the estimation of the cause of scan failure\/delay.<\/jats:p>","DOI":"10.3390\/network2040031","type":"journal-article","created":{"date-parts":[[2022,10,12]],"date-time":"2022-10-12T05:31:18Z","timestamp":1665552678000},"page":"519-544","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Multimodel-Based Approach for Estimating Cause of Scanning Failure and Delay in IoT Wireless Network"],"prefix":"10.3390","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9897-0774","authenticated-orcid":false,"given":"Babatunde","family":"Ojetunde","sequence":"first","affiliation":[{"name":"Wave Engineering Laboratories, Advanced Telecommunications Research Institute International, 2-2-2 Hikaridai, Seika, Soraku, Kyoto 619-0228, Japan"}]},{"given":"Naoto","family":"Egashira","sequence":"additional","affiliation":[{"name":"Wave Engineering Laboratories, Advanced Telecommunications Research Institute International, 2-2-2 Hikaridai, Seika, Soraku, Kyoto 619-0228, Japan"}]},{"given":"Kenta","family":"Suzuki","sequence":"additional","affiliation":[{"name":"Wave Engineering Laboratories, Advanced Telecommunications Research Institute International, 2-2-2 Hikaridai, Seika, Soraku, Kyoto 619-0228, Japan"}]},{"given":"Takuya","family":"Kurihara","sequence":"additional","affiliation":[{"name":"Wave Engineering Laboratories, Advanced Telecommunications Research Institute International, 2-2-2 Hikaridai, Seika, Soraku, Kyoto 619-0228, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2752-7534","authenticated-orcid":false,"given":"Kazuto","family":"Yano","sequence":"additional","affiliation":[{"name":"Wave Engineering Laboratories, Advanced Telecommunications Research Institute International, 2-2-2 Hikaridai, Seika, Soraku, Kyoto 619-0228, Japan"}]},{"given":"Yoshinori","family":"Suzuki","sequence":"additional","affiliation":[{"name":"Wave Engineering Laboratories, Advanced Telecommunications Research Institute International, 2-2-2 Hikaridai, Seika, Soraku, Kyoto 619-0228, Japan"}]}],"member":"1968","published-online":{"date-parts":[[2022,10,12]]},"reference":[{"key":"ref_1","unstructured":"Evans, D. (2022, August 24). The Internet of Things: How the Next Evolution of the Internet Is Changing Everything. Available online: http:\/\/www.cisco.com\/web\/about\/ac79\/docs\/innov\/IoT_IBSG_0411FINAL.pdf."},{"key":"ref_2","unstructured":"Ministry of Internal Affairs and Communications (2022, August 24). Information and Communication in Japan. Available online: http:\/\/www.soumu.go.jp\/johotsusintokei\/whitepaper\/eng\/WP2018\/chapter-1.pdf."},{"key":"ref_3","unstructured":"Trend Macro (2022, August 24). Persirai: New IoT Botnet Targets IP Cameras, Cyber Threats. Available online: https:\/\/www.trendmicro.com\/en_us\/research\/17\/e\/persirai-new-internet-things-iot-botnet-targets-ip-cameras.html."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Ojetunde, B., Egashira, N., Kurihara, T., Yano, K., and Suzuki, Y. (2020, January 10\u201313). Factor Discrimination of Scanning Failure and Delay for Efficient Network Scanning of IoT Wireless Equipment. Proceedings of the 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC46108.2020.9045710"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1565","DOI":"10.1093\/comjnl\/bxr035","article-title":"Surveying Port Scans and Their Detection Methodologies","volume":"54","author":"Bhuyan","year":"2011","journal-title":"Comput. J."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/505733.505737","article-title":"A review of port scanning techniques","volume":"29","author":"Carrasco","year":"1999","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Shahid, J., Hameed, M.K., Javed, I.T., Qureshi, K.N., Ali, M., and Crespi, N. (2022). A Comparative Study of Web Application Security Parameters: Current Trends and Future Directions. Appl. Sci., 12.","DOI":"10.3390\/app12084077"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Al-Alami, H., Hadi, A., and Al-Bahadili, H. (2017, January 6\u20138). Vulnerability Scanning of IoT Devices in Jordan using Shodan. Proceedings of the 2017 2nd International Conference on the Applications of Information Technology in Developing Renewable Energy Processes & Systems (IT-DREPS), Amman, Jordan.","DOI":"10.1109\/IT-DREPS.2017.8277814"},{"key":"ref_9","unstructured":"Gvozdenovic, S., Becker, J.K., Mikulskis, J., and Starobinski, D.D. (2022). IoT-Scan: Network Reconnaissance for the Internet of Things. arXiv."