International Journal of Network Management,
Год журнала:
2024,
Номер
35(1)
Опубликована: Авг. 18, 2024
ABSTRACT
The
Internet
of
Things
has
emerged
as
a
significant
and
influential
technology
in
modern
times.
IoT
presents
solutions
to
reduce
the
need
for
human
intervention
emphasizes
task
automation.
According
Cisco
report,
there
were
over
14.7
billion
devices
2023.
However,
number
users
utilizing
this
grows,
so
does
potential
security
breaches
intrusions.
For
instance,
insecure
devices,
such
smart
home
appliances
or
industrial
sensors,
can
be
vulnerable
hacking
attempts.
Hackers
might
exploit
these
vulnerabilities
gain
unauthorized
access
sensitive
data
even
control
remotely.
To
address
prevent
issue,
work
proposes
integrating
intrusion
detection
systems
(IDSs)
with
an
artificial
neural
network
(ANN)
salp
swarm
algorithm
(SSA)
enhance
environment.
SSA
functions
optimization
that
selects
optimal
networks
multilayer
perceptron
(MLP).
proposed
approach
been
evaluated
using
three
novel
benchmarks:
Edge‐IIoTset,
WUSTL‐IIOT‐2021,
IoTID20.
Additionally,
various
experiments
have
conducted
assess
effectiveness
approach.
comparison
is
made
between
several
approaches
from
literature,
particularly
SVM
combined
metaheuristic
algorithms.
Then,
identify
most
crucial
features
each
dataset
improve
performance.
SSA‐MLP
outperforms
other
algorithms
88.241%,
93.610%,
97.698%
IoTID20,
WUSTL,
respectively.
Internet of Things,
Год журнала:
2023,
Номер
24, С. 100936 - 100936
Опубликована: Сен. 13, 2023
The
rapid
growth
of
the
Internet
Things
(IoT)
has
brought
about
a
global
concern
for
security
interconnected
devices
and
networks.
This
necessitates
use
efficient
Intrusion
Detection
System
(IDS)
to
mitigate
cyber
threats.
Deep
learning
(DL)
techniques
provides
promising
approach
effectively
detect
irregularities
in
network
traffic,
enhancing
IoT
reducing
In
this
paper,
DL-based
IDS
is
proposed
using
Feed
Forward
Neural
Networks
(FFNN),
Long
Short-Term
Memory
(LSTM),
Random
(RandNN)
protect
networks
from
cyberattacks.
Each
DL
model
its
potential
benefit
as
reported
paper.
For
example,
FFNN
can
handle
complex
traffic
patterns,
while
LSTM
good
capturing
long-term
dependencies
present
traffic.
With
random
connections
flexible
dynamics,
RandNN
uses
data
ability
adapt
learn
data.
These
algorithms
boost
cybersecurity
by
enabling
defense
mechanisms
against
challenging
threats
ensuring
sensitive
expand.
technique
exhibits
superior
performance
when
compared
with
current
state-of-the-art
DL-IDS
CIC-IoT22
dataset.
An
accuracy
99.93
%
achieved
model,
99.85
96.42
detecting
intrusion.
Moreover,
models
have
enhance
intrusion
detection
generating
swift
responses
problems
Discover Internet of Things,
Год журнала:
2023,
Номер
3(1)
Опубликована: Май 30, 2023
Abstract
Internet-of-Things
(IoT)
connects
various
physical
objects
through
the
Internet
and
it
has
a
wide
application,
such
as
in
transportation,
military,
healthcare,
agriculture,
many
more.
Those
applications
are
increasingly
popular
because
they
address
real-time
problems.
In
contrast,
use
of
transmission
communication
protocols
raised
serious
security
concerns
for
IoT
devices,
traditional
methods
signature
rule-based
inefficient
securing
these
devices.
Hence,
identifying
network
traffic
behavior
mitigating
cyber
attacks
important
to
provide
guaranteed
security.
Therefore,
we
develop
an
Intrusion
Detection
System
(IDS)
based
on
deep
learning
model
called
Pearson-Correlation
Coefficient
-
Convolutional
Neural
Networks
(PCC-CNN)
detect
anomalies.
The
PCC-CNN
combines
features
obtained
from
linear-based
extractions
followed
by
Network.
It
performs
binary
classification
anomaly
detection
also
multiclass
types
attacks.
is
evaluated
three
publicly
available
datasets:
NSL-KDD,
CICIDS-2017,
IOTID20.
We
first
train
test
five
different
(Logistic
Regression,
Linear
Discriminant
Analysis,
K
Nearest
Neighbour,
Classification
Regression
Tree,&
Support
Vector
Machine)
PCC-based
Machine
Learning
models
evaluate
performance.
achieve
best
similar
accuracy
KNN
CART
98%,
99%,
respectively,
datasets.
On
other
hand,
promising
performance
with
better
99.89%
low
misclassification
rate
0.001
our
proposed
model.
integrated
promising,
(or
False
alarm
rate)
0.02,
0.00
Binary
Multiclass
intrusion
classifiers.
Finally,
compare
discuss
comparison
PCC-ML
models.
