Communications in computer and information science, Год журнала: 2025, Номер unknown, С. 287 - 302
Опубликована: Янв. 1, 2025
Язык: Английский
Communications in computer and information science, Год журнала: 2025, Номер unknown, С. 287 - 302
Опубликована: Янв. 1, 2025
Язык: Английский
Discover Internet of Things, Год журнала: 2023, Номер 3(1)
Опубликована: Май 30, 2023
Abstract Internet-of-Things (IoT) connects various physical objects through the Internet and it has a wide application, such as in transportation, military, healthcare, agriculture, many more. Those applications are increasingly popular because they address real-time problems. In contrast, use of transmission communication protocols raised serious security concerns for IoT devices, traditional methods signature rule-based inefficient securing these devices. Hence, identifying network traffic behavior mitigating cyber attacks important to provide guaranteed security. Therefore, we develop an Intrusion Detection System (IDS) based on deep learning model called Pearson-Correlation Coefficient - Convolutional Neural Networks (PCC-CNN) detect anomalies. The PCC-CNN combines features obtained from linear-based extractions followed by Network. It performs binary classification anomaly detection also multiclass types attacks. is evaluated three publicly available datasets: NSL-KDD, CICIDS-2017, IOTID20. We first train test five different (Logistic Regression, Linear Discriminant Analysis, K Nearest Neighbour, Classification Regression Tree,& Support Vector Machine) PCC-based Machine Learning models evaluate performance. achieve best similar accuracy KNN CART 98%, 99%, respectively, datasets. On other hand, promising performance with better 99.89% low misclassification rate 0.001 our proposed model. integrated promising, (or False alarm rate) 0.02, 0.00 Binary Multiclass intrusion classifiers. Finally, compare discuss comparison PCC-ML models. Our Deep (DL)-based IDS outperforms methods.
Язык: Английский
Процитировано
67Internet of Things, Год журнала: 2023, Номер 24, С. 100936 - 100936
Опубликована: Сен. 13, 2023
The rapid growth of the Internet Things (IoT) has brought about a global concern for security interconnected devices and networks. This necessitates use efficient Intrusion Detection System (IDS) to mitigate cyber threats. Deep learning (DL) techniques provides promising approach effectively detect irregularities in network traffic, enhancing IoT reducing In this paper, DL-based IDS is proposed using Feed Forward Neural Networks (FFNN), Long Short-Term Memory (LSTM), Random (RandNN) protect networks from cyberattacks. Each DL model its potential benefit as reported paper. For example, FFNN can handle complex traffic patterns, while LSTM good capturing long-term dependencies present traffic. With random connections flexible dynamics, RandNN uses data ability adapt learn data. These algorithms boost cybersecurity by enabling defense mechanisms against challenging threats ensuring sensitive expand. technique exhibits superior performance when compared with current state-of-the-art DL-IDS CIC-IoT22 dataset. An accuracy 99.93 % achieved model, 99.85 96.42 detecting intrusion. Moreover, models have enhance intrusion detection generating swift responses problems
Язык: Английский
Процитировано
67Mathematics, Год журнала: 2024, Номер 12(4), С. 571 - 571
Опубликована: Фев. 14, 2024
In the evolving landscape of Internet Things (IoT) and Industrial IoT (IIoT) security, novel efficient intrusion detection systems (IDSs) are paramount. this article, we present a groundbreaking approach to for IoT-based electric vehicle charging stations (EVCS), integrating robust capabilities convolutional neural network (CNN), long short-term memory (LSTM), gated recurrent unit (GRU) models. The proposed framework leverages comprehensive real-world cybersecurity dataset, specifically tailored IIoT applications, address intricate challenges faced by EVCS. We conducted extensive testing in both binary multiclass scenarios. results remarkable, demonstrating perfect 100% accuracy classification, an impressive 97.44% six-class 96.90% fifteen-class setting new benchmarks field. These achievements underscore efficacy CNN-LSTM-GRU ensemble architecture creating resilient adaptive IDS infrastructures. algorithm, accessible via GitHub, represents significant stride fortifying EVCS against diverse array threats.
Язык: Английский
Процитировано
20Soft Computing, Год журнала: 2023, Номер 27(14), С. 9425 - 9439
Опубликована: Май 21, 2023
Язык: Английский
Процитировано
23Advances in computational intelligence and robotics book series, Год журнала: 2024, Номер unknown, С. 31 - 97
Опубликована: Янв. 18, 2024
In recent years, the utilization of AI in field cybersecurity has become more widespread. Black-box models pose a significant challenge terms interpretability and transparency, which is one major drawbacks AI-based systems. This chapter explores explainable (XAI) techniques as solution to these challenges discusses their application cybersecurity. The begins with an explanation cybersecurity, including types commonly utilized, such DL, ML, NLP, applications intrusion detection, malware analysis, vulnerability assessment. then highlights black-box AI, difficulty identifying resolving errors, lack inability understand decision-making process. delves into XAI for solutions, interpretable machine-learning models, rule-based systems, model techniques.
Язык: Английский
Процитировано
15IEEE Access, Год журнала: 2024, Номер 12, С. 127440 - 127459
Опубликована: Янв. 1, 2024
Язык: Английский
Процитировано
14Cluster Computing, Год журнала: 2024, Номер 27(5), С. 5913 - 5931
Опубликована: Фев. 17, 2024
Язык: Английский
Процитировано
10Journal of Cyber Security Technology, Год журнала: 2025, Номер unknown, С. 1 - 28
Опубликована: Янв. 8, 2025
This research paper reports a detailed evaluation and improvement of the machine learning techniques for network-based intrusion detection systems (IDS). We start by proposing new Network-based Intrusion Detection Machine Learning (NIDML) model, model that is an ensemble Decision Trees, Random Forests, K-nearest neighbors, Neural Networks, Ensemble methods. Each algorithms were trained tested on LUFlow dataset, which varies from 93.03% to 99.96% accuracy obtained models. aims at making comparison between NIDML recent high-performing IDS as well pointing out merits demerits. discuss how such issues accuracy, adaptability, scalability are enhanced through use in performance. While shows promising results, we acknowledge limitations generalizability adaptability unseen attacks. The last section study provides recommendations future focus areas; this includes testing against emerging threats various possible situations real world make further improvements more efficient systems.
Язык: Английский
Процитировано
1International Journal of Computational Intelligence Systems, Год журнала: 2025, Номер 18(1)
Опубликована: Фев. 5, 2025
Язык: Английский
Процитировано
1Computers, Год журнала: 2025, Номер 14(2), С. 61 - 61
Опубликована: Фев. 11, 2025
With the proliferation of IoT-based applications, security requirements are becoming increasingly stringent. Given diversity such systems, selecting most appropriate solutions and technologies to address challenges is a complex activity. This paper provides an exhaustive evaluation existing related IoT domain, analysing studies published between 2021 2025. review explores evolving landscape security, identifying key focus areas, challenges, proposed as presented in recent research. Through this analysis, categorizes efforts into six main areas: emerging (35.2% studies), securing identity management (19.3%), attack detection (17.9%), data protection (8.3%), communication networking (13.8%), risk (5.5%). These percentages highlight research community’s indicate areas requiring further investigation. From leveraging machine learning blockchain for anomaly real-time threat response optimising lightweight algorithms resource-limited devices, researchers propose innovative adaptive threats. The underscores integration advanced enhance system while also highlighting ongoing challenges. concludes with synthesis threats each identified category, along their solutions, aiming support decision-making during design approach applications guide future toward comprehensive efficient frameworks.
Язык: Английский
Процитировано
1