2022
DOI: 10.32604/cmc.2022.027483
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Deep Learning Enabled Intrusion Detection in Clustered IIoT Environment

Abstract: Industrial Internet of Things (IIoT) is an emerging field which connects digital equipment as well as services to physical systems. Intrusion detection systems (IDS) can be designed to protect the system from intrusions or attacks. In this view, this paper presents a novel hybrid deep learning with metaheuristics enabled intrusion detection (HDL-MEID) technique for clustered IIoT environments. The HDL-MEID model mainly intends to organize the IIoT devices into clusters and enabled secure communication. Primari… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…Marzouk et al [13] projected a new hybrid DL with metaheuristics-assisted intrusion detection (HDL-MEID) method. This approach devises a novel chaotic mayfly optimizer (CMFO) based clustering model for efficiently selecting the CH and establishing clusters.…”
Section: ░ 2 Related Workmentioning
confidence: 99%
“…Marzouk et al [13] projected a new hybrid DL with metaheuristics-assisted intrusion detection (HDL-MEID) method. This approach devises a novel chaotic mayfly optimizer (CMFO) based clustering model for efficiently selecting the CH and establishing clusters.…”
Section: ░ 2 Related Workmentioning
confidence: 99%
“…A number of reviews has been introduced to compare between various symmetric and nonsymmetric cryptography algorithms [11][12][13][14][15][16][17][18][19].…”
Section: Related Workmentioning
confidence: 99%
“…Intrusion detection technology is an active security defense strategy, which can actively detect and identify abnormal behaviors in network access data. It is an important security defense measure deployed behind the firewall and is the second firewall for system security [12][13][14]. e Internet is only a small part of the huge industrial Internet of things system [15].…”
Section: Related Workmentioning
confidence: 99%