Our
Deep
(DL)-based
IDS
outperforms
methods.
Mathematics,
Год журнала:
2024,
Номер
12(4), С. 571 - 571
Опубликована: Фев. 14, 2024
In
the
evolving
landscape
of
Internet
Things
(IoT)
and
Industrial
IoT
(IIoT)
security,
novel
efficient
intrusion
detection
systems
(IDSs)
are
paramount.
this
article,
we
present
a
groundbreaking
approach
to
for
IoT-based
electric
vehicle
charging
stations
(EVCS),
integrating
robust
capabilities
convolutional
neural
network
(CNN),
long
short-term
memory
(LSTM),
gated
recurrent
unit
(GRU)
models.
The
proposed
framework
leverages
comprehensive
real-world
cybersecurity
dataset,
specifically
tailored
IIoT
applications,
address
intricate
challenges
faced
by
EVCS.
We
conducted
extensive
testing
in
both
binary
multiclass
scenarios.
results
remarkable,
demonstrating
perfect
100%
accuracy
classification,
an
impressive
97.44%
six-class
96.90%
fifteen-class
setting
new
benchmarks
field.
These
achievements
underscore
efficacy
CNN-LSTM-GRU
ensemble
architecture
creating
resilient
adaptive
IDS
infrastructures.
algorithm,
accessible
via
GitHub,
represents
significant
stride
fortifying
EVCS
against
diverse
array
threats.
Advances in computational intelligence and robotics book series,
Год журнала:
2024,
Номер
unknown, С. 31 - 97
Опубликована: Янв. 18, 2024
In
recent
years,
the
utilization
of
AI
in
field
cybersecurity
has
become
more
widespread.
Black-box
models
pose
a
significant
challenge
terms
interpretability
and
transparency,
which
is
one
major
drawbacks
AI-based
systems.
This
chapter
explores
explainable
(XAI)
techniques
as
solution
to
these
challenges
discusses
their
application
cybersecurity.
The
begins
with
an
explanation
cybersecurity,
including
types
commonly
utilized,
such
DL,
ML,
NLP,
applications
intrusion
detection,
malware
analysis,
vulnerability
assessment.
then
highlights
black-box
AI,
difficulty
identifying
resolving
errors,
lack
inability
understand
decision-making
process.
delves
into
XAI
for
solutions,
interpretable
machine-learning
models,
rule-based
systems,
model
techniques.
Computers,
Год журнала:
2025,
Номер
14(2), С. 61 - 61
Опубликована: Фев. 11, 2025
With
the
proliferation
of
IoT-based
applications,
security
requirements
are
becoming
increasingly
stringent.
Given
diversity
such
systems,
selecting
most
appropriate
solutions
and
technologies
to
address
challenges
is
a
complex
activity.
This
paper
provides
an
exhaustive
evaluation
existing
related
IoT
domain,
analysing
studies
published
between
2021
2025.
review
explores
evolving
landscape
security,
identifying
key
focus
areas,
challenges,
proposed
as
presented
in
recent
research.
Through
this
analysis,
categorizes
efforts
into
six
main
areas:
emerging
(35.2%
studies),
securing
identity
management
(19.3%),
attack
detection
(17.9%),
data
protection
(8.3%),
communication
networking
(13.8%),
risk
(5.5%).
These
percentages
highlight
research
community’s
indicate
areas
requiring
further
investigation.
From
leveraging
machine
learning
blockchain
for
anomaly
real-time
threat
response
optimising
lightweight
algorithms
resource-limited
devices,
researchers
propose
innovative
adaptive
threats.
The
underscores
integration
advanced
enhance
system
while
also
highlighting
ongoing
challenges.
concludes
with
synthesis
threats
each
identified
category,
along
their
solutions,
aiming
support
decision-making
during
design
approach
applications
guide
future
toward
comprehensive
efficient
frameworks.
Journal of Cyber Security Technology,
Год журнала:
2025,
Номер
unknown, С. 1 - 28
Опубликована: Янв. 8, 2025
This
research
paper
reports
a
detailed
evaluation
and
improvement
of
the
machine
learning
techniques
for
network-based
intrusion
detection
systems
(IDS).
We
start
by
proposing
new
Network-based
Intrusion
Detection
Machine
Learning
(NIDML)
model,
model
that
is
an
ensemble
Decision
Trees,
Random
Forests,
K-nearest
neighbors,
Neural
Networks,
Ensemble
methods.
Each
algorithms
were
trained
tested
on
LUFlow
dataset,
which
varies
from
93.03%
to
99.96%
accuracy
obtained
models.
aims
at
making
comparison
between
NIDML
recent
high-performing
IDS
as
well
pointing
out
merits
demerits.
discuss
how
such
issues
accuracy,
adaptability,
scalability
are
enhanced
through
use
in
performance.
While
shows
promising
results,
we
acknowledge
limitations
generalizability
adaptability
unseen
attacks.
The
last
section
study
provides
recommendations
future
focus
areas;
this
includes
testing
against
emerging
threats
various
possible
situations
real
world
make
further
improvements
more
efficient
systems.