4.6 Article

A Novel Deep Supervised Learning-Based Approach for Intrusion Detection in IoT Systems

Related references

Note: Only part of the references are listed.
Article Telecommunications

DL-IDS: a deep learning-based intrusion detection framework for securing IoT

Yazan Otoum et al.

Summary: The Internet of Things (IoT) is made up of devices connected through wired or wireless networks, and security is a critical issue. To address this, we propose a new deep learning-based intrusion detection system that can detect security threats in IoT environments more accurately.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2022)

Article Automation & Control Systems

Intelligent Security Performance Prediction for IoT-Enabled Healthcare Networks Using an Improved CNN

Lingwei Xu et al.

Summary: This article focuses on the security performance prediction of mobile IoT-enabled healthcare networks. By analyzing and deriving novel expressions, a security performance intelligent prediction algorithm is proposed. This algorithm utilizes an improved convolutional neural network model to enhance prediction precision and adapt to nonlinear healthcare big data.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Information Systems

A Novel Intrusion Detection Method Based on Lightweight Neural Network for Internet of Things

Ruijie Zhao et al.

Summary: This article proposes a lightweight deep neural network (LNN) based NID method for IoT, which achieves excellent classification performance and is suitable for classifying IoT traffic through feature dimensionality reduction and low computational cost feature extraction.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Telecommunications

Network intrusion detection system: A systematic study of machine learning and deep learning approaches

Zeeshan Ahmad et al.

Summary: The rapid advances in the internet and communication fields have led to a significant increase in network size and data. Despite efforts to improve accuracy and reduce false alarms, IDS still faces challenges in effectively detecting intrusions and novel attacks. Machine learning and deep learning-based IDS systems have emerged as potential solutions for efficient intrusion detection across networks.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2021)

Article Computer Science, Interdisciplinary Applications

Optimal feature selection for SAR image classification using biogeography-based optimization (BBO), artificial bee colony (ABC) and support vector machine (SVM): a combined approach of optimization and machine learning

Omid Rostami et al.

Summary: This paper introduces a hybrid biogeography-based optimization support vector machine (HBBOSVM) for land cover classification in POLSAR images, aiming to minimize the number of features and maximize classification accuracy. The proposed method, involving preprocessing, feature selection, and classification, outperforms other algorithms and performs well on 20 benchmark problems.

COMPUTATIONAL GEOSCIENCES (2021)

Review Engineering, Electrical & Electronic

Artificial Intelligence-Based Sensors for Next Generation IoT Applications: A Review

Subhas Chandra Mukhopadhyay et al.

Summary: Sensors are crucial for IoT systems, with recent advancements being supported by AI-based sensors that are intelligent, reliable, and privacy-aware. These sensors have the potential to detect new patterns, promote product innovation, improve operations, and open up new business models in smart IoT applications.

IEEE SENSORS JOURNAL (2021)

Article Chemistry, Analytical

An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks

Andrew Churcher et al.

Summary: In recent years, there has been a significant increase in IoT devices and generated data, leading to potential security vulnerabilities. Traditional IDS struggle to efficiently handle the growing number of network attacks. This study focuses on the application of machine learning methods in IDS.

SENSORS (2021)

Article Computer Science, Information Systems

AS-IDS: Anomaly and Signature Based IDS for the Internet of Things

Yazan Otoum et al.

Summary: The proposed AS-IDS model combines anomaly-based and signature-based approaches to detect known and unknown attacks in IoT networks. The model consists of three phases: traffic filtering, preprocessing, and hybrid IDS, with various methods used to process incoming traffic and classify attacks.

JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT (2021)

Article Construction & Building Technology

Demand side management through load shifting in IoT based HEMS: Overview, challenges and opportunities

Swati Sharda et al.

Summary: In the era of smart grid, demand side management (DSM) is crucial for development of sustainable cities and societies. This paper discusses practical challenges in implementing DSM through load shifting for IoT-enabled home energy management systems (HEMS), and emphasizes the need for advanced optimization algorithms.

SUSTAINABLE CITIES AND SOCIETY (2021)

Article Computer Science, Artificial Intelligence

Application of an improved discrete crow search algorithm with local search and elitism on a humanitarian relief case

Ibrahim Mirac Eliguzel et al.

Summary: This paper demonstrates the application of the improved Crow Search Algorithm (I-CSA) on the P-median problem, which allows for faster convergence and better solutions through local searches and elitism. The application is structured in three phases, with parameters optimized and tested using well-known datasets, and results compared to other algorithms to showcase its effectiveness.

