2023
DOI: 10.11591/ijece.v13i1.pp1134-1141
|View full text |Cite
|
Sign up to set email alerts
|

Deep learning algorithms for intrusion detection systems in internet of things using CIC-IDS 2017 dataset

Abstract: Due to technological advancements in recent years, the availability and usage of smart electronic gadgets have drastically increased. Adoption of these smart devices for a variety of applications in our day-to-day life has become a new normal. As these devices collect and store data, which is of prime importance, securing is a mandatory requirement by being vigilant against intruders. Many traditional techniques are prevailing for the same, but they may not be a good solution for the devices with resource cons… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 22 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…Many studies have reported promising results using deep learning architectures on this dataset, classifying network traffic as either benign or malicious (as a binary classification task) [9,11,43]. However, this does not mean that increasing the number of classes will always result in decreased accuracy, and such trends have not been observed.…”
Section: Related Workmentioning
confidence: 99%
“…Many studies have reported promising results using deep learning architectures on this dataset, classifying network traffic as either benign or malicious (as a binary classification task) [9,11,43]. However, this does not mean that increasing the number of classes will always result in decreased accuracy, and such trends have not been observed.…”
Section: Related Workmentioning
confidence: 99%
“…Notable datasets such as CIC-IDS2017, NSL-KDD, and the UNSW-NB15 are widely used benchmarks for evaluating intrusion detection algorithms in IoT networks. Researchers like Jose and Jose [23] and Ashiku and Dagli [7] have extensively utilized these datasets to evaluate LSTM-based IDSs, showcasing improved accuracy and robustness.…”
Section: Comprehensive Evaluation Of Public Datasetsmentioning
confidence: 99%
“…Another work that exploits Deep Neural Networks (DNNs) for an IDS is proposed in [23]. The authors carried out a comparative study of IoT IDS with three DL models: DNN, Long Short-Term Memory (LSTM), and CNN.…”
Section: Related Workmentioning
confidence: 99%