مشخصات مقاله | |
ترجمه عنوان مقاله | به سوی یک سیستم تشخیص نفوذ مبتنی بر یادگیری عمیق موثر در اینترنت اشیا |
عنوان انگلیسی مقاله | Towards an effective deep learning-based intrusion detection system in the internet of things |
انتشار | مقاله سال ۲۰۲۲ |
تعداد صفحات مقاله انگلیسی | ۱۱ صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه الزویر |
نوع نگارش مقاله |
مقاله پژوهشی (Research Article) |
مقاله بیس | این مقاله بیس میباشد |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
شناسه ISSN | ۲۷۷۲-۵۰۳۰ |
فرضیه | ندارد |
مدل مفهومی | دارد |
پرسشنامه | ندارد |
متغیر | دارد |
رفرنس | دارد |
رشته های مرتبط | مهندسی کامپیوتر – مهندسی فناوری اطلاعات |
گرایش های مرتبط | هوش مصنوعی – مهندسی نرم افزار – اینترنت و شبکه های گسترده – مهندسی الگوریتم ها و محاسبات |
نوع ارائه مقاله |
ژورنال |
مجله | گزارش های تلماتیک و انفورماتیک – Telematics and Informatics Reports |
دانشگاه | Department of Computer Science & Engineering, Sri Venkateshwara College of Engineering, India |
کلمات کلیدی | شبکه عصبی یادگیری عمیق فیلتر شده – الگوریتم K-means اصلاح شده – پروتکل صف بندی پیشرفته پیام – گله زنی فیل مبتنی بر پرواز Levy – الگوریتم بهینه سازی – انتقال تله متری صف پیام |
کلمات کلیدی انگلیسی | Filtered deep learning neural network – Modified K-means algorithm – Advanced message queuing protocol – Levy flight based Elephant herding – optimization algorithm – Message queuing telemetry transport |
شناسه دیجیتال – doi |
https://doi.org/10.1016/j.teler.2022.100009 |
کد محصول | e16613 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract ۱٫ Introduction ۲٫ Related work ۳٫ Phases of filtered deep learning model for intrusion detection ۴٫ Result and discussion ۵٫ Conclusion Declaration of Competing Interest References |
بخشی از متن مقاله: |
Abstract Distributed Sensor Networks play a vital role in the day-to-day world of computing applications, from the cloud to the Internet of Things (IoT). These computing applications devices are normally attached with the microcontrollers like Sensors, actuators, and Adriano network connectivity. Defensive network with an Intrusion Detection System thus serves as the need of modern networks. Despite decades of inevitable development, the Intrusion Detection System is still a challenging research area as the existing Intrusion Detection System operates using signature-based techniques rather than anomaly detection. The existing Intrusion Detection System are thus facing challenges for improvement in Intrusion Detection, Handling heterogeneous data sources is hard for discovering zero-day attacks in IoT networks. This paper presents Filtered Deep Learning Model for Intrusion Detection with a Data Communication approach. The proposed model is composed of five phases: Initialization of Sensor Networks, Cluster Formation in addition to Cluster Head Selection, Connectivity, Attack Detection, and Data Broker. The proposed Model for Intrusion Detection was found to outperform the existing Deep Learning Neural Network and Artificial Neural Network. Experimental results showed a better result of 96.12% accuracy than the dominant algorithms. Introduction In current years, cloud computing (CC) is getting increasingly well-liked in educational along with commercial places [1], in addition, its function is also largely accepted for data storage along with retrieval on the cloud environment [2]. For the basis of increasing the number of data on the Cloud servers(CS), the cloud storage consent to store data in numerous inaccessible sites typically hold by “top” business and running their owner solutions, e.g., Google Drive, Dropbox, Amazon Simple Cloud Storages Service (S3) [3] that means the data is amassed distributive. Even if numerous attractive advances to data gathering were developed in the past decade, it still stays as a research focus in full sway with several significant challenges. Certainly, the incessant decrease in sensor size along with cost, the diversity of sensors present on the marketplace together with the incredible progress on Sensor Node communication technologies have expanded potentially the effect of IoT [4]. IoT comprises SN that is able to compute, sense together with communicate the data by particular communication [5]. For sensing, the SN are utilized, in addition, for computation, numerous algorithms are utilized, at last, for the communication, disparate communication protocols are utilized, for instance, Building Automations and Control Network (BACnet), Distributed Network Protocols version 3 (DNP3) [6], Constrained Application Protocol (CoAP) [7], Message Queue Telemetry Transports (MQTT) [8], together with XMPP (Extensible Messaging and Presences Protocol), AQMP, et cetera, [9]. By utilizing these protocols, the data is amassed. Conclusion DC and effective cloud storage is a challenging one. Many existing works are putting their effort to give a better system. This paper presented a DC and effective distributed cloud storage system centered on the IDS using the FDLNN algorithm. For IDS, the proposed system uses the FDLNN algorithm, and for the data broker, uses the LFEHO algorithm, and for DC, the MQTT and AQMP connectivity are used. The MQTT is best for lightweight devices, and the AQMP is best for the heavyweight devices. For the IDS analysis, the TON_IoT datasets is taken and the performance of the FDLNN is compared with the existing DLNN and ANN algorithms based on the precision, recall, F-Measure, and accuracy. Then, the performance of the data broker is analyzed, for which the proposed LFEHO is compared with the existing IANFIS and ANFIS algorithm based on average turnaround time, throughput, process time, response time as well as AWT. The IDS performance is analyzed based on SNs count and the data broker is analyzed grounded on the number of data. For 500 nodes, the FDLNN has 96.12% accuracy. In data broker analysis for all data count, the proposed LFEHO attained better performance. Hence, the proposed system is found to attain excellent performance on considering the existing algorithms. |