ARTIFICIAL INTELLIGENCE REVIEW (2021)

Review Automation & Control Systems

Supervised feature selection techniques in network intrusion detection: A critical review

M. Di Mauro et al.

Summary: Machine Learning techniques are becoming increasingly important in network intrusion detection for uncovering hidden cyber-threats in abnormal flows. However, dealing with the vast diversity and number of features in data traffic is a challenging problem.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2021)

Article Chemistry, Analytical

Deep PUF: A Highly Reliable DRAM PUF-Based Authentication for IoT Networks Using Deep Convolutional Neural Networks

Fatemeh Najafi et al.

Summary: This paper proposes a scheme based on deep convolutional neural network for authentication using latency-based DRAM PUFs, without the need for any additional error correction technique. By eliminating pre-selection and filtering mechanisms, the framework increases the number of challenge-response pairs, enabling highly reliable authentication of resource-constrained nodes.

SENSORS (2021)

Article Computer Science, Information Systems

Toward Effective Intrusion Detection Using Log-Cosh Conditional Variational Autoencoder

Xing Xu et al.

Summary: Intrusion detection is important for network security, but traditional machine learning-based methods face challenges with unknown attacks. This article introduces a novel deep learning method LCVAE for intrusion detection, which effectively handles imbalanced intrusion data. Experimental results demonstrate the superior performance of LCVAE in detecting intrusions and its potential for generating diverse new intrusion data.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication

Masoud Kaveh et al.

Summary: The paper introduces an improved Merkle hash tree based secure scheme that can resist current underwater attacks with good security and performance.

FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING (2021)

Article Computer Science, Information Systems

Trust-Based Blockchain Authorization for IoT

Guntur Dharma Putra et al.

Summary: This paper introduces a decentralized attribute-based access control mechanism with an auxiliary Trust and Reputation System (TRS) for IoT authorization. The system quantifies trust and reputation scores of each node and incorporates them into the access control mechanism for dynamic and flexible access control. The solution is implemented on a public Rinkeby Ethereum test-network with sensitive information stored on private sidechains for privacy preservation.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2021)

Article Computer Science, Information Systems

An Ultra-Lightweight Mutual Authentication Scheme for Smart Grid Two-Way Communications

Saeed Aghapour et al.

Summary: The utilization of ICT in smart grid improves efficiency and safety, but also introduces security challenges, leading to the need for secure protocols for communication. This paper proposes a super-lightweight secure protocol based on one-way hash functions and XOR operation, providing two-way communication and secure one-time pad key for each data transmission.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

An Accelerated End-to-End Probing Protocol for Narrowband IoT Medical Devices

El Miloud Ar-Reyouchi et al.

Summary: The study proposed an approach for accelerating the probing cycle of NB-IoT medical devices, improving performance parameters such as reducing retransmissions and enhancing network performance in wireless healthcare applications.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

An Efficient Design of Anderson PUF by Utilization of the Xilinx Primitives in the SLICEM

Armin Lotfy et al.

Summary: This study proposes an Anderson PUF FPGA design by optimizing elements to improve performance while decreasing hardware costs.

IEEE ACCESS (2021)

Article Computer Science, Hardware & Architecture

Distributed denial of service attacks and its defenses in IoT: a survey

Mikail Mohammed Salim et al.

JOURNAL OF SUPERCOMPUTING (2020)

Article Computer Science, Hardware & Architecture

An enhanced fuzzy controller based on improved genetic algorithm for speed control of DC motors

A. Lotfy et al.

ANALOG INTEGRATED CIRCUITS AND SIGNAL PROCESSING (2020)

Article Automation & Control Systems

Black Widow Optimization Algorithm: A novel meta-heuristic approach for solving engineering optimization problems

Vahideh Hayyolalam et al.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2020)

Article Automation & Control Systems

An iterated greedy algorithm for the obnoxious p-median problem

Osman Gokalp

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2020)

Article Computer Science, Information Systems

SlowTT: A Slow Denial of Service against IoT Networks

Ivan Vaccari et al.

INFORMATION (2020)

Review Multidisciplinary Sciences

Challenges and opportunities in IoT healthcare systems: a systematic review

Sureshkumar Selvaraj et al.

SN APPLIED SCIENCES (2020)

Article Computer Science, Information Systems

An Ultra-Lightweight and Provably Secure Broadcast Authentication Protocol for Smart Grid Communications

Saeed Aghapour et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks

Named Haddad Pajouh et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2019)

Article Computer Science, Theory & Methods

Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset

Nickolaos Koroniotis et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Interdisciplinary Applications

Improved biogeography-based optimization using migration process adjustment: An approach for location-allocation of ambulances

Mehrdad Kaveh et al.

