TY - GEN
T1 - Deep Learning-Based Intrusion Detection Technique for IoT Security
AU - Ahanger, Tariq Ahamed
AU - Aljumah, Abdullah
AU - Ullah, Imdad
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - Numerous connected machines compose the Internet of Things (IoT) like sensors and actuators, via wired or wireless networks. The number of IoT apps, including Vehicular Ad-hoc Networks (VANETs), Healthcare, Smart communities, and Wearable have recently risen significantly. Data Protection and Security is becoming more critical as the number of IoT-linked devices grows. In this paper, we suggest a new deep learning-based intrusion detection system (DL-IDS) to identify security breaches in IoT environments to address the difficulties of protecting IoT applications. There are several IDSs developed by researchers, optimal learning and management of data set functions are neglected, which are essential problems that impact the accuracy of tracking threats. To achieve optimum detection recognition, the presented framework incorporates the SMO technique and the Deep stacked polynomial network. SMO chooses the optimal features in the data, and SDPN categorizes it as regular or vulnerable. The presented model is analyzed for performance assessment in comparison to the state-of-The-Art decision-making models. In terms of accuracy, recall, precision, and F-score, the detailed review suggests that presented technique acquires enhanced performance and is immensely efficient.
AB - Numerous connected machines compose the Internet of Things (IoT) like sensors and actuators, via wired or wireless networks. The number of IoT apps, including Vehicular Ad-hoc Networks (VANETs), Healthcare, Smart communities, and Wearable have recently risen significantly. Data Protection and Security is becoming more critical as the number of IoT-linked devices grows. In this paper, we suggest a new deep learning-based intrusion detection system (DL-IDS) to identify security breaches in IoT environments to address the difficulties of protecting IoT applications. There are several IDSs developed by researchers, optimal learning and management of data set functions are neglected, which are essential problems that impact the accuracy of tracking threats. To achieve optimum detection recognition, the presented framework incorporates the SMO technique and the Deep stacked polynomial network. SMO chooses the optimal features in the data, and SDPN categorizes it as regular or vulnerable. The presented model is analyzed for performance assessment in comparison to the state-of-The-Art decision-making models. In terms of accuracy, recall, precision, and F-score, the detailed review suggests that presented technique acquires enhanced performance and is immensely efficient.
KW - Deep Learning
KW - Intrusion Detection System (IDS)
KW - Security
KW - nternet of Things (IoT)
UR - http://www.scopus.com/inward/record.url?scp=85215946070&partnerID=8YFLogxK
U2 - 10.1109/ICECCME62383.2024.10796646
DO - 10.1109/ICECCME62383.2024.10796646
M3 - Conference contribution
AN - SCOPUS:85215946070
T3 - International Conference on Electrical, Computer, Communications and Mechatronics Engineering, ICECCME 2024
BT - International Conference on Electrical, Computer, Communications and Mechatronics Engineering, ICECCME 2024
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 4th International Conference on Electrical, Computer, Communications and Mechatronics Engineering, ICECCME 2024
Y2 - 4 November 2024 through 6 November 2024
ER -