A Comprehensive Review of Intrusion Detection Systems in IoT Landscape DOI
Muhammad Kaleem,

Muhammad Azhar Mushtaq,

Salman Rashid

и другие.

Communications in computer and information science, Год журнала: 2025, Номер unknown, С. 287 - 302

Опубликована: Янв. 1, 2025

Язык: Английский

Anomaly-based intrusion detection system for IoT application DOI Creative Commons
Mansi Bhavsar, Kaushik Roy, John Kelly

и другие.

Discover Internet of Things, Год журнала: 2023, Номер 3(1)

Опубликована: Май 30, 2023

Abstract Internet-of-Things (IoT) connects various physical objects through the Internet and it has a wide application, such as in transportation, military, healthcare, agriculture, many more. Those applications are increasingly popular because they address real-time problems. In contrast, use of transmission communication protocols raised serious security concerns for IoT devices, traditional methods signature rule-based inefficient securing these devices. Hence, identifying network traffic behavior mitigating cyber attacks important to provide guaranteed security. Therefore, we develop an Intrusion Detection System (IDS) based on deep learning model called Pearson-Correlation Coefficient - Convolutional Neural Networks (PCC-CNN) detect anomalies. The PCC-CNN combines features obtained from linear-based extractions followed by Network. It performs binary classification anomaly detection also multiclass types attacks. is evaluated three publicly available datasets: NSL-KDD, CICIDS-2017, IOTID20. We first train test five different (Logistic Regression, Linear Discriminant Analysis, K Nearest Neighbour, Classification Regression Tree,& Support Vector Machine) PCC-based Machine Learning models evaluate performance. achieve best similar accuracy KNN CART 98%, 99%, respectively, datasets. On other hand, promising performance with better 99.89% low misclassification rate 0.001 our proposed model. integrated promising, (or False alarm rate) 0.02, 0.00 Binary Multiclass intrusion classifiers. Finally, compare discuss comparison PCC-ML models. Our Deep (DL)-based IDS outperforms methods.

Язык: Английский

Процитировано

67

Enhancing IoT network security through deep learning-powered Intrusion Detection System DOI Creative Commons

Shahid Allah Bakhsh,

Muhammad Almas Khan, Fawad Ahmed

и другие.

Internet of Things, Год журнала: 2023, Номер 24, С. 100936 - 100936

Опубликована: Сен. 13, 2023

The rapid growth of the Internet Things (IoT) has brought about a global concern for security interconnected devices and networks. This necessitates use efficient Intrusion Detection System (IDS) to mitigate cyber threats. Deep learning (DL) techniques provides promising approach effectively detect irregularities in network traffic, enhancing IoT reducing In this paper, DL-based IDS is proposed using Feed Forward Neural Networks (FFNN), Long Short-Term Memory (LSTM), Random (RandNN) protect networks from cyberattacks. Each DL model its potential benefit as reported paper. For example, FFNN can handle complex traffic patterns, while LSTM good capturing long-term dependencies present traffic. With random connections flexible dynamics, RandNN uses data ability adapt learn data. These algorithms boost cybersecurity by enabling defense mechanisms against challenging threats ensuring sensitive expand. technique exhibits superior performance when compared with current state-of-the-art DL-IDS CIC-IoT22 dataset. An accuracy 99.93 % achieved model, 99.85 96.42 detecting intrusion. Moreover, models have enhance intrusion detection generating swift responses problems

Язык: Английский

Процитировано

67

Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models DOI Creative Commons
Dusmurod Kilichev, Dilmurod Turimov, Wooseong Kim

и другие.

Mathematics, Год журнала: 2024, Номер 12(4), С. 571 - 571

Опубликована: Фев. 14, 2024

In the evolving landscape of Internet Things (IoT) and Industrial IoT (IIoT) security, novel efficient intrusion detection systems (IDSs) are paramount. this article, we present a groundbreaking approach to for IoT-based electric vehicle charging stations (EVCS), integrating robust capabilities convolutional neural network (CNN), long short-term memory (LSTM), gated recurrent unit (GRU) models. The proposed framework leverages comprehensive real-world cybersecurity dataset, specifically tailored IIoT applications, address intricate challenges faced by EVCS. We conducted extensive testing in both binary multiclass scenarios. results remarkable, demonstrating perfect 100% accuracy classification, an impressive 97.44% six-class 96.90% fifteen-class setting new benchmarks field. These achievements underscore efficacy CNN-LSTM-GRU ensemble architecture creating resilient adaptive IDS infrastructures. algorithm, accessible via GitHub, represents significant stride fortifying EVCS against diverse array threats.

Язык: Английский

Процитировано

20

A deep learning-based intrusion detection approach for mobile Ad-hoc network DOI
Rahma Meddeb, Farah Jemili, Bayrem Triki

и другие.

