2023
DOI: 10.32604/csse.2023.036352
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Deep Learning Based Intruder Identification in Industrial Internet of Things Environment

Abstract: With the increased advancements of smart industries, cybersecurity has become a vital growth factor in the success of industrial transformation. The Industrial Internet of Things (IIoT) or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether. In industry 4.0, powerful Intrusion Detection Systems (IDS) play a significant role in ensuring network security. Though various intrusion detection techniques have been developed so far, it is challenging to protect the intricate data o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…ML can enable the experiential learning and decision-making method of the different systems by enhancing the expertise and capability without the use of open programming [13]. In IDSs that are made via employing DL approaches, recent and updated databases are selected to execute widespread intrusion detection [14]. DL-based IDSs are generally trained by employing state-of-the-art databases that have been produced for intrusion detection [15].…”
Section: Introductionmentioning
confidence: 99%
“…ML can enable the experiential learning and decision-making method of the different systems by enhancing the expertise and capability without the use of open programming [13]. In IDSs that are made via employing DL approaches, recent and updated databases are selected to execute widespread intrusion detection [14]. DL-based IDSs are generally trained by employing state-of-the-art databases that have been produced for intrusion detection [15].…”
Section: Introductionmentioning
confidence: 99%
“…With an increase in the number of network attacks, the quantity of data accessible on networks increases; thus, rapid and highly effective methods are required in order to identify the attacks. Without a doubt, a huge number of approaches to enhancing network security exist [10]. Privacy and security are significant IoT challenges to focus on and investigate further.…”
Section: Introductionmentioning
confidence: 99%