Research Square (Research Square),
Journal Year:
2024,
Volume and Issue:
unknown
Published: March 19, 2024
Abstract
The
Software-defined
Networking
(SDN)
system
plays
a
crucial
role
in
efficiently
overseeing
the
Internet
network
by
segregating
control
and
data
planes.
In
SDN,
controller
manages
determines
policy
sending
setting
SDN
switches.
Despite
significant
advantages,
has
security
challenges.
DDoS
attacks
are
main
challenge
networks.
primarily
target
to
disrupt
performance.
Intrusion
detection
systems
networks
need
confidential
methods
for
message
exchange
coordination
of
controllers
so
that
they
can
blacklist
attacking
addresses
with
each
other.
this
manuscript,
we
introduce
an
approach
utilizing
1D
CNN
LSTM
detecting
network,
incorporating
information
hidden
images.
first
stage,
game
theory
deep
learning
based
on
GAN
used
increase
attack
accuracy
balance
set.
second
uses
extract
primary
features,
Siberian
tiger
optimization
(STO)
algorithm
is
applied
enhance
efficiency
network.
third
step,
STO
selects
optimal
features.
Finally,
classifies
traffic
receiving
selected
use
image
encryption
privacy
exchanging
sharing
blacklists.
tests
performed
Python
datasets
UNSW-NB15,
CIC-IDS2017,
NSL-KDD
99.49%,
99.86%,
99.91%.
proposed
method
GAN-CL-STO
demonstrates
higher
compared
CNN-LSTM,
HODNN+CRF,
CNN,
PSO-1D
CNN+BiLSTM
methods.
suggested
identifying
more
accurate
than
WOA,
HHO,
COA
feature
selection
Applied Sciences,
Journal Year:
2024,
Volume and Issue:
14(18), P. 8505 - 8505
Published: Sept. 20, 2024
The
Internet
of
Things
(IoT),
introduced
by
Kevin
Ashton
in
the
late
1990s,
has
transformed
technology
usage
globally,
enhancing
efficiency
and
convenience
but
also
posing
significant
security
challenges.
With
proliferation
IoT
devices
expected
to
exceed
29
billion
2030,
securing
these
is
crucial.
This
study
proposes
an
optimized
1D
convolutional
neural
network
(1D
CNN)
model
for
effectively
classifying
data.
architecture
includes
input,
convolutional,
self-attention,
output
layers,
utilizing
GELU
activation,
dropout,
normalization
techniques
improve
performance
prevent
overfitting.
was
evaluated
using
CIC
2023,
CIC-MalMem-2022,
CIC-IDS2017
datasets,
achieving
impressive
results:
98.36%
accuracy,
100%
precision,
99.96%
recall,
99.95%
F1-score
2023;
99.90%
99.98%
99.97%
CIC-MalMem-2022;
99.99%
CIC-IDS2017.
These
outcomes
demonstrate
model’s
effectiveness
detecting
various
IoT-related
attacks
malware.
highlights
potential
deep-learning
enhance
security,
with
developed
showing
high
low
computational
overhead,
making
it
suitable
real-time
applications
resource-constrained
devices.
Future
research
should
aim
at
testing
on
larger
datasets
incorporating
adaptive
learning
capabilities
further
its
robustness.
significantly
contributes
providing
advanced
insights
into
deploying
models,
encouraging
exploration
this
dynamic
field.
International Journal of Communication Systems,
Journal Year:
2025,
Volume and Issue:
38(5)
Published: Feb. 20, 2025
ABSTRACT
With
the
rapid
growth
of
Internet
Things
(IoT),
securing
interconnected
devices
is
becoming
increasingly
critical.
This
paper
introduces
LightShield
intrusion
detection
system
(IDS)
to
enhance
in
IoT
environments
using
high‐performance
computing.
features
preprocessing
data,
ReliefF
algorithm
for
feature
selection,
and
a
novel
model
based
on
LightGBM
,
gradient
boosting
framework.
The
leverages
GPU
acceleration
faster
validation,
enabling
real‐time
monitoring.
By
adapting
characteristics,
provides
flexible,
scalable
defense
against
evolving
cyber
threats.
Results
show
its
potential
improve
security
ecosystems,
offering
valuable
insights
into
anomaly‐based
future
secure
networks.
binary
classification
displayed
exceptional
precision
with
99.82
%
accuracy
detecting
attacks,
multiclass
achieved
commendable
97.25
classifying
distinct
attack
types.
Mathematics,
Journal Year:
2025,
Volume and Issue:
13(5), P. 712 - 712
Published: Feb. 22, 2025
Electric
vehicle
(EV)
charging
systems
are
now
integral
to
smart
grids,
increasing
the
need
for
robust
and
scalable
cyberattack
detection.
This
study
presents
an
online
intrusion
detection
system
that
leverages
Adaptive
Random
Forest
classifier
with
Windowing
drift
identify
real-time
evolving
threats
in
EV
infrastructures.
The
is
evaluated
using
real-world
network
traffic
from
CICEVSE2024
dataset,
ensuring
practical
applicability.
For
binary
detection,
model
achieves
0.9913
accuracy,
0.9999
precision,
0.9914
recall,
F1-score
of
0.9956,
demonstrating
highly
accurate
threat
It
effectively
manages
concept
drift,
maintaining
average
accuracy
0.99
during
events.
In
multiclass
attains
0.9840
0.9831
event
0.96.
computationally
efficient,
processing
each
instance
just
0.0037
s,
making
it
well-suited
deployment.
These
results
confirm
machine
learning
methods
can
secure
source
code
publicly
available
on
GitHub,
reproducibility
fostering
further
research.
provides
a
efficient
cybersecurity
solution
protecting
networks
threats.
ETRI Journal,
Journal Year:
2025,
Volume and Issue:
unknown
Published: March 17, 2025
Abstract
In
recent
decades,
the
rapid
growth
of
Internet
Things
(IoT)
has
highlighted
several
network
security
problems.
this
study,
an
efficient
intrusion
detection
(ID)
system
is
implemented
by
using
both
machine
learning
and
data
mining
concepts
for
detecting
patterns.
During
initial
phase,
are
collected
from
NSL‐KDD
University
New
South
Wales‐Network
Based
15
(UNSW‐NB15)
datasets.
The
then
normalized/scaled
employing
a
standard
scaler
technique.
Next,
informative
feature
values
selected
proposed
optimization
algorithm—that
is,
Niche‐Strategy‐based
Gorilla
Troops
Optimization
(NSGTO)
algorithm.
Finally,
these
transferred
to
Long
Short‐Term
Memory
(LSTM)
model
classify
types
attacks
on
comparison
existing
ID
systems,
based
NSGTO‐LSTM
obtains
classification
accuracy
99.98%
99.90%