2022
DOI: 10.3390/s22103607
|View full text |Cite
|
Sign up to set email alerts
|

A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering

Abstract: The Internet of Things (IoT) is a widely used technology in automated network systems across the world. The impact of the IoT on different industries has occurred in recent years. Many IoT nodes collect, store, and process personal data, which is an ideal target for attackers. Several researchers have worked on this problem and have presented many intrusion detection systems (IDSs). The existing system has difficulties in improving performance and identifying subcategories of cyberattacks. This paper proposes … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(18 citation statements)
references
References 32 publications
0
18
0
Order By: Relevance
“…In this method, multiple traditional classifiers are combined as basic learners, and the prediction of traditional classifiers is voted to obtain the final prediction. Ullah et al [24] proposed an intrusion detection system based on deep convolution neural network. The model consists of two convolutional layers and three fully connected dense layers, which can improve performance and reduce computing power.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In this method, multiple traditional classifiers are combined as basic learners, and the prediction of traditional classifiers is voted to obtain the final prediction. Ullah et al [24] proposed an intrusion detection system based on deep convolution neural network. The model consists of two convolutional layers and three fully connected dense layers, which can improve performance and reduce computing power.…”
Section: Related Workmentioning
confidence: 99%
“…LSTM and RNN models are mainly used to solve the problem of gradient disappearance in the process of back propagation. They are good at short-term memory, but poor in long-term memory and in the face of apt attacks and bot attacks [24], so it is difficult to train efficient IOT attack prevention models. As shown in Fig.…”
Section: Cloud-based Loss Function Computational Designmentioning
confidence: 99%
“…A deep neural network (DNN) feature extractor that collects beneficial properties from a dynamic distributed system, a kmeans clustering that groups the collected information, and a PPO operator that automate the IDS via retraining and command ID-HyConSys' intrusion detection module. A deep-convolutional neural network (DCNN)-based IDS is suggested in [11]. Three completely associated dense tiers and two pooling layers make up such model.…”
Section: Related Workmentioning
confidence: 99%
“…is the existing answer for the iterations, and is the -th searching solutions. In order to balance the search strategy, a quality function known as QF is determined using Equation (11). (11) The variables and depict the motions of the Aquila's prey, with 's value dropping 2 to 0.…”
Section: Feature Selection Using Aquila Optimizer Algorithmmentioning
confidence: 99%
“…As a result of the classification, an accuracy rate of 87.6% was obtained. In the Deep Convolutional Neural Network (DCNN) based IDS proposed by Ullah et al [20], 62 features with an Information Gain (IG) value greater than 0.001 were selected by IG method among 83 features in the IoTID20 dataset. In the intrusion detection method conducted with DCNN, 99.84% accuracy was obtained for binary classification and 98.12% accuracy was achieved for multi-class classification.…”
Section: Literature Reviewmentioning
confidence: 99%