咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Internet of Things Intrusion D... 收藏

Internet of Things Intrusion Detection System Based on Convolutional Neural Network

作     者:Jie Yin Yuxuan Shi Wen Deng Chang Yin Tiannan Wang Yuchen Song Tianyao Li Yicheng Li 

作者机构:Department of Computer Information and Cyber SecurityJiangsu Police InstituteNanjingChina Engineering Research Center of Electronic Data Forensics AnalysisNanjingChina Key Laboratory of Digital ForensicsDepartment of Public Security of Jiangsu ProvinceNanjingChina 

出 版 物:《Computers, Materials & Continua》 (计算机、材料和连续体(英文))

年 卷 期:2023年第75卷第4期

页      面:2119-2135页

核心收录:

学科分类:12[管理学] 1201[管理学-管理科学与工程(可授管理学、工学学位)] 081104[工学-模式识别与智能系统] 0839[工学-网络空间安全] 08[工学] 0835[工学-软件工程] 0811[工学-控制科学与工程] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:Jiangsu Province Big Data Management Center State Key Laboratory of Nanjing University “Research on Intrusion Signal Detection Technology Based on Deep Learning in Complex Electromagnetic Environment Zhejiang University, ZJU State Key Laboratory of Computer Aided Design and Computer Graphics 

主  题:Internet of things intrusion detection system convolutional neural network federated learning 

摘      要:In recent years, the Internet of Things (IoT) technology has developedby leaps and bounds. However, the large and heterogeneous networkstructure of IoT brings high management costs. In particular, the low costof IoT devices exposes them to more serious security concerns. First, aconvolutional neural network intrusion detection system for IoT devices isproposed. After cleaning and preprocessing the NSL-KDD dataset, this paperuses feature engineering methods to select appropriate features. Then, basedon the combination of DCNN and machine learning, this paper designs acloud-based loss function, which adopts a regularization method to preventoverfitting. The model consists of one input layer, two convolutional layers,two pooling layers and three fully connected layers and one output ***, a framework that can fully consider the user’s privacy protection isproposed. The framework can only exchange model parameters or intermediateresults without exchanging local individuals or sample data. This paperfurther builds a global model based on virtual fusion data, so as to achievea balance between data privacy protection and data sharing computing. Theperformance indicators such as accuracy, precision, recall, F1 score, and AUCof the model are verified by simulation. The results show that the model ishelpful in solving the problem that the IoT intrusion detection system cannotachieve high precision and low cost at the same time.

读者评论 与其他读者分享你的观点