2022
DOI: 10.3390/sym14102077
|View full text |Cite
|
Sign up to set email alerts
|

Correlation between Deep Neural Network Hidden Layer and Intrusion Detection Performance in IoT Intrusion Detection System

Abstract: As the Internet of Things (IoT) continues to grow, a vast amount of data is generated. The IoT environment is quite sensitive to security challenges because personal information may be leaked or sensor data may be manipulated, which could cause accidents. Because traditional intrusion detection system (IDS) studies are often designed to work well on datasets, it is unknown whether they would work well in a changing network environment. In addition, IDSs for protecting IoT environments have been studied, but th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…An extremely expandable Deep Neural Network (DNN) is projected to IoT networks which is proficient in headstrong recognition of the IoT botnet threats. In [13], an ID hyper-parameter control system (HyConSys) which systematizes the IDS employing Proximal Policy Optimization (PPO) is projected. ID-HyConSys consists of a DNN features separator that separates effective features.…”
Section: Related Workmentioning
confidence: 99%
“…An extremely expandable Deep Neural Network (DNN) is projected to IoT networks which is proficient in headstrong recognition of the IoT botnet threats. In [13], an ID hyper-parameter control system (HyConSys) which systematizes the IDS employing Proximal Policy Optimization (PPO) is projected. ID-HyConSys consists of a DNN features separator that separates effective features.…”
Section: Related Workmentioning
confidence: 99%
“…Han [16] developed an effective automated intrusion detection system based on proximal policy optimization (PPO) for protecting the IoT environments against cyber-attackers. At first, the discriminative features were obtained from the acquired database by implementing a deep neural network (DNN), and then the similar extracted features were clustered by using the k-means clustering technique.…”
Section: Related Workmentioning
confidence: 99%
“…Because of the virtualized and dispersed nature International Journal of Intelligent Engineering and Systems, Vol. 16 of cloud settings, it is difficult to create effective IDS. Attacks on systems and applications by cybercriminals lead to system and application failures, which is why cyber-attack protection is so important.…”
Section: Introductionmentioning
confidence: 99%
“…On identifying threats in IoT systems, many research investigations in the area of IoT security were conducted. Unfortunately, the majority of the research on IoT security that has been done so far has not primarily focused on the use of optimization-oriented To address the issue of complexity and effectively defend the IoT environment, [10] offer an intrusion prevention hyperparameter control system (ID-HyConSys) that regulates the IDS utilizing proximity policies optimization (PPO). A deep neural network (DNN) feature extractor that collects beneficial properties from a dynamic distributed system, a kmeans clustering that groups the collected information, and a PPO operator that automate the IDS via retraining and command ID-HyConSys' intrusion detection module.…”
Section: Related Workmentioning
confidence: 99%
“…This performance the Aquila to precisely investigate a given area. Equation (6) in AO simulates this tendency to limit the exploration when the randomly produced value is greater than 0.5 and n ) and a randomly generated value produced by Equation , the behaviour known as "walking and seizing the prey" occurs (10). (10) wherein…”
Section: Feature Selection Using Aquila Optimizer Algorithmmentioning
confidence: 99%