Abstract

The technological advancement realized in the discovery and embrace of both IoT and IIoT is totally indispensable. Many systems and subsystems both robust and miniaturized have made their existence into the technical arena due to IoT. It goes without saying that IoT has brought into light very diverse benefits that cut across universal applications.However, the pre-requisite of a network channel existence for an IoT operation to be successful is the only pitfall that this essentially unique system possesses. There is a significant amount of danger associated with transmission networks. They have very substantial susceptibility to both online and offline threats by malicious cyber intentions.This paper focuses on the analyses of the threats posed to these IoT networks through Artificial Neural Networks. Specifically, a model is trained through recurrent and convolutional neural network to do intensive analysis on the threat intensity, type and threat source for data logging purposes. The Intruder detection system (IDS) explored in this paper registers a success rate of 99% based on the empirical data posed to the model.

Highlights

  • The rise in the potential threats of network-imposed activities such as IOT and IIOT has prompted several studies in the field of IDS (Intruder detection systems) (Ahsan, M., 2020)

  • Models have been trained to analyses empirical data used in the study of IDS (Ivanov, A., 2017)

  • The RNN and CNN artificial neural algorithm used in this situation is used to specify the type of the threat that is supposedly imposed on the network

Read more

Summary

Introduction

The rise in the potential threats of network-imposed activities such as IOT and IIOT has prompted several studies in the field of IDS (Intruder detection systems) (Ahsan, M., 2020). The intelligent system developed has relational convolution with existing models and the data commonly used is KDD dataset which was developed in 1998 for study of threat analysis This era has seen various trained models producing very substantial output in network protection from intrusion. Day in day out various advancements and adjustments occur in the network configuration protocols in the effort to enhance it but in the real sense there is a disadvantage of weakening the protocols with or without knowledge Intrusions such as malware commonly take advantage of very tiny changes made to the original bedrock development codes that have been built as the basis of running and maintaining the networks. The method proposed in this paper is essentially to analyses the threats and follow up steps can be taken to make the full model responsive to the incoming threats

Threat Analysis
Results and Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call