2022
DOI: 10.21203/rs.3.rs-2357212/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Hybrid PCA-MAO Based LSTM Model for Intrusion Detection in IoT Environments

Abstract: With the rapid advances in Internet of Things (IoT) technologies, the number of smart objects connected to IoT networks is increasing day by day. Parallel to this exponential growth, attacks against IoT networks are also increasing rapidly. Various Intrusion Detection Systems (IDS) have been proposed by researchers to improve accuracy in detecting attacks with different behaviors and reduce intrusion detection time. This work presents a novel IDS based on the combination of the Principal Component Analysis and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 61 publications
0
4
0
Order By: Relevance
“…This dataset stands out with its heterogeneous data sources, addressing a gap found in other datasets [30]. It further enhances its relevance with a vast collection of over 5 million samples, amalgamating both malicious and benign data [31]. 2) Rich Feature Set: A limitation evident in prior datasets is the paucity of features, especially in IoT-based IDS datasets [32].…”
Section: The Significance Of the Ton Iot Datasetmentioning
confidence: 99%
See 1 more Smart Citation
“…This dataset stands out with its heterogeneous data sources, addressing a gap found in other datasets [30]. It further enhances its relevance with a vast collection of over 5 million samples, amalgamating both malicious and benign data [31]. 2) Rich Feature Set: A limitation evident in prior datasets is the paucity of features, especially in IoT-based IDS datasets [32].…”
Section: The Significance Of the Ton Iot Datasetmentioning
confidence: 99%
“…Its data, derived from a testbed architecture, encompasses detailed audit traces from Linux operating systems, including hard disk, memory, and process logs [33]. Such granularity in data strengthens the dataset's utility for appraising intrusion detection mechanisms in IoT settings [31]. In summation, the ToN IoT dataset surpasses its predecessors by addressing their limitations and offering a plethora of data sources, an enriched feature set, unmatched scalability, and genuine real-world representations.…”
Section: The Significance Of the Ton Iot Datasetmentioning
confidence: 99%
“…This dataset stands out with its heterogeneous data sources, addressing a gap found in other datasets [30]. It further enhances its relevance with a vast collection of over 5 million samples, amalgamating both malicious and benign data [31]. 2) Rich Feature Set: A limitation evident in prior datasets is the paucity of features, especially in IoT-based IDS datasets [32].…”
Section: The Significance Of the Ton Iot Datasetmentioning
confidence: 99%
“…Its data, derived from a testbed architecture, encompasses detailed audit traces from Linux operating systems, including hard disk, memory, and process logs [33]. Such granularity in data strengthens the dataset's utility for appraising intrusion detection mechanisms in IoT settings [31]. In summation, the ToN IoT dataset surpasses its predecessors by addressing their limitations and offering a plethora of data sources, an enriched feature set, unmatched scalability, and genuine real-world representations.…”
Section: The Significance Of the Ton Iot Datasetmentioning
confidence: 99%