2022
DOI: 10.1002/cpe.6918
|View full text |Cite
|
Sign up to set email alerts
|

Effective intrusion detection system for IoT using optimized capsule auto encoder model

Abstract: Intrusion Detection Systems (IDS) play a major part in protecting security threats and networks from attacks. Due to the rapid development of the internet of things (IoT), more cyber‐attacks are attacking these devices. Various security challenges still occur on IoT devices since most of them have limited security mechanisms. Hence, this paper introduces a combination of linear and non‐linear space transformation models for IDS. Independent component analysis (ICA) is employed for linear transformation to obta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 37 publications
(59 reference statements)
0
1
0
Order By: Relevance
“…A distributed cloud storage approach using an encryption technique to prevent the data mining attacks launched on a single cloud storage system was proposed in [ 4 ], which increased the workload of an attacker, thereby increasing privacy and ensuring reliability. A spike in IoT botnet flash attacks on social networking sites and IT industries were observed, which were addressed with the use of machine and deep learning techniques ([ 5 , 6 , 7 , 8 ]). Even though IoT paved our way in development, it also opened up an opportunity for attackers to use botnets from remote locations to invade our privacy and snatch our data.…”
Section: Introductionmentioning
confidence: 99%
“…A distributed cloud storage approach using an encryption technique to prevent the data mining attacks launched on a single cloud storage system was proposed in [ 4 ], which increased the workload of an attacker, thereby increasing privacy and ensuring reliability. A spike in IoT botnet flash attacks on social networking sites and IT industries were observed, which were addressed with the use of machine and deep learning techniques ([ 5 , 6 , 7 , 8 ]). Even though IoT paved our way in development, it also opened up an opportunity for attackers to use botnets from remote locations to invade our privacy and snatch our data.…”
Section: Introductionmentioning
confidence: 99%