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1007\/978-3-642-15512-3_8","article-title":"CANVuS: Context-Aware Network Vulnerability Scanning","volume":"Volume 6307","author":"Jha","year":"2010","journal-title":"Recent Advances in Intrusion Detection"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"012036","DOI":"10.1088\/1742-6596\/2290\/1\/012036","article-title":"Research on automatic scanning method of network vulnerabilities in power system","volume":"2290","author":"Sun","year":"2022","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_12","unstructured":"Luo, D., Ding, C., and Huang, H. (2011, January 7\u201311). Linear Discriminant Analysis: New Formulation and Overfit Analysis. Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence, San Francisco, CA, USA."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Kong, D., and Ding, C. (2014, January 27\u201331). Pairwise-Covariance Linear Discriminant Analysis. Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, Qu\u00e9bec City, QC, Canada.","DOI":"10.1609\/aaai.v28i1.9008"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/s13042-013-0226-9","article-title":"Linear Discriminant Analysis for the Small Sample Size Problem: An Overview","volume":"6","author":"Sharma","year":"2015","journal-title":"Int. J. Mach. Learn. Cyber."},{"key":"ref_15","unstructured":"Hsu, C.-W., Chang, C.-C., and Lin, C.-J. (2003). A Practical Guide to Support Vector Classification, Department of Computer Science, National Taiwan University. Available online: https:\/\/www.csie.ntu.edu.tw\/~cjlin\/papers\/guide\/guide.pdf."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Navada, A., Ansari, A.N., Patil, S., and Sonkamble, B.A. (2011, January 27\u201328). Overview of use of Decision Tree Algorithms in Machine Learning. Proceedings of the 2011 IEEE Control and System Graduate Research Colloquium, Shah Alam, Malaysia.","DOI":"10.1109\/ICSGRC.2011.5991826"},{"key":"ref_17","first-page":"11","article-title":"Comparing the Performance of Naive Bayes and Decision Tree Classification Using R","volume":"11","author":"Yadav","year":"2019","journal-title":"Int. J. Intell. Syst. Appl."},{"key":"ref_18","unstructured":"Zhang, H., and Li, D. (2007, January 2\u20134). Na\u00efve Bayes Text Classifier. Proceedings of the 2007 IEEE International Conference on Granular Computing (GRC 2007), Fremont, CA, USA."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Wang, H., and Hao, F. (2012, January 15\u201317). An Efficient Linear Regression Classifier. Proceedings of the 2012 IEEE International Conference on Signal Processing, Computing and Control, Solan, India.","DOI":"10.1109\/ISPCC.2012.6224355"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Shakhnarovich, G., Darrell, T., and Indyk, P. (2005). Nearest Neighbor Methods in Learning and Vision: Theory and Practice, The MIT Press.","DOI":"10.7551\/mitpress\/4908.001.0001"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Kim, H., Kim, T., and Jang, D. (2018). An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices. Symmetry, 10.","DOI":"10.3390\/sym10050151"},{"key":"ref_22","unstructured":"Lam, J., and Abbas, R. (2020). Machine Learning based Anomaly Detection for 5G Networks. arXiv."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"7700","DOI":"10.1109\/ACCESS.2018.2803446","article-title":"A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks","volume":"6","author":"Clemente","year":"2018","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Silhavy, R. (2019). DDoS Reflection Attack Based on IoT: A Case Study. Cybernetics and Algorithms in Intelligent Systems, Springer. Advances in Intelligent Systems and Computing.","DOI":"10.1007\/978-3-319-91192-2"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Horak, T., Strelec, P., Huraj, L., Tanuska, P., Vaclavova, A., and Kebisek, M. (2021). The Vulnerability of the Production Line Using Industrial IoT Systems under DDoS Attack. Electronics, 10.","DOI":"10.3390\/electronics10040381"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"11237","DOI":"10.1016\/j.ifacol.2020.12.354","article-title":"The vulnerability of securing IoT production lines and their network components in the Industry 4.0 concept","volume":"53","author":"Horak","year":"2020","journal-title":"IFAC-PapersOnLine"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Huraj, L., Horak, T., Strelec, P., and Tanuska, P. (2021). Mitigation against DDoS Attacks on an IoT-Based Production Line Using Machine Learning. Appl. Sci., 11.","DOI":"10.3390\/app11041847"},{"key":"ref_28","unstructured":"Alkasassbeh, M., and Almseidin, M. (2018, January 10\u201312). Machine Learning Methods for Network Intrusion Detection. Proceedings of the ICCCNT 2018\u2014The 20th International Conference on Computing, Communication and Networking Technologies, Bengaluru, India."