2021
DOI: 10.1049/cit2.12003
|View full text |Cite
|
Sign up to set email alerts
|

SDN‐based intrusion detection system for IoT using deep learning classifier (IDSIoT‐SDL)

Abstract: The participation of ordinary devices in networking has created a world of connected devices rapidly. The Internet of Things (IoT) includes heterogeneous devices from every field. There are no definite protocols or standards for IoT communication, and most of the IoT devices have limited resources. Enabling a complete security measure for such devices is a challenging task, yet necessary. Many lightweight security solutions have surfaced lately for IoT. The lightweight security protocols are unable to provide … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
34
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 95 publications
(52 citation statements)
references
References 30 publications
0
34
0
Order By: Relevance
“…Rather than relying on hand-engineered or traditional technique filters, CNN may be trained to learn these filter characteristics over time. The arrangement of the Visual Cortex served as inspiration for the design of the CNN architecture, which is similar to the neuronal connection pattern found in the human brain [28]. A visual field area known as the Receptive Field is where neurons respond to visual input.…”
Section: ) Support Vector Machines (Svm)mentioning
confidence: 89%
“…Rather than relying on hand-engineered or traditional technique filters, CNN may be trained to learn these filter characteristics over time. The arrangement of the Visual Cortex served as inspiration for the design of the CNN architecture, which is similar to the neuronal connection pattern found in the human brain [28]. A visual field area known as the Receptive Field is where neurons respond to visual input.…”
Section: ) Support Vector Machines (Svm)mentioning
confidence: 89%
“…The SVD algorithm is a very important model compression method. Its connotation is to represent the original matrix by extracting key features; that is, a complex matrix is approximated by multiplying several small matrices representing key features in the original matrix [ 23 ]. SVD is an algorithm widely used in the field of machine learning.…”
Section: Research Theories and Methodsmentioning
confidence: 99%
“…Not defined [22] LSTM CSE-CIC-IDS2018 A security architecture is designed to locate Brute-Force, SYN flooding, and ICMP flooding attacks…”
Section: Dos Attack Detection Scheme Is Designedmentioning
confidence: 99%
“…Authors have addressed a vast range of cyber-attacks, and their designed framework has validated this claim by successfully detecting these attacks with remarkable accuracy. [22] discussed a relevantly admissible approach to an encounter Brute-Force attack, SYN flooding, and ICMP flooding attacks. The designed security framework is aggregated with CSE-CIC-IDS2018 data set with a training pattern on LSTM and is capable of detecting premonition threats in IoT communications.…”
Section: Cicids2017mentioning
confidence: 99%