The proposed hybrid deep learning intrusion prediction IoT (HDLIP-IoT) framework

Author:

Fadel Magdy M.ORCID,El-Ghamrawy Sally M.,Ali-Eldin Amr M. T.,Hassan Mohammed K.,El-Desoky Ali I.

Abstract

Throughout the past few years, the Internet of Things (IoT) has grown in popularity because of its ease of use and flexibility. Cyber criminals are interested in IoT because it offers a variety of benefits for users, but it still poses many types of threats. The most common form of attack against IoT is Distributed Denial of Service (DDoS). The growth of preventive processes against DDoS attacks has prompted IoT professionals and security experts to focus on this topic. Due to the increasing prevalence of DDoS attacks, some methods for distinguishing different types of DDoS attacks based on individual network features have become hard to implement. Additionally, monitoring traffic pattern changes and detecting DDoS attacks with accuracy are urgent and necessary. In this paper, using Modified Whale Optimization Algorithm (MWOA) feature extraction and Hybrid Long Short Term Memory (LSTM), shown that DDoS attack detection methods can be developed and tested on various datasets. The MWOA technique, which is used to optimize the weights of the LSTM neural network to reduce prediction errors in the hybrid LSTM algorithm, is used. Additionally, MWOA can optimally extract IP packet features and identify DDoS attacks with the support of MWOA-LSTM model. The proposed MWOA-LSTM framework outperforms standard support vector machines (SVM) and Genetic Algorithm (GA) as well as standard methods for detecting attacks based on precision, recall and accuracy measurements.

Publisher

Public Library of Science (PLoS)

Subject

Multidisciplinary

Reference46 articles.

1. A, "Survey of IoT-enabled cyberattacks Assessing attack paths to critical infrastructures and services";I. Stellions;IEEE Communications Surveys and Tutorials,2018

2. Praveen Kumar Donta, Satish Narayana Srirama, Tarachand Amgoth, and Chandra Sekhara Rao Annavarapu, "Survey on recent advances in IoT application layer protocols and machine learning scope for research directions", Digital Communications and Networks, 2021.

3. DDoS-Capable IoT Malwares Comparitive Analysis and Mirai Investigation;M. De Donno;Security and Communication Networks,2018

4. Khalaf, Bashar Ahmed, Salama A. Mostafa, Aida Mustapha, and Noryusliza Abdullah, "An Adaptive Model for Detection and Prevention of DDoS and Flash Crowd Flooding Attacks", International Symposium on Agent, Multi-Agent Systems and Robotics (ISAMSR) IEEE, 1–6, 2018.

5. A novel DoS and DDoS attacks detection algorithm using ARIMA time series model and chaotic system in computer networks;Seyyed Meysam Tabatabaie Nezhad;IEEE Commun. Lett,2016

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3