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Ring, M., Landes, D., and Hotho, A. (2018). Detection of Slow Port Scans in Flow-based Network Traffic. PLoS ONE, 13.","DOI":"10.1371\/journal.pone.0204507"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Alsaleh, M., and van Oorschot, P.C. (2011, January 22\u201324). Network Scan Detection with LQS: A Lightweight, Quick and Stateful Algorithm. Proceedings of the 6th ACM Symposium on Information, Comp. and Communications Security (ASIACCS \u201911), Hong Kong, China.","DOI":"10.1145\/1966913.1966928"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Mehdi, S.A., Khalid, J., and Khayam, S.A. (2011, January 20\u201321). Revisiting Traffic Anomaly Detection using Software Defined Networking. Proceedings of the International Workshop Recent Advances Intrusion Detection, Menlo Park, CA, USA.","DOI":"10.1007\/978-3-642-23644-0_9"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Schechter, S.E., Jung, J., and Berger, A.W. (2004, January 15\u201317). Fast Detection of Scanning Worm Infections. Proceedings of the Workshop Recent Advances in Intrusion Detection, Sophia Antipolis, France.","DOI":"10.1007\/978-3-540-30143-1_4"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Gu, Y., McCallum, A., and Towsley, D. (2005, January 19\u201321). Detecting Anomalies in Network Traffic using Maximum Entropy Estimation. Proceedings of the 5th ACM SIGCOMM Conference Internet Measurement, Berkeley, CA, USA.","DOI":"10.1145\/1330107.1330148"},{"key":"ref_34","unstructured":"Viet, H.N., Van, Q.N., Trang, L.L.T., and Nathan, S. (June, January 25). Using Deep Learning Model for Network Scanning Detection. Proceedings of the ICFET \u201918: The 4th International Conference on Frontiers of Educational Technologies, New York, NY, USA."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Shandilya, S.K., Wagner, N., Gupta, V., and Nagar, A.K. (2022). Detection of Reconnaissance Attacks on IoT Devices Using Deep Neural Networks. Advances in Nature-Inspired Cyber Security and Resilience, Springer. EAI\/Springer Innovations in Communication and Computing.","DOI":"10.1007\/978-3-030-90708-2"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Richter, P., and Berger, A. (2019, January 21\u201323). Scanning the Scanners: Sensing the Internet from a Massively Distributed Network Telescope. Proceedings of the IMC \u201919: Internet Measurement Conference, Amsterdam, The Netherlands.","DOI":"10.1145\/3355369.3355595"},{"key":"ref_37","unstructured":"Kol, M., and Oberman, S. (2022, August 24). Ripple20, Available online: https:\/\/www.jsof-tech.com\/wp-content\/uploads\/2020\/06\/JSOF_Ripple20_Technical_Whitepaper_June20.pdf."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Chen, X., and Jeong, J.C. (2007, January 13\u201315). Enhanced Recursive Feature Elimination. Proceedings of the Sixth International Conference on Machine Learning and Applications (ICMLA 2007), Cincinnati, OH, USA.","DOI":"10.1109\/ICMLA.2007.35"},{"key":"ref_39","unstructured":"Hastie, T., Tibshirani, R., and Friedman, J.H. (2009). The Elements of Statistical Learning: Data Mining, Inference, and Prediction, Springer. [2nd ed.]. Chapter 4."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Wehrle, K., G\u00fcne\u015f, M., and Gross, J. (2010). The NS-3 Network Simulator. Modeling and Tools for Network Simulation, Springer.","DOI":"10.1007\/978-3-642-12331-3"},{"key":"ref_41","unstructured":"3rd Generation Partnership Project (3GPP) (2022, August 24). Evolved Universal Terrestrial Radio Access (E-UTRA); Further Advancements for E-UTRA Physical Layer Aspects. Available online: https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=2493."},{"key":"ref_42","unstructured":"Brownlee, J. (2022, August 24). Impact of Dataset Size on Deep Learning Model Skill and Performance Estimates. Available online: https:\/\/machinelearningmastery.com\/impact-of-dataset-size-on-deep-learning-model-skill-and-performance-estimates."}],"container-title":["Network"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2673-8732\/2\/4\/31\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:50:25Z","timestamp":1760143825000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2673-8732\/2\/4\/31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,12]]},"references-count":42,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["network2040031"],"URL":"https:\/\/doi.org\/10.3390\/network2040031","relation":{},"ISSN":["2673-8732"],"issn-type":[{"type":"electronic","value":"2673-8732"}],"subject":[],"published":{"date-parts":[[2022,10,12]]}}}