Proposed Mitigation Framework for the Internet of Insecure Things

نویسندگان

چکیده

Intrusion detection systems IDS are increasingly utilizing machine learning methods. IDSs important tools for ensuring the security of network data and resources. The Internet Things (IoT) is an expanding intelligent machines sensors. However, they vulnerable to attackers because ubiquitous extensive IoT networks. Datasets from intrusion (IDS) have been analyzed deep methods such as Bidirectional long-short term memory (BiLSTM). This research presents BiLSTM framework with Principal Component Analysis PCA (PCA-LSTM-IDS). PCA-LSTM-IDS comprised two layers: extracting layer which using PCA, anomaly classification. Through a comparison study, effectiveness proposed approach task detecting attacks evaluated NSL-KDD dataset, solves many inherent problems KDD'99 dataset. Experimental results indicate that suggested framework, average accuracy 99%, outperforms alternative approaches specially when explained variance 90%.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Avoiding the Internet of Insecure Industrial Things

Security incidents such as targeted distributed denial of service (DDoS) attacks on power grids and hacking of factory industrial control systems (ICS) are on the increase. This paper unpacks where emerging security risks lie for the industrial internet of things, drawing on both technical and regulatory perspectives. Legal changes are being ushered by the European Union (EU) Network and Inform...

متن کامل

investigating the feasibility of a proposed model for geometric design of deployable arch structures

deployable scissor type structures are composed of the so-called scissor-like elements (sles), which are connected to each other at an intermediate point through a pivotal connection and allow them to be folded into a compact bundle for storage or transport. several sles are connected to each other in order to form units with regular polygonal plan views. the sides and radii of the polygons are...

Attack detection and mitigation for the Internet of Things

In the Internet of Things (IoT), it is envisioned that a huge amount of physical objects will become online. From a security perspective, the more devices are connected to communication networks, the more powerful cyber-attacks can become. The goal of this research project is to design, develop and evaluate new distributed attack detection and mitigation approaches for the IoT. Introduction. Th...

متن کامل

A Security Framework for Internet of Things

As we move towards the Internet of Things (IoT), the number of sensors deployed around the world is growing at a rapid pace. There is a huge scope for more streamlined living through an increase of smart services but this coincides with an increase in security and privacy concerns, therefore access control has been an important factor in the development of IoT. This work proposes an authorizati...

متن کامل

A Framework for Trustworthy Internet of Things

Security is one of the major challenges in the Internet of Things (IoT). Although various security-related works have been done for IoT, existing works were only based on the classic network security-aspect. For instance, “Cryptography alone cannot solve protecting information in IoT problem as internally compromised nodes can generate bogus information and still authenticate it using valid cry...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Ma?allat? Kulliyyat? D?r Al-?ul?m

سال: 2023

ISSN: ['1110-0923', '2735-4202', '2735-4113', '1110-581X']

DOI: https://doi.org/10.58491/2735-4202.3025