2021
DOI: 10.1007/s10515-021-00298-7
|View full text |Cite
|
Sign up to set email alerts
|

Deep learning approach for intrusion detection in IoT-multi cloud environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 30 publications
(20 citation statements)
references
References 22 publications
0
20
0
Order By: Relevance
“…In order to test the overall detection performance of intrusion data, this paper takes the KDD99 data set as the benchmark method, uses reference [22,25] as the comparison method, and runs in the same experimental environment as the M-CNN detection method to verify the optimal performance of the proposed method.…”
Section: Analysis Of Detection Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In order to test the overall detection performance of intrusion data, this paper takes the KDD99 data set as the benchmark method, uses reference [22,25] as the comparison method, and runs in the same experimental environment as the M-CNN detection method to verify the optimal performance of the proposed method.…”
Section: Analysis Of Detection Resultsmentioning
confidence: 99%
“…e main idea of deep learning is to recognize and classify new network traffic data in real-time by using a trained classification model. Reference [22] proposed an intrusion detection system based on deep learning for the multi-cloud Internet of things environment, and the feasibility of the method was verified based on the NSL-KDD data set; Reference [23] determined the network security level, constructed a security intrusion detection system based on real-time sequence and extreme learning machine model, and analyzed the state of the Internet of things network. Based on the security interoperability requirements of the Internet of things, reference [24] built a distributed intrusion detection model based on the bidirectional long and short-term memory model to realize the network protection of the Internet of things for smart contracts; Reference [25] adopted the stacking depth learning method to analyze and determine the network state of the SCADA system in the power network.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Selvapandian et al have introduced a deep learning‐based LeNet model that considered surveillance feed as input and identifies anomaly characteristics 20 . In the present technology, there are several models that use data analytics for image processing.…”
Section: Literature Reviewmentioning
confidence: 99%
“…14 ∶ Random partition of feature vector ∶ F V = F V1 + F V2 (20) 15 ∶ Instantaneous anomaly detection To confirm the presence of an anomaly in the input frames, the process leads to the employment of proposed AI which accepts training data and test data (frame) as represented in Equations ( 17)- (19). The obtained features are partitioned via Equation ( 20) and the anomaly is detected using the process defined in Equation (21).…”
Section: Algorithm 1 Anomaly Detection Using Proposed Ai Modelmentioning
confidence: 99%