Abstract
Telecommunication networks are growing exponentially due to their significant role in civilization and industry. As a result of this very significant role, diverse applications have been appeared, which require secured links for data transmission. However, Internet-of-Things (IoT) devices are a substantial field that utilizes the wireless communication infrastructure. However, the IoT, besides the diversity of communications, are more vulnerable to attacks due to the physical distribution in real world. Attackers may prevent the services from running or even forward all of the critical data across the network. That is, an Intrusion Detection System (IDS) has to be integrated into the communication networks. In the literature, there are numerous methodologies to implement the IDSs. In this paper, two distinct models are proposed. In the first model, a custom Convolutional Neural Network (CNN) was constructed and combined with Long Short Term Memory (LSTM) deep network layers. The second model was built about the all fully connected layers (dense layers) to construct an Artificial Neural Network (ANN). Thus, the second model, which is a custom of an ANN layers with various dimensions, is proposed. Results were outstanding a compared to the Logistic Regression algorithm (LR), where an accuracy of 97.01% was obtained in the second model and 96.08% in the first model, compared to the LR algorithm, which showed an accuracy of 92.8%.
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference51 articles.
1. IoT Connections to Reach 83 Billion by 2024, Driven by Maturing Industrial Use Cases;Smith;Accessed Apr.,2020
2. Intrusion Detection in Industrial Internet of Things Network-Based on Deep Learning Model with Rule-Based Feature Selection;Awotunde;Wirel. Commun. Mob. Comput.,2021
3. Wazzan, M., Algazzawi, D., Albeshri, A., Hasan, S., Rabie, O., and Asghar, M.Z. (2022). Cross Deep Learning Method for Effectively Detecting the Propagation of IoT Botnet. Sensors, 22.
4. A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments;Li;Energy Rep.,2021
5. A deep learning method with wrapper based feature extraction for wireless intrusion detection system;Kasongo;Comput. Secur.,2020
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献