Soft Computing, Год журнала: 2023, Номер 27(14), С. 9425 - 9439

Опубликована: Май 21, 2023

Язык: Английский

Процитировано

23

Explainable AI for Cybersecurity DOI
Siva Raja Sindiramutty, Chong Eng Tan,

Sei Ping Lau

и другие.

Advances in computational intelligence and robotics book series, Год журнала: 2024, Номер unknown, С. 31 - 97

Опубликована: Янв. 18, 2024

In recent years, the utilization of AI in field cybersecurity has become more widespread. Black-box models pose a significant challenge terms interpretability and transparency, which is one major drawbacks AI-based systems. This chapter explores explainable (XAI) techniques as solution to these challenges discusses their application cybersecurity. The begins with an explanation cybersecurity, including types commonly utilized, such DL, ML, NLP, applications intrusion detection, malware analysis, vulnerability assessment. then highlights black-box AI, difficulty identifying resolving errors, lack inability understand decision-making process. delves into XAI for solutions, interpretable machine-learning models, rule-based systems, model techniques.

Язык: Английский

Процитировано

15

The Evolutionary Convergent Algorithm: A Guiding Path of Neural Network Advancement DOI Creative Commons
Eghbal Hosseini, Abbas M. Al-Ghaili, Dler Hussein Kadir

и другие.

IEEE Access, Год журнала: 2024, Номер 12, С. 127440 - 127459

Опубликована: Янв. 1, 2024

Язык: Английский

Процитировано

14

Designing a modified feature aggregation model with hybrid sampling techniques for network intrusion detection DOI

NarasimhaSwamy Biyyapu,

Veerapaneni Esther Jyothi,

Phani Praveen Surapaneni

и другие.

Cluster Computing, Год журнала: 2024, Номер 27(5), С. 5913 - 5931

Опубликована: Фев. 17, 2024

Язык: Английский

Процитировано

10

Network-based intrusion detection: a comparative analysis of machine learning approaches for improved security DOI

Peerzada Mohammad Sameem Makhdoomi,

Mohammad Suliman Alhussien Ikhlas,

Ayaan Khursheed

и другие.

Journal of Cyber Security Technology, Год журнала: 2025, Номер unknown, С. 1 - 28

Опубликована: Янв. 8, 2025

This research paper reports a detailed evaluation and improvement of the machine learning techniques for network-based intrusion detection systems (IDS). We start by proposing new Network-based Intrusion Detection Machine Learning (NIDML) model, model that is an ensemble Decision Trees, Random Forests, K-nearest neighbors, Neural Networks, Ensemble methods. Each algorithms were trained tested on LUFlow dataset, which varies from 93.03% to 99.96% accuracy obtained models. aims at making comparison between NIDML recent high-performing IDS as well pointing out merits demerits. discuss how such issues accuracy, adaptability, scalability are enhanced through use in performance. While shows promising results, we acknowledge limitations generalizability adaptability unseen attacks. The last section study provides recommendations future focus areas; this includes testing against emerging threats various possible situations real world make further improvements more efficient systems.

Язык: Английский

Процитировано

1

An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data DOI Creative Commons
Arjun Kumar Bose Arnob,

M. F. Mridha,

Mejdl Safran

и другие.

International Journal of Computational Intelligence Systems, Год журнала: 2025, Номер 18(1)

Опубликована: Фев. 5, 2025

Язык: Английский

Процитировано

1

A Literature Review on Security in the Internet of Things: Identifying and Analysing Critical Categories DOI Creative Commons

Hannelore Sebestyen,

Daniela Elena Popescu, Doina Zmaranda

и другие.

Computers, Год журнала: 2025, Номер 14(2), С. 61 - 61

Опубликована: Фев. 11, 2025

With the proliferation of IoT-based applications, security requirements are becoming increasingly stringent. Given diversity such systems, selecting most appropriate solutions and technologies to address challenges is a complex activity. This paper provides an exhaustive evaluation existing related IoT domain, analysing studies published between 2021 2025. review explores evolving landscape security, identifying key focus areas, challenges, proposed as presented in recent research. Through this analysis, categorizes efforts into six main areas: emerging (35.2% studies), securing identity management (19.3%), attack detection (17.9%), data protection (8.3%), communication networking (13.8%), risk (5.5%). These percentages highlight research community’s indicate areas requiring further investigation. From leveraging machine learning blockchain for anomaly real-time threat response optimising lightweight algorithms resource-limited devices, researchers propose innovative adaptive threats. The underscores integration advanced enhance system while also highlighting ongoing challenges. concludes with synthesis threats each identified category, along their solutions, aiming support decision-making during design approach applications guide future toward comprehensive efficient frameworks.

Язык: Английский

Процитировано

1