2021 IEEE 7th World Forum on Internet of Things (WF-IoT) 2021
DOI: 10.1109/wf-iot51360.2021.9596033
|View full text |Cite
|
Sign up to set email alerts
|

A Deep LSTM based Approach for Intrusion Detection IoT Devices Network in Smart Home

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
2

Relationship

3
6

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 26 publications
0
7
0
Order By: Relevance
“…The model was trained on twelve epochs with an accuracy of 91% on train and 87% on validation data. Figure (5) shows the accuracy of the trained LSTM model on both train and validation data. We compared the performance of the developed model with other related work in predicting cyberthreat and identifying vulnerability exposures using deep web data.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The model was trained on twelve epochs with an accuracy of 91% on train and 87% on validation data. Figure (5) shows the accuracy of the trained LSTM model on both train and validation data. We compared the performance of the developed model with other related work in predicting cyberthreat and identifying vulnerability exposures using deep web data.…”
Section: Resultsmentioning
confidence: 99%
“…RNN stores information in memory because their current output is dependent on the previous computations. However, the major problem associated with RNNs are vanishing and exploding gradients, LSTMs were designed to overcome the bottlenecks of RNN by introducing new gates which allow better control over the gradient flow and enable better preservation of long-range dependencies [5,6]. The LSTM architecture is different from other deep learning architectures, LSTM model contains the memory cell and gates which are essential to the architecture namely; the input gate, output gate, and the forget gate.…”
Section: Deep Learning Algorithm For Threat Detectionmentioning
confidence: 99%
“…An enforced fallback process needs to be in place when a system is not functioning properly and backup measures are necessary to ensure that security systems can recover from failures [19]. Approximately 70% percent of IoT devices can be hacked and securing these devices is important as they improve the quality of life of people through the advancement of technology [23]. Another method to mitigate back-end attacks involves enforcing data integrity, constraints, and other security features that can make it difficult for an intruder to get into the system.…”
Section: Mitigating the Vulnerabilities Of Biometricsmentioning
confidence: 99%
“…It is particularly difficult to achieve when emerging technologies, such as the Internet of Things (IoT), are involved. The internet of devices is estimated to grow to 50 billion by 2020 due to its proliferation in many upcoming applications, such as smart cities, smart homes, smart cars, and intelligent industrial systems [ 3 , 4 ]. This growth presents a huge risk to data privacy, integrity, and availability, which may be exploited by malicious actors.…”
Section: Introductionmentioning
confidence: 99%