咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Towards Machine Learning Based... 收藏

Towards Machine Learning Based Intrusion Detection in IoT Networks

作     者:Nahida Islam Fahiba Farhin Ishrat Sultana M.Shamim Kaiser Md.Sazzadur Rahman Mufti Mahmud A.S.M.Sanwar Hosen Gi Hwan Cho 

作者机构:Institute of Information TechnologyJahangirnagar UniversityDhakaBangladesh Department of Computer ScienceNottingham Trent UniversityNottinghamUK Division of Computer Science and EngineeringJeonbuk National UniversityJeonju54896Korea 

出 版 物:《Computers, Materials & Continua》 (计算机、材料和连续体(英文))

年 卷 期:2021年第69卷第11期

页      面:1801-1821页

核心收录:

学科分类:0809[工学-电子科学与技术(可授工学、理学学位)] 08[工学] 

主  题:IoT shallow machine learning deep learning data science IDS 

摘      要:The Internet of Things(IoT)integrates billions of self-organized and heterogeneous smart nodes that communicate with each other without human *** recent years,IoT based systems have been used in improving the experience in many applications including healthcare,agriculture,supply chain,education,transportation and traffic monitoring,utility services ***,node heterogeneity raised security concern which is one of the most complicated issues on the *** security measures,including encryption,access control,and authentication for the IoT devices are ineffective in achieving *** this paper,we identified various types of IoT threats and shallow(such as decision tree(DT),random forest(RF),support vector machine(SVM))as well as deep machine learning(deep neural network(DNN),deep belief network(DBN),long short-term memory(LSTM),stacked LSTM,bidirectional LSTM(Bi-LSTM))based intrusion detection systems(IDS)in the IoT environment have been *** performance of these models has been evaluated using five benchmark datasets such as NSL-KDD,IoTDevNet,DS2OS,IoTID20,and IoT Botnet *** various performance metrics such as Accuracy,Precision,Recall,F1-score were used to evaluate the performance of shallow/deep machine learning based *** has been found that deep machine learning IDS outperforms shallow machine learning in detecting IoT attacks.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分