Intrusion Detection for IoT Network Security with Deep learning

Publish Year: 1403
نوع سند: مقاله ژورنالی
زبان: English
View: 53

This Paper With 20 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_JADM-12-1_004

تاریخ نمایه سازی: 10 خرداد 1403

Abstract:

IoT devices has witnessed a substantial increase due to the growing demand for smart devices. Intrusion Detection Systems (IDS) are critical components for safeguarding IoT networks against cyber threats. This study presents an advanced approach to IoT network intrusion detection, leveraging deep learning techniques and pristine data. We utilize the publicly available CICIDS۲۰۱۷ dataset, which enables comprehensive training and testing of intrusion detection models across various attack scenarios, such as Distributed Denial of Service (DDoS) attacks, port scans, botnet activity, and more. Our goal is to provide a more effective method than the previous methods. Our proposed deep learning model incorporates dense transition layers and LSTM architecture, designed to capture both spatial and temporal dependencies within the data. We employed rigorous evaluation metrics, including sparse categorical cross-entropy loss and accuracy, to assess model performance. The results of our approach show outstanding accuracy, reaching a peak of ۰.۹۹۷ on the test data. Our model demonstrates stability in loss and accuracy metrics, ensuring reliable intrusion detection capabilities. Comparative analysis with other machine learning models confirms the effectiveness of our approach. Moreover, our study assesses the model's resilience to Gaussian noise, revealing its capacity to maintain accuracy in challenging conditions. We provide detailed performance metrics for various attack types, offering insights into the model's effectiveness across diverse threat scenarios.

Authors

Roya Morshedi

Department of Computer Engineering, Yazd University, Yazd, Iran.

S. Mojtaba Matinkhah

Department of Electrical Engineering, Yazd University, Yazd, Iran.

Mohammad Taghi Sadeghi

Department of Electrical Engineering, Yazd University, Yazd, Iran.

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • E. Gyamfi and A. D. Jurcut, “Novel online network intrusion ...
  • X. Deng, J. Zhu, X. Pei, L. Zhang, Z. Ling, ...
  • Y. Wu, L. Nie, S. Wang, Z. Ning, and S. ...
  • J. Wu et al., “Joint semantic transfer network for IoT ...
  • P. Ruzafa-Alcázar et al., “Intrusion detection based on privacy-preserving federated ...
  • J. Long, W. Liang, K.-C. Li, Y. Wei, and M. ...
  • A. Oseni et al., “An explainable deep learning framework for ...
  • Sk. T. Mehedi, A. Anwar, Z. Rahman, K. Ahmed, and ...
  • S. Bebortta, S. K. Das, and S. Chakravarty, “Fog-enabled intelligent ...
  • M. M. Alani and A. I. Awad, “An intelligent two-layer ...
  • J. Wu, H. Dai, Y. Wang, K. Ye, and C. ...
  • A. Thakkar and R. Lohiya, “Attack classification of imbalanced intrusion ...
  • A. A. M. Sharadqh, H. Hatamleh, A. M. A. Alnaser, ...
  • Z. Ma, L. Liu, W. Meng, X. Luo, L. Wang, ...
  • I. A. Kandhro et al., “Detection of real-time malicious intrusions ...
  • A. Telikani, J. Shen, J. Yang, and P. Wang, “Industrial ...
  • O. Abdel Wahab, “Intrusion detection in the IoT under data ...
  • W. Liang, Y. Hu, X. Zhou, Y. Pan, and K. ...
  • X. Zhou, W. Liang, W. Li, K. Yan, S. Shimizu, ...
  • T. M. Booij, I. Chiscop, E. Meeuwissen, N. Moustafa, and ...
  • M. Zeeshan et al., “Protocol-based deep intrusion detection for DoS ...
  • H. Siddharthan, T. Deepa, and P. Chandhar, “SENMQTT-SET: An intelligent ...
  • M. S. A. Muthanna, R. Alkanhel, A. Muthanna, A. Rafiq, ...
  • C. Miranda, G. Kaddoum, A. Boukhtouta, T. Madi, and H. ...
  • P. L. S. Jayalaxmi, R. Saha, G. Kumar, M. Conti, ...
  • Y. Yang, K. Zheng, C. Wu, and Y. Yang, Improving ...
  • M. Yadollahzadeh Tabari; Z. Mataji, Detecting Sinkhole Attack in RPL-based ...
  • L. khalvati; M. Keshtgary; N. Rikhtegar, Intrusion Detection based on ...
  • M. Rahimi, A. A. Taheri, and H. Mashayekhi, "Learning a ...
  • M. Ahsan, N. Rifat, M. Chowdhury, and R. Gomes, "Intrusion ...
  • S. Raza, L. Wallgren, and T. Voigt, "SVELTE: Real-time Intrusion ...
  • C. Ioannou, V. Vassiliou, and C. Sergiou, "An Intrusion Detection ...
  • C. Cervantes, D. Poplade, M. Nogueira, and A. Santos, "Detection ...
  • E. Kabir, J. Hu, H. Wang, and G. Zhou, "A ...
  • نمایش کامل مراجع