Identify malicious traffic on IoT infrastructure using neural networks and deep learning
Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 2
Abstract
The Internet of Things is a network of physical devices and equipment that includes sensors, software, and other technologies for exchanging data with other devices and systems over the Internet. The spread of the Internet of Things in the fields of smart health, smart agriculture, smart city, smart home, has revolutionized human life. Given the importance of the Internet of Things, identifying anomalies and malicious traffic is essential to maintaining privacy, network stability, and blocking unwanted behaviors. Due to the limited resources on IoT devices, traditional methods cannot be used directly to secure IoT devices and networks. To solve this problem, an artificial neural network-based identification method and in-depth learning has been developed to identify malformations and malicious traffic about which there is no predefined information. The data set used in this method is a combination of malicious and healthy traffic collected from related sources and feature extraction manually. Deep artificial neural network was applied to the data set and preprocessed and the results were analyzed with some conventional machine learning algorithms. The results show that the model designed using neural network and deep learning is able to detect anomalies and malicious traffic in the Internet of Things with an accuracy rate of more than 98.9% and an accuracy rate of 99.3%. In addition, the detection speed is 1.7 times faster than machine learning algorithms.
Authors and Affiliations
hamid tanha, mostafa abbasi
Mobile botnets detection using deep learning techniques
Smartphones are now well integrated with advanced capabilities and technologies such as the Internet. Today, due to the facilities and capabilities and the widespread use of smart mobile devices, mobile security has beco...
Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning
Nowadays, detecting unusual events in the network has been the subject of many researches. Network traffic is huge and very large, and this leads to high data size and increased noise, which makes it very difficult to ex...
Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV
This paper proposes the use of a trusted decoder and forward (DF) Unmanned Aerial Vehicle (UAV) relay to establish a covert communication between a terrestrial transmitter (Alice) and a receiver (Bob), which is located i...
Investigating The Effect of Social Engineering Techniques on Employees Vulnerability(Case study: Tehran Municipality Employees)
Social engineering is the art of deceiving people in a way that no use of force and threat, something to do or provide that information to social engineer . Social engineering can follow self-interest or organizational o...
Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications
Nowadays, Android-based devices such as smart phones, tablets, and recently virtual reality headsets have found increasing usage in our daily lives. Along with the development of software for these devices, new malicious...