Threat Analysis in IOT Network Using Evolutionary Sparse Convolute Network Intrusion Detection System

被引:0
作者
Raheema, Alaa Q. [1 ,2 ]
机构
[1] Univ Technol Baghdad, Civil Engn Dept, Baghdad, Iraq
[2] Univ Technol Baghdad, Civil Engn Dept, Baghdad 10001, Iraq
关键词
Internet of Things (IoT); intrusion threats; distributed denial of services; sparse convolute network; detection system; statistical analysis; SECURITY; INTERNET;
D O I
10.3991/ijoe.v19i03.37571
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Internet of Things (IoT) played a crucial role in various sectors such as automobiles and the logistic tracking medical field because it consists of distributed nodes, servers, and software for effective communication. Although, this IoT paradigm suffered from intrusion threats and attacks that cause secu-rity and privacy issues. Existing intrusion detection techniques fail to maintain reliability against the attacks. Therefore, in this work, IoT intrusion threat has been analyzed by using the sparse convolute network to contest the threats and attacks. The network is trained using sets of intrusion data, characteristics, and suspicious activities, which helps identify and track the attacks, mainly Distrib-uted Denial of Service (DDoS) attacks. Along with this, the network is opti-mized using evolutionary techniques that identify and detect the regular, error, and intrusion attempts under different conditions. The sparse network forms the complex hypotheses evaluated using neurons, and the obtained event stream out-puts are propagated to further hidden layer processes. This process minimizes the intrusion involvement in IoT data transmission. The effective utilization of training patterns in the network classifies the standard and threat patterns suc-cessfully. Then the effectiveness of the system is evaluated using experimental results and discussion.
引用
收藏
页码:18 / 33
页数:16
相关论文
共 46 条
  • [1] Three characteristics of technology competition by IoT-driven digitization
    Ahn, Sang-Jin
    [J]. TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE, 2020, 157
  • [2] Attack and Defense Strategies for Intrusion Detection in Autonomous Distributed IoT Systems
    Al-Hamadi, Hamid
    Chen, Ing-Ray
    Wang, Ding-Chau
    Almashan, Meshal
    [J]. IEEE ACCESS, 2020, 8 : 168994 - 169009
  • [3] A Cyber-Physical System to Detect IoT Security Threats of a Smart Home Heterogeneous Wireless Sensor Node
    Alam Majumder, A. K. M. Jahangir
    Veilleux, Charles B.
    Miller, Jared D.
    [J]. IEEE ACCESS, 2020, 8 : 205989 - 206002
  • [4] Combination of hiding and encryption for data security
    Aljazaery I.A.
    Alrikabi H.T.S.
    Aziz M.R.
    [J]. International Journal of Interactive Mobile Technologies, 2020, 14 (09) : 34 - 47
  • [5] ALRikabi H.T.S., 2021, International Journal of Interactive Mobile Technologies (iJIM), V15, P145, DOI 10.3991/ijim.v15i16.24557
  • [6] Secure Chaos of 5G Wireless Communication System Based on IOT Applications
    ALRikabi, Haider TH. Salim
    Hazim, Hussein Tuama
    [J]. INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2022, 18 (12) : 89 - 105
  • [7] Analysis of the Efficient Energy Prediction for 5G Wireless Communication Technologies
    AlRikabi, Haider Th. Salim
    Alaidi, Abdul Hadi M.
    Abdalrada, Ahmed Shaker
    Abed, Faisal Theyab
    [J]. INTERNATIONAL JOURNAL OF EMERGING TECHNOLOGIES IN LEARNING, 2019, 14 (08) : 23 - 37
  • [8] A Supervised Intrusion Detection System for Smart Home IoT Devices
    Anthi, Eirini
    Williams, Lowri
    Slowinska, Malgorzata
    Theodorakopoulos, George
    Burnap, Pete
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05): : 9042 - 9053
  • [9] Using Game Theory to Address New Security Risks in the IoT
    Antoniou J.
    [J]. EAI/Springer Innovations in Communication and Computing, 2020, : 21 - 42
  • [10] An appraisal of the adoption internet of things (IoT) elements for sustainable construction
    Arowoiya, Victor Adetunji
    Oke, Ayodeji Emmanuel
    Aigbavboa, Clinton Ohis
    Aliu, John
    [J]. JOURNAL OF ENGINEERING DESIGN AND TECHNOLOGY, 2020, 18 (05) : 1193 - 1208