TY - GEN
T1 - Intrusion Detection System Focused on Deep Learning for Mobile IoT Networks
AU - Aljumah, Abdullah
AU - Ahanger, Tariq Ahamed
N1 - Publisher Copyright:
© 2024 ACM.
PY - 2024/4/26
Y1 - 2024/4/26
N2 - Detection mechanisms for intrusion play a key role in the identification of vulnerable behaviors that denigrate IoT networks. Mobile Adhoc Networks (MANETs) are wireless networks with the ability to transmit data without the need for infrastructure to run them. Recently, the IoT networking model has arisen, which is a superset of the above conceptualization. Its fragmented existence and minimal availability of resources pose one of the major issues to provide secure data communication. Intrusion Detection System (IDS) is indispensable for acclimatizing with difficulties. Researchers have traditionally used a heuristic approach focused on the heterogeneity of appropriately classified cases (CCIs), with a cumulative estimate of fluctuation (AMoF). It consists of 2 phases; phase-1 accumulates values by dedicated sniffers (DSs) to produces the CCI which is further transmitted to the supernode (SN). SN conducts the linear regression procedure over the CCIs acquired from DSs in phase-2 to separate the benevolent and vulnerable nodes. For various extreme network situations, the identification characterization is provided in this work using Gauss Markov (GM), and Random waypoint (RWP). In the enhanced velocity environment, detection rates surpass 98%, whereas, 90% is registered for limited speed.
AB - Detection mechanisms for intrusion play a key role in the identification of vulnerable behaviors that denigrate IoT networks. Mobile Adhoc Networks (MANETs) are wireless networks with the ability to transmit data without the need for infrastructure to run them. Recently, the IoT networking model has arisen, which is a superset of the above conceptualization. Its fragmented existence and minimal availability of resources pose one of the major issues to provide secure data communication. Intrusion Detection System (IDS) is indispensable for acclimatizing with difficulties. Researchers have traditionally used a heuristic approach focused on the heterogeneity of appropriately classified cases (CCIs), with a cumulative estimate of fluctuation (AMoF). It consists of 2 phases; phase-1 accumulates values by dedicated sniffers (DSs) to produces the CCI which is further transmitted to the supernode (SN). SN conducts the linear regression procedure over the CCIs acquired from DSs in phase-2 to separate the benevolent and vulnerable nodes. For various extreme network situations, the identification characterization is provided in this work using Gauss Markov (GM), and Random waypoint (RWP). In the enhanced velocity environment, detection rates surpass 98%, whereas, 90% is registered for limited speed.
KW - Internet of Things (IoT)
KW - Intrusion Detection System (IDS)
KW - Linear Regression
KW - Random Forest
UR - http://www.scopus.com/inward/record.url?scp=85203834293&partnerID=8YFLogxK
U2 - 10.1145/3669754.3669813
DO - 10.1145/3669754.3669813
M3 - Conference contribution
AN - SCOPUS:85203834293
T3 - ACM International Conference Proceeding Series
SP - 387
EP - 392
BT - ICCAI 2024 - Proceedings of the 2024 10th International Conference on Computing and Artificial Intelligence
PB - Association for Computing Machinery
T2 - 10th International Conference on Computing and Artificial Intelligence, ICCAI 2024
Y2 - 26 April 2024 through 29 April 2024
ER -