Deep Learning-Based Intrusion Detection Systems For Network Security in IoT System
Abstract
Keywords
Full Text:
PDFReferences
1. Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497–1516. doi: 10.1016/j.adhoc.2012.02.016
2. Weber, R. H. (2010). Internet of Things – New security and privacy challenges. Computer Law & Security Review, 26(1), 23–30. doi: 10.1016/j.clsr.2009.11.008
3. Alam, M., & Khan, I. R. (2022). Cyber-physical attacks and IoT. In Chapman and Hall/CRC eBooks, 79–104. doi: 10.1201/9781003241348-5
4. Sommer, R., & Paxson, V. (2010). Outside the closed world: on using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy, 305–316. doi: 10.1109/sp.2010.25
5. Djergou, A. A., Maleh, Y., & Mounir, S. (2022). Machine Learning Techniques for Intrusion Detection in SDN: A survey. In Lecture notes in networks and systems, 460–473. doi: 10.1007/978-3-030-91738-8_42
6. Dina, A. S., Siddique, A., & Manivannan, D. (2023). A deep learning approach for intrusion detection in the Internet of Things using focal loss function. Internet of Things, 22, 100699. doi: 10.1016/j.iot.2023.100699
7. Bertino, E., & Islam, N. (2017). Botnets and Internet of Things security. Computer, 50(2), 76–79. doi: 10.1109/mc.2017.62
8. Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250–1258. doi: 10.1109/jiot.2017.2694844
9. Wanda, P., & Jie, H. J. (2020). A survey of Intrusion Detection system. International Journal of Informatics and Computation, 1(1), 1. doi: 10.35842/ijicom.v1i1.7
10. Selem, M., Jemili, F., & Korbaa, O. (2024). Deep learning for intrusion detection in IoT networks. Research Square. doi: 10.21203/rs.3.rs-4306367/v1
11. Smys, N. D. S., Basar, N. D. A., & Wang, N. D. H. (2020). Hybrid Intrusion Detection System for Internet of Things (IoT). Journal of ISMAC, 2(4), 190–199. doi: 10.36548/jismac.2020.4.002
12. Haripriya, L., & Jabbar, M. (2018). Role of Machine Learning in Intrusion Detection System: review. 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), 925–929. doi: 10.1109/iceca.2018.8474576
13. Cao, Y., Wang, Z., Ding, H., Zhang, J., & Li, B. (2023). An intrusion detection system based on stacked ensemble learning for IoT network. Computers & Electrical Engineering, 110, 108836. doi: 10.1016/j.compeleceng.2023.108836
14. Zhang, Z., Hamadi, H. A., Damiani, E., Yeun, C. Y., & Taher, F. (2022). Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research. IEEE Access, 10, 93104–93139. doi: 10.1109/access.2022.3204051
Article Metrics
Metrics powered by PLOS ALM
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 Neibo Augustine Olobo, Waliu Adebayo Ayuba, Ayogoke Felix Omojola, Izevbigie Hope Iyobosa, Aderemi Ibraheem Adebayo, Abiamamela Obi-Obuoha, Unuigbokhai Peter Afegbai

This work is licensed under a Creative Commons Attribution 4.0 International License.



