Cyber Security Intrusion Detection and Bot Data Collection using Deep Learning in the IoT

被引:0
作者
Alotaibi, Fahad Ali [1 ]
Mishra, Shailendra [2 ]
机构
[1] Majmaah Univ, Dept Informat Technol, Al Majmaah, Saudi Arabia
[2] Majmaah Univ, Dept Comp Engn, Al Majmaah, Saudi Arabia
关键词
Internet of things; intrusion detection system; random neural networks; feed forward neural networks; convolutional neural networks; INTERNET; THINGS;
D O I
10.14569/IJACSA.2024.0150343
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the digital age, cybersecurity is a growing concern, especially as IoT continues to grow rapidly. Cybersecurity intrusion detection systems are critical in protecting IoT environments from malicious activity. Deep learning approaches have emerged as promising intrusion detection techniques due to their ability to automatically learn complex patterns and features from large-scale data sets. In this research, we give a detailed assessment of the use of deep learning algorithms for cybersecurity intrusion detection in IoT contexts. The study discusses the challenges of securing IoT systems, such as device heterogeneity, limited computational resources, and the dynamic nature of IoT networks. To detect intrusions in IoT environments, convolutional neural networks (CNNs) and recurrent neural networks (RNNs) have been used. The NF-UQ-NIDS and NF-Bot-IoT data sets are used for training and assessing deep learning-based intrusion detection systems. Our study also explores using deep learning approaches to identify botnets in IoT settings to counter the growing threat of botnets. Also, analyze representative bot data sets and explain their significance in understanding botnet behavior and effective defenses. The study evaluated IDS performance and traffic flow in the IoT context using various machine learning algorithms. For IoT environments, the results highlight the importance of selecting appropriate algorithms and employing effective data pre-processing techniques to improve accuracy and performance. Cyber-attack detection with the proposed system is highly accurate when compared with other algorithms for both NF-UQ-NIDS and NF-BoT-IoT data sets.
引用
收藏
页码:421 / 432
页数:12
相关论文
共 33 条
[1]   Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review [J].
Abdullahi, Mujaheed ;
Baashar, Yahia ;
Alhussian, Hitham ;
Alwadain, Ayed ;
Aziz, Norshakirah ;
Capretz, Luiz Fernando ;
Abdulkadir, Said Jadid .
ELECTRONICS, 2022, 11 (02)
[2]   Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: a survey [J].
Ali, Saqib ;
Li, Qianmu ;
Yousafzai, Abdullah .
AD HOC NETWORKS, 2024, 152
[3]   Toward Improved Machine Learning-Based Intrusion Detection for Internet of Things Traffic [J].
Alkadi, Sarah ;
Al-Ahmadi, Saad ;
Ben Ismail, Mohamed Maher .
COMPUTERS, 2023, 12 (08)
[4]   A Deep Learning Methodology for Predicting Cybersecurity Attacks on the Internet of Things [J].
Alkhudaydi, Omar Azib ;
Krichen, Moez ;
Alghamdi, Ans D. .
INFORMATION, 2023, 14 (10)
[5]   An Intrusion Detection System Using BoT-IoT [J].
Alosaimi, Shema ;
Almutairi, Saad M. .
APPLIED SCIENCES-BASEL, 2023, 13 (09)
[6]  
[Anonymous], NF-UQ-NIDS-v2-UQ eSpace
[7]   A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions [J].
Asharf, Javedz ;
Moustafa, Nour ;
Khurshid, Hasnat ;
Debie, Essam ;
Haider, Waqas ;
Wahab, Abdul .
ELECTRONICS, 2020, 9 (07)
[8]   Enhancing IoT network security through deep learning-powered Intrusion Detection System [J].
Bakhsh, Shahid Allah ;
Khan, Muhammad Almas ;
Ahmed, Fawad ;
Alshehri, Mohammed S. ;
Ali, Hisham ;
Ahmad, Jawad .
INTERNET OF THINGS, 2023, 24
[9]   Machine-Learning-Based Vulnerability Detection and Classification in Internet of Things Device Security [J].
Bin Hulayyil, Sarah ;
Li, Shancang ;
Xu, Lida .
ELECTRONICS, 2023, 12 (18)
[10]   Network Intrusion Detection for IoT Security Based on Learning Techniques [J].
Chaabouni, Nadia ;
Mosbah, Mohamed ;
Zemmari, Akka ;
Sauvignac, Cyrille ;
Faruki, Parvez .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03) :2671-2701