COMPUTERS & INDUSTRIAL ENGINEERING (2019)

Article Computer Science, Information Systems

A Hybrid Deep Learning-Based Model for Anomaly Detection in Cloud Datacenter Networks

Sahil Garg et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2019)

Review Engineering, Electrical & Electronic

Sensing, Controlling, and IoT Infrastructure in Smart Building: A Review

Anurag Verma et al.

IEEE SENSORS JOURNAL (2019)

Article Computer Science, Information Systems

An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things

Nour Moustafa et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Hardware & Architecture

Design and implementation of a neighborhood search biogeography-based optimization trainer for classifying sonar dataset using multi-layer perceptron neural network

M. Kaveh et al.

ANALOG INTEGRATED CIRCUITS AND SIGNAL PROCESSING (2019)

Review Computer Science, Information Systems

Blockchain for Internet of Things: A Survey

Hong-Ning Dai et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Hardware & Architecture

Current research on Internet of Things (IoT) security: A survey

Mardiana Binti Mohamad Noor et al.

COMPUTER NETWORKS (2019)

Article Computer Science, Information Systems

Network Intrusion Detection for IoT Security Based on Learning Techniques

Nadia Chaabouni et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

A Novel Multimodal-Sequential Approach Based on Multi-View Features for Network Intrusion Detection

Haitao He et al.

IEEE ACCESS (2019)

Article Computer Science, Theory & Methods

On blockchain and its integration with loT. Challenges and opportunities

Ana Reyna et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Engineering, Electrical & Electronic

IoT Security Techniques Based on Machine Learning How do IoT devices use AI to enhance security?

Liang Xiao et al.

IEEE SIGNAL PROCESSING MAGAZINE (2018)

Review Computer Science, Information Systems

Intrusion detection systems for IoT-based smart environments: a survey

Mohamed Faisal Elrawy et al.

JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS (2018)

Article Engineering, Electrical & Electronic

First Mile Challenges for Large-Scale IoT

Ahmed Bader et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Review Computer Science, Hardware & Architecture

A survey of intrusion detection in Internet of Things

Bruno Bogaz Zarpelao et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Artificial Intelligence

An effective intrusion detection framework based on SVM with feature augmentation

Huiwen Wang et al.

KNOWLEDGE-BASED SYSTEMS (2017)

Article Chemistry, Multidisciplinary

Future of IoT Networks: A Survey

Suk Kyu Lee et al.

APPLIED SCIENCES-BASEL (2017)

Article Computer Science, Information Systems

A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks

Chuanlong Yin et al.

IEEE ACCESS (2017)

Article Computer Science, Hardware & Architecture

Design and Deployment of an IoT Application-Oriented Testbed

Laura Belli et al.

COMPUTER (2015)

Article Computer Science, Information Systems

A Survey of Distance and Similarity Measures Used Within Network Intrusion Anomaly Detection

David J. Weller-Fahy et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)

Article Computer Science, Artificial Intelligence

CANN: An intrusion detection system based on combining cluster centers and nearest neighbors

Wei-Chao Lin et al.

KNOWLEDGE-BASED SYSTEMS (2015)

Article Automation & Control Systems

Internet of Things in Industries: A Survey

Li Da Xu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)

Article Computer Science, Artificial Intelligence

A network intrusion detection system based on a Hidden Naive Bayes multiclass classifier

Levent Koc et al.

EXPERT SYSTEMS WITH APPLICATIONS (2012)

Article Computer Science, Information Systems

HMMPayl: An intrusion detection system based on Hidden Markov Models

Davide Ariu et al.

COMPUTERS & SECURITY (2011)

Article Computer Science, Artificial Intelligence

A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms

Joaquin Derrac et al.

SWARM AND EVOLUTIONARY COMPUTATION (2011)

Article Computer Science, Artificial Intelligence

Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods

Mahbod Tavallaee et al.

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS (2010)

Review Computer Science, Artificial Intelligence

Intrusion detection by machine learning: A review

Chih-Fong Tsai et al.

EXPERT SYSTEMS WITH APPLICATIONS (2009)

Article Engineering, Electrical & Electronic

Anomaly detection in IP networks

M Thottan et al.

IEEE TRANSACTIONS ON SIGNAL PROCESSING (2003)