Identify malicious traffic on IoT infrastructure using neural networks and deep learning
Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 2
Abstract
The Internet of Things is a network of physical devices and equipment that includes sensors, software, and other technologies for exchanging data with other devices and systems over the Internet. The spread of the Internet of Things in the fields of smart health, smart agriculture, smart city, smart home, has revolutionized human life. Given the importance of the Internet of Things, identifying anomalies and malicious traffic is essential to maintaining privacy, network stability, and blocking unwanted behaviors. Due to the limited resources on IoT devices, traditional methods cannot be used directly to secure IoT devices and networks. To solve this problem, an artificial neural network-based identification method and in-depth learning has been developed to identify malformations and malicious traffic about which there is no predefined information. The data set used in this method is a combination of malicious and healthy traffic collected from related sources and feature extraction manually. Deep artificial neural network was applied to the data set and preprocessed and the results were analyzed with some conventional machine learning algorithms. The results show that the model designed using neural network and deep learning is able to detect anomalies and malicious traffic in the Internet of Things with an accuracy rate of more than 98.9% and an accuracy rate of 99.3%. In addition, the detection speed is 1.7 times faster than machine learning algorithms.
Authors and Affiliations
hamid tanha, mostafa abbasi
Improve the detection of dangerous objects in x-ray images in security and military inspections using image processing approaches
Detection of dangerous objects in images obtained by X-ray scanners in security inspections has played an important role in protecting the public space from security threats such as terrorism and the occurrence of danger...
Analysis of exchange market disruptors using graph-based social network analysis
Today, increasing the science and technology and the communication technologies, especially in cyberspace, however physically act have become interact with cyberspace has caused a more significant effect on the culture a...
Investigating The Effect of Social Engineering Techniques on Employees Vulnerability(Case study: Tehran Municipality Employees)
Social engineering is the art of deceiving people in a way that no use of force and threat, something to do or provide that information to social engineer . Social engineering can follow self-interest or organizational o...
Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks
Accurate timing is one of the key features of the Global Positioning System (GPS), which is employed in many critical infrastructures. Any imprecise time measurement in GPS-based structures, such as smart power grids, an...
An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks
In today's digital era, security issues and cyber attacks have become a serious and attention-needed concern as they hamper secured and vital information relating to organizations or individuals. Accordingly, timely dete...