Abstract

The Internet of Things (IoT) plays a crucial role in various sectors such as automobiles and the logistic tracking medical field because it consists of distributed nodes, servers, and software for effective communication. Although this IoT paradigm has suffered from intrusion threats and attacks that cause security and privacy issues, existing intrusion detection techniques fail to maintain reliability against the attacks. Therefore, the IoT intrusion threat has been analyzed using the sparse convolute network to contest the threats and attacks. The web is trained using sets of intrusion data, characteristics, and suspicious activities, which helps identify and track the attacks, mainly, Distributed Denial of Service (DDoS) attacks. Along with this, the network is optimized using evolutionary techniques that identify and detect the regular, error, and intrusion attempts under different conditions. The sparse network forms the complex hypotheses evaluated using neurons, and the obtained event stream outputs are propagated to further hidden layer processes. This process minimizes the intrusion involvement in IoT data transmission. Effective utilization of training patterns in the network successfully classifies the standard and threat patterns. Then, the effectiveness of the system is evaluated using experimental results and discussion. Network intrusion detection systems are superior to other types of traditional network defense in providing network security. The research applied an IGA-BP network to combat the growing challenge of Internet security in the big data era, using an autoencoder network model and an improved genetic algorithm to detect intrusions. MATLAB built it, which ensures a 98.98% detection rate and 99.29% accuracy with minimal processing complexity, and the performance ratio is 90.26%. A meta-heuristic optimizer was used in the future to increase the system’s ability to forecast attacks.

Highlights

  • The Internet of Things (IoT) [1] has a collection of network devices that are interconnected via near-field communication (NFC), Bluetooth, and Wi-Fi connections [2]

  • The results demonstrate that recurrent architectures based on wavelets outperform their counterparts in terms of attack detection and classification and in terms of overall performance

  • This paper focuses on Distributed Denial of Service (DDoS) by applying Bayesian network models with incomplete data

Read more

Summary

Introduction

The Internet of Things (IoT) [1] has a collection of network devices that are interconnected via near-field communication (NFC), Bluetooth, and Wi-Fi connections [2]. [3,4] These IoT devices utilize the Internet Protocol (IP) to transmit the information from source to destination. This IP protocol identifies the computer to allow fast communication without requiring human intervention. Every IoT device has specific characteristics [5], such as large data gathering, physical and virtual environment connection, complex environment creation, centralized architecture. These characteristics enable the IoT to function efficiently, but it causes threat actors abuse in communication

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call