Abstract
Cyberattacks have increased as a consequence of the expansion of the Internet of Things (IoT). It is necessary to detect anomalies so that smart devices need to be protected from these attacks, which must be mitigated at the edge of the IoT network. Therefore, efficient detection depends on the selection of an optimal IoT traffic feature set and the learning algorithm that classifies the IoT traffic. There is a flaw in the existing anomaly detection systems because the feature selection algorithms do not identify the most appropriate set of features. In this article, a layered paddy crop optimization (LPCO) algorithm is suggested to choose the optimal set of features. Furthermore, the use of smart devices generates tremendous traffic, which can be labelled as either normal or attack using a capsule network (CN) approach. Five network traffic benchmark datasets are utilized to evaluate the proposed approach, including NSL KDD, UNSW NB, CICIDS, CSE-CIC-IDS, and UNSW Bot-IoT. Based on the experiments, the presented approach yields assuring results in comparison with the existing base classifiers and feature selection approaches. Comparatively, the proposed strategy performs better than the current state-of-the-art approaches.
Reference47 articles.
1. Identification of Attack Traffic Using Machine Learning in Smart IoT Networks;Shafiq;Secur. Commun. Netw.,2022
2. Malhotra, P., Singh, Y., Anand, P., Bangotra, D.K., Singh, P.K., and Hong, W.C. (2021). Internet of things: Evolution, concerns and security challenges. Sensors, 21.
3. Anomaly detection framework for Internet of things traffic using vector convolutional deep learning approach in fog environment;NG;Future Gener. Comput. Syst.,2020
4. Dhelim, S., Aung, N., Kechadi, T., Ning, H., Chen, L., and Lakas, A. (2022). Trust2Vec: Large-Scale IoT Trust Management System based on Signed Network Embeddings. IEEE Internet Things J.
5. (2022, September 30). IoT Market Forecast. Available online: https://www.iotforall.com/state-of-iot-2022.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献