Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Internet Of Things Intrusion Detection Based on Deep Learning

View through CrossRef
The fast-growing Internet of Things (IoT) has exposed more attack vectors of the connected devices and heightened the necessity of effective intrusion detection systems (IDS). Nevertheless, the three main challenges that still limit the practical use of IoT intrusion detection include the high complexity of models that are only runnable on resource-constrained devices, low generalization in the presence of small and unbalanced labelling, and the lack of privacy-concerning collaborative detection systems among heterogeneous settings. Here, it is possible to identify a multi-stage research program based on three complementary frameworks that consolidate these challenges in this paper. The main shortcoming of the paper is that the authors first propose lightweight intrusion detection model, LIIDXC, to describe binary XNOR-based convolution of a two-layer long short-term memory (LSTM) and entropy-guided feature selection with a focus on computational overhead reduction without losing detection power. Second, a superior framework of transfer learning, EMTD-SSC, combines a residual convolutional autoencoder, multilayer multi-kernel maximum mean discrepancy (MLMK-MMD) along with fine-tuning techniques to enhance cross-domain transfer when the sample size is small. Third, a federated contrastive learning framework, ID-CFL, enables collaborative intrusion detection without raw data sharing and improves robustness under non-IID client distributions by adaptive node-correlation aggregation. Experiments on N-BaIoT, CIC-DDoS2019, IoT-23, ToN-IoT, and BoT-IoT demonstrate that LIIDXC achieves 87.4% accuracy with approximately fivefold training acceleration, EMTD-SSC reaches up to 94.8% accuracy and maintains 82.8% accuracy with only 100 samples per class, and ID-CFL attains 84.79% average personalized local-client accuracy while improving non-IID collaborative detection performance by up to 38% relative to conventional federated baselines. Taken together, the results show that lightweight computation, cross-domain knowledge transfer, and privacy-preserving distributed learning can be integrated into a coherent IoT IDS research agenda that is efficient, robust, and scalable.
Title: Internet Of Things Intrusion Detection Based on Deep Learning
Description:
The fast-growing Internet of Things (IoT) has exposed more attack vectors of the connected devices and heightened the necessity of effective intrusion detection systems (IDS).
Nevertheless, the three main challenges that still limit the practical use of IoT intrusion detection include the high complexity of models that are only runnable on resource-constrained devices, low generalization in the presence of small and unbalanced labelling, and the lack of privacy-concerning collaborative detection systems among heterogeneous settings.
Here, it is possible to identify a multi-stage research program based on three complementary frameworks that consolidate these challenges in this paper.
The main shortcoming of the paper is that the authors first propose lightweight intrusion detection model, LIIDXC, to describe binary XNOR-based convolution of a two-layer long short-term memory (LSTM) and entropy-guided feature selection with a focus on computational overhead reduction without losing detection power.
Second, a superior framework of transfer learning, EMTD-SSC, combines a residual convolutional autoencoder, multilayer multi-kernel maximum mean discrepancy (MLMK-MMD) along with fine-tuning techniques to enhance cross-domain transfer when the sample size is small.
Third, a federated contrastive learning framework, ID-CFL, enables collaborative intrusion detection without raw data sharing and improves robustness under non-IID client distributions by adaptive node-correlation aggregation.
Experiments on N-BaIoT, CIC-DDoS2019, IoT-23, ToN-IoT, and BoT-IoT demonstrate that LIIDXC achieves 87.
4% accuracy with approximately fivefold training acceleration, EMTD-SSC reaches up to 94.
8% accuracy and maintains 82.
8% accuracy with only 100 samples per class, and ID-CFL attains 84.
79% average personalized local-client accuracy while improving non-IID collaborative detection performance by up to 38% relative to conventional federated baselines.
Taken together, the results show that lightweight computation, cross-domain knowledge transfer, and privacy-preserving distributed learning can be integrated into a coherent IoT IDS research agenda that is efficient, robust, and scalable.

Related Results

CREATING LEARNING MEDIA IN TEACHING ENGLISH AT SMP MUHAMMADIYAH 2 PAGELARAN ACADEMIC YEAR 2020/2021
CREATING LEARNING MEDIA IN TEACHING ENGLISH AT SMP MUHAMMADIYAH 2 PAGELARAN ACADEMIC YEAR 2020/2021
The pandemic Covid-19 currently demands teachers to be able to use technology in teaching and learning process. But in reality there are still many teachers who have not been able ...
Development and application of biological intelligence technology in computer
Development and application of biological intelligence technology in computer
To study the development and application of biological intelligence technology in computers and realize high-precision network anomaly detection, a distributed intrusion detection ...
Reflections Of Zoltan P. Dienes On Mathematics Education
Reflections Of Zoltan P. Dienes On Mathematics Education
The name of Zoltan P. Dienes (1916- ) stands with those ofJean Piaget, Jerome Bruner, Edward Begle, and Robert Davis as legendary figures whose work left a lasting impression on th...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC
MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC
Intrusion detection plays a pivotal aspect in providing security for the information and the main technology lies in identifying different networks in an accurate as well as precis...
Network intrusion detection using ensemble weighted voting classifier based honeypot framework
Network intrusion detection using ensemble weighted voting classifier based honeypot framework
<p>The Internet of Things (IoT) is a new model that connects physical objects and the Internet and has become one of the most important technological developments in computin...
Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
BACKGROUND As of July 2020, a Web of Science search of “machine learning (ML)” nested within the search of “pharmacokinetics or pharmacodynamics” yielded over 100...
Enhancement of an IoT hybrid intrusion detection system based on fog-to-cloud computing
Enhancement of an IoT hybrid intrusion detection system based on fog-to-cloud computing
AbstractNowadays, with the proliferation of internet of things-connected devices, the scope of cyber-attacks on the internet of things has grown exponentially. So, it makes it a ne...

Back to Top