Journal
INFORMATION
Volume 13, Issue 12, Pages -Publisher
MDPI
DOI: 10.3390/info13120587
Keywords
anomaly detection; capsule network; feature selection; paddy crop optimization; IoT edge
Categories
Ask authors/readers for more resources
This article suggests a method for anomaly detection in IoT networks to protect smart devices from cyberattacks. By selecting an optimal set of IoT traffic features and using a learning algorithm for classification, efficient detection at the edge of the IoT network can be achieved. The proposed approach utilizes a layered paddy crop optimization algorithm for feature selection and employs a capsule network for labeling traffic as normal or attack. The experimental results demonstrate the effectiveness of the proposed strategy, outperforming existing base classifiers and feature selection approaches.
Cyberattacks have increased as a consequence of the expansion of the Internet of Things (IoT). It is necessary to detect anomalies so that smart devices need to be protected from these attacks, which must be mitigated at the edge of the IoT network. Therefore, efficient detection depends on the selection of an optimal IoT traffic feature set and the learning algorithm that classifies the IoT traffic. There is a flaw in the existing anomaly detection systems because the feature selection algorithms do not identify the most appropriate set of features. In this article, a layered paddy crop optimization (LPCO) algorithm is suggested to choose the optimal set of features. Furthermore, the use of smart devices generates tremendous traffic, which can be labelled as either normal or attack using a capsule network (CN) approach. Five network traffic benchmark datasets are utilized to evaluate the proposed approach, including NSL KDD, UNSW NB, CICIDS, CSE-CIC-IDS, and UNSW Bot-IoT. Based on the experiments, the presented approach yields assuring results in comparison with the existing base classifiers and feature selection approaches. Comparatively, the proposed strategy performs better than the current state-of-the-art approaches.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available