2016 International Symposium on Networks, Computers and Communications (ISNCC) 2016
DOI: 10.1109/isncc.2016.7746067
|View full text |Cite
|
Sign up to set email alerts
|

Threat analysis of IoT networks using artificial neural network intrusion detection system

Abstract: The Internet of things (IoT) is still in its infancy and has attracted much interest in many industrial sectors including medical fields, logistics tracking, smart cities and automobiles. However as a paradigm, it is susceptible to a range of significant intrusion threats. This paper presents a threat analysis of the IoT and uses an Artificial Neural Network (ANN) to combat these threats. A multi-level perceptron, a type of supervised ANN, is trained using internet packet traces, then is assessed on its abilit… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
174
0
5

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 399 publications
(184 citation statements)
references
References 9 publications
0
174
0
5
Order By: Relevance
“… Artificial Neural Network (ANN) Intrusion Detection System: Here a multi-level perceptron, a type of supervised ANN, is trained using internet packet traces and was assessed on its ability to thwart Distributed Denial of Service (DDoS/DoS) attacks on IoT devices [20].The detection was based on classifying normal and threat patterns. It was able to identify successfully different types of attacks and showed good performances in terms of true and false positive rates.…”
Section: Svelte Ids In Iot [2]mentioning
confidence: 99%
“… Artificial Neural Network (ANN) Intrusion Detection System: Here a multi-level perceptron, a type of supervised ANN, is trained using internet packet traces and was assessed on its ability to thwart Distributed Denial of Service (DDoS/DoS) attacks on IoT devices [20].The detection was based on classifying normal and threat patterns. It was able to identify successfully different types of attacks and showed good performances in terms of true and false positive rates.…”
Section: Svelte Ids In Iot [2]mentioning
confidence: 99%
“…Since then, many ML and DM algorithms were specifically designed for the purpose. DM algorithms examine the valuable information within large volume of data by analytically discovering underlying major trends, patterns, and associations from the data as reported in [10,11]. Therefore, an artificial neural network (ANN) can be used to solve multiclass problems for the IDS using a classic multilayer feed-forward NN trained with a back-propagation algorithm to predict intrusions [12].…”
Section: Related Workmentioning
confidence: 99%
“…The most of the important parameter for the performance evaluation of IDS is detection rate (DR). This parameter measures the number of correctly detected attacks from a total number of attacks as defined in Equation (10). Then, the false alarm rate (FAR) measures the ratio between the numbers of normal connections that are incorrectly misclassified as attacks and a total number of normal connections defined in Equation (11).…”
Section: Kdd Cup 1999 Datasetmentioning
confidence: 99%
“…In the formula: X represents the data packet quantization parameter; B is the value coefficient of the packet attribute; M1 and Sd are the average coefficients and the average error coefficient corresponding to B [7][8] .…”
Section: The Technical Advantages Of the New Detection Systemmentioning
confidence: 99%