2021
DOI: 10.1002/ett.4221
|View full text |Cite
|
Sign up to set email alerts
|

An intrusion detection system using optimized deep neural network architecture

Abstract: Internet usage became increasingly ubiquitous. The concern regarding security and privacy has become essential for Internet users. As the usage of the Internet increases the number of cyber‐attacks also increases substantially. Intrusion detection is one of the challenging aspects of network security. Efficient intrusion detection is crucial for every organization to mitigate the vulnerability. This paper presents a novel intrusion detection system to detect malicious attacks targeted at a smart environment. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
28
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 45 publications
(29 citation statements)
references
References 33 publications
0
28
0
1
Order By: Relevance
“…Specifically, various Machine Learning (ML) and Deep Learning (DL) models have been developed to classify network traffic data in IoT networks. These models learn the discriminating features of benign traffic and malicious traffic using different architectures such as Random Forest (RF) [ 18 ], Support Vector Machine (SVM) [ 19 ], Deep Neural Network (DNN) [ 20 ], Recurrent Neural Network (RNN) [ 21 ], Long Short-Term Memory (LSTM) [ 22 ] and Gated Recurrent Unit (GRU) [ 23 ]. For an in-depth understanding, comprehensive reviews and surveys on the application of ML and DL in intrusion detection are presented in [ 24 , 25 , 26 , 27 , 28 , 29 ].…”
Section: Introductionmentioning
confidence: 99%
“…Specifically, various Machine Learning (ML) and Deep Learning (DL) models have been developed to classify network traffic data in IoT networks. These models learn the discriminating features of benign traffic and malicious traffic using different architectures such as Random Forest (RF) [ 18 ], Support Vector Machine (SVM) [ 19 ], Deep Neural Network (DNN) [ 20 ], Recurrent Neural Network (RNN) [ 21 ], Long Short-Term Memory (LSTM) [ 22 ] and Gated Recurrent Unit (GRU) [ 23 ]. For an in-depth understanding, comprehensive reviews and surveys on the application of ML and DL in intrusion detection are presented in [ 24 , 25 , 26 , 27 , 28 , 29 ].…”
Section: Introductionmentioning
confidence: 99%
“…The integrity of the data captured is preserved using a homomorphic encryption scheme. 35 This step is mainly done to ensure the privacy of the data processed. The network traffic captured is preprocessed to remove the noise present in the dataset and enhance the speed of the training process.…”
Section: Proposed Iot Based Cyber Forensics Architecturementioning
confidence: 99%
“…It is mainly composed of an agent, an analysis engine, and a response module. Several IDS-based security solutions were developed in the previous year [15][16][17][18][19][20][21][22][23][24][25]. But, these IDS-based security solutions cannot cope with the MEC architecture due to the changing behavior of users and devices.…”
Section: Problem Formulationmentioning
confidence: 99%