2023
DOI: 10.1016/j.jpdc.2022.12.009
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(5 citation statements)
references
References 59 publications
0
1
0
Order By: Relevance
“…During comparison experiments, we compare the proposed MSCBL-ADN model with RF 18 , SVM 19 and KNN 20 shallow classifiers on testing set. We also compare it with CNN-based models (CNN-BMECapSA-RF 25 , LRDADF 27 ), LSTM-based models (VLSTM 30 ), and CNN-LSTM-based models (AsyncFL-bLAM 16 , NIDS-CNN-LSTM 33 ) during training and testing phase.…”
Section: Performance Comparison Experimentsmentioning
confidence: 99%
See 2 more Smart Citations
“…During comparison experiments, we compare the proposed MSCBL-ADN model with RF 18 , SVM 19 and KNN 20 shallow classifiers on testing set. We also compare it with CNN-based models (CNN-BMECapSA-RF 25 , LRDADF 27 ), LSTM-based models (VLSTM 30 ), and CNN-LSTM-based models (AsyncFL-bLAM 16 , NIDS-CNN-LSTM 33 ) during training and testing phase.…”
Section: Performance Comparison Experimentsmentioning
confidence: 99%
“…10, it displays the validation accuracy and training loss of multi-class scenario during 100 epochs. We can obviously see that the loss curve of CNN-based CNN-BMECapSA-RF 25 As known, we merge the hulk and benign samples as normal sub-flows. As a result, VLSTM 30 model spends lots of epochs to learn time relationship repressions.…”
Section: Performance Comparison Experimentsmentioning
confidence: 99%
See 1 more Smart Citation
“…Asgharzadeh et al [20] presented an IoT Feature Extraction Convolutional Neural Network (IoTFECNN) with hybrid layers to extract both low-level and high-level characteristics and identify IoT anomalies from TON-IoT and NSL-KDD datasets. For effective feature selection, the Binary Multi-objective Enhanced Capuchin Search Algorithm (BME-CapSA) was developed.…”
Section: Related Workmentioning
confidence: 99%
“…Researchers have explored various solutions, including conventional cryptography tools, shallow machine learning (ML) algorithms, and deep learning (DL) algorithms, to address the challenges posed by attacks on IoT networks. Among these solutions, convolutional neural networks (CNNs) [ 8 ] have emerged as a promising approach to detecting IoT-based attacks. However, further research is needed to investigate the applicability of CNNs in selecting significant features that aid in detecting attacks on IoT networks.…”
Section: Introductionmentioning
confidence: 99%