2023
DOI: 10.32604/iasc.2023.026799
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Deep Learning Based Attack Detection for Imbalanced Data Classification

Abstract: Internet of Things (IoT) is the most widespread and fastest growing technology today. Due to the increasing of IoT devices connected to the Internet, the IoT is the most technology under security attacks. The IoT devices are not designed with security because they are resource constrained devices. Therefore, having an accurate IoT security system to detect security attacks is challenging. Intrusion Detection Systems (IDSs) using machine learning and deep learning techniques can detect security attacks accurat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 33 publications
0
4
0
Order By: Relevance
“…They used SMOTE to enhance model performance on the UNSW-NB15, KDD99, and NSL-KDD datasets, achieving accuracy scores of 91.2%, 95.2%, and 82.6%, respectively. e) Almarshdi et al [29] developed a hybrid deep learning IDS using convolution neural network (CNN) and long short-term memory (LSTM) algorithms, combined with the SMOTE technique. This model achieved 92.10% accuracy on the UNSW-NB15 dataset compared to 89.90% for the basic CNN model.…”
Section: Common Strategies For Addressing Imbalanced Datamentioning
confidence: 99%
“…They used SMOTE to enhance model performance on the UNSW-NB15, KDD99, and NSL-KDD datasets, achieving accuracy scores of 91.2%, 95.2%, and 82.6%, respectively. e) Almarshdi et al [29] developed a hybrid deep learning IDS using convolution neural network (CNN) and long short-term memory (LSTM) algorithms, combined with the SMOTE technique. This model achieved 92.10% accuracy on the UNSW-NB15 dataset compared to 89.90% for the basic CNN model.…”
Section: Common Strategies For Addressing Imbalanced Datamentioning
confidence: 99%
“…Each convolutional layer is followed by a pooling layer with a pooling size of 2 and Max-pooling methods. The formula of the max-pooling layer is calculated as [41]:…”
Section: Endmentioning
confidence: 99%
“…Since then, the LSTM has grown to be one of the most widely used models in the artificial intelligence field and has been used in many other applications, including sentiment analysis, machine translation, and handwriting recognition. Several previous studies have disclosed LSTM's superior ability to predict related data with temporal properties, such as time series data and text [3], [4].…”
Section: Introductionmentioning
confidence: 99%