• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Qureshi, Sirajuddin (Qureshi, Sirajuddin.) | He, Jingsha (He, Jingsha.) | Tunio, Saima (Tunio, Saima.) | Zhu, Nafei (Zhu, Nafei.) | Ullah, Faheem (Ullah, Faheem.) | Nazir, Ahsan (Nazir, Ahsan.) | Wajahat, Ahsan (Wajahat, Ahsan.)

Indexed by:

EI

Abstract:

The extensive implementation of the Internet of Things (IoT) is vulnerable to security and privacy factors due to the increased use of Internet-enabled devices. The data without interaction between Human-to-Human or Human-to-Computer are shared by the IoT-enabled devices that create an intelligent system of systems. The data capable of transforming the lives of humans, businesses, and the universe are extracted by the IoT systems. But in a highly hostile environment such as the Internet, there are possibilities of an end number of cyber-attacks. For everyone, including consumers, firms, and Government Organizations, the primary concern is to protect IoT. However, the protection of the systems is ineffective due to the complication in the real-time detection of the attacks. In contrast, the complete prevention of attacks on any procedure does not exist forever. The research on competent Deep Learning based Intrusion Detection and Preventions Systems (DL-IDPS) conducive to IoT environments exists in limited numbers. IDPS has been offered numerous DL-based models in recent years. An analogy of specific deep autoencoding models and conventional IDS and NIDS datasets has been proposed in this research paper. Multi-Layer Architecture-IoT security, the Artificial Neural Networks (ANNs) are deployed for this IoT research. Each layer in the designed architecture has been assessed with ANNs of DL on the KDD Cup ’99 detection of intrusion data set. The present technique’s performance results over the KDD Cup ’99 dataset are outperformed by this innovative research with 97.77% accuracy and 0.71% FAR. © 2022,International Journal of Network Security. All Rights Reserved.

Keyword:

Intrusion detection Human computer interaction Cybersecurity Deep learning Metadata Network architecture Network security Neural networks Internet of things Intelligent systems Real time systems

Author Community:

  • [ 1 ] [Qureshi, Sirajuddin]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 2 ] [He, Jingsha]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 3 ] [Tunio, Saima]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 4 ] [Zhu, Nafei]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 5 ] [Ullah, Faheem]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 6 ] [Nazir, Ahsan]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 7 ] [Wajahat, Ahsan]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China

Reprint Author's Address:

Email:

Show more details

Related Keywords:

Source :

International Journal of Network Security

ISSN: 1816-353X

Year: 2022

Issue: 5

Volume: 24

Page: 815-827

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 10

Affiliated Colleges:

Online/Total:568/10591592
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.