2022
DOI: 10.1109/access.2022.3176317
|View full text |Cite
|
Sign up to set email alerts
|

Design and Development of RNN Anomaly Detection Model for IoT Networks

Abstract: Cybersecurity is important today because of the increasing growth of the Internet of Things (IoT), which has resulted in a variety of attacks on computer systems and networks. As the number of various IoT devices and services grows, cyber security will become an increasingly difficult issue to manage. Malicious traffic identification using deep learning techniques has emerged as a key component of networkbased intrusion detection systems (IDS). Deep learning methods have been a research focus in network intrus… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 107 publications
(25 citation statements)
references
References 91 publications
0
25
0
Order By: Relevance
“…The comparative evaluation test is used to estimate the accuracy, precision, recall, and F-measure of the CNN-LSTM IDS against related IDSs for detecting the DDoS attack in the Cloud environment. The CNN-LSTM IDS is compared with the CNN-IDS [59], the RNN-IDS [60], the LSTM-IDS [61], and the LigthGBM-IDS [62], as they are used as benchmark models due to their comparable performance. Table 3 shows the evaluation metrics of CNN-LSTM IDS and state-of-the-art IDSs.…”
Section: Results and Findingsmentioning
confidence: 99%
“…The comparative evaluation test is used to estimate the accuracy, precision, recall, and F-measure of the CNN-LSTM IDS against related IDSs for detecting the DDoS attack in the Cloud environment. The CNN-LSTM IDS is compared with the CNN-IDS [59], the RNN-IDS [60], the LSTM-IDS [61], and the LigthGBM-IDS [62], as they are used as benchmark models due to their comparable performance. Table 3 shows the evaluation metrics of CNN-LSTM IDS and state-of-the-art IDSs.…”
Section: Results and Findingsmentioning
confidence: 99%
“…By using a number of parameters and open-source datasets, the performance and outcomes of the suggested ROAST-IOT framework are validated in this part. In this work, system validation and performance evaluation have been carried out using some of the more recent and well-liked benchmarking datasets [37][38][39], including ToN-IoT, IoT-23, UNSW-NB 15, and Edge-IIoT. These are the emerging and modern datasets used to improve the security of IoT networks, which comprises the recent classes and types of intrusions.…”
Section: Resultsmentioning
confidence: 99%
“…Ullah et al [37] proposed a deep learning model approach for detecting anomalous behavior in IoT networks. [42] also designed a proactive collaborative malware detection system.…”
Section: Background and Literature Reviewmentioning
confidence: 99%