Due the voluminous number of all research articles, please wait for a moment.

Attack prevention in IoT through hybrid optimization mechanism and deep learning framework

date_range 2022
person
Author Regonda Nagaraju (Department of Information Technology, St.Martin's Engineering College, Dhulapally, Secunderabad, 500100, India; Corresponding author.), Jupeth Toriano Pentang (Western Philippines University, Philippines), Shokhjakhon Abdufattokhov (Automatic Control and Computer Engineering Department, Turin Polytechnic University in Tashkent, Tashkent, Uzbekistan), Ricardo Fernando CosioBorda (Universidad Autónoma del Perú, Lima, Peru), N. Mageswari (Department of ECE, Ashoka Women's Engineering College, Kurnool, Andhra Pradesh, India), G. Uganya (Department of ECE, Assistant Professor, Saveetha School of Engineering, SIMATS, Chennai, India)
description
Abstract The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data set, the cybersecurity warning systems index system is first constructed, then the index factors are picked and measured, and finally, the situation evaluation is done.Numerous bio-inspired techniques were used to enhance the productivity of an IDS by lowering the data dimensionality and deleting unnecessary and noisy input. The Grey Wolf Optimization algorithm (GWO) is a developed bio-inspired algorithm that improves the efficacy of the IDS in detecting both regular and abnormal congestion in the network. The smart initialization step integrates the different pre-processing strategies to make sure that informative features are incorporated in the early development stages, has been improved. Researchers pick multi-source material in a big data environment for the identification and verification of index components and present a parallel reduction approach based on the classification significance matrix to decrease data underlying data characteristics. For the simulation of this situation, grey wolf optimization and whale optimization were combined to detect the attack prevention and the deep learning approach was presented. Utilizing system software plagiarism, the TensorFlow deep neural network is intended to classify stolen software. To reduce the noise from the signal and to zoom the significance of each word in the perspective of open-source plagiarism, the tokenization and weighting feature approaches are utilized. Malware specimens have been collected from the Mailing database for testing purposes. The experimental findings show that the suggested technique for measuring cyber security hazards in IoT has superior classification results to existing methods. Hence to detect the attack prevention in IoT process Whale with Grey wolf optimization (WGWO) and deep convolution network is used.
article
DOI 10.1016/j.measen.2022.100431
language
Journal Measurement: Sensors
description
Source DOAJ

Submit your feedback

CARI! has performed crawling, tagging, and other data processing to produce this page. If you find an error or have feedback for this page, please fill out the form below. Thank You.
How to correct
  • Name and Email are required!
  • One of the location fields (prov, district, or sub-district) must be filled in
  • Fields other than those mentioned above are optional

Meta Tags

Source from CARI Engine
Provincies : Bokeo
Cities : May
Districts :
Hazards :
Sub DM Phase : Early Warning,Hazard Assesment,Improve Infrastructure,Improving Lives,Public Education,Saving Life,Vulnerability Assesment
Sub Aspects :

References Articles

Source from Semantic Scholar
A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering
A Cox Proportional-Hazards Model Based on an Improved Aquila Optimizer with Whale Optimization Algorithm Operators
A Modified Grey Wolf Optimization Algorithm for an Intrusion Detection System
A Deep Learning Model for Network Intrusion Detection with Imbalanced Data
A Systematic Review on Machine Learning and Deep Learning Models for Electronic Information Security in Mobile Networks
Efficient Malware Classification by Binary Sequences with One-Dimensional Convolutional Neural Networks
Parameter Extraction of Solar Module Using the Sooty Tern Optimization Algorithm
IMIDS: An Intelligent Intrusion Detection System against Cyber Threats in IoT
Threat Analysis and Distributed Denial of Service (DDoS) Attack Recognition in the Internet of Things (IoT)
Hydrological time series prediction by extreme machine learning and sparrow search algorithm
A multiple learning moth flame optimization algorithm with probability-based chaotic strategy for the parameters estimation of photovoltaic models
Building a Fuzzy Classifier Based on Whale Optimization Algorithm to Detect Network Intrusions
Grey Wolf Optimization Parameter Control for Feature Selection in Anomaly Detection
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks
A Novel Epidemic Model for Wireless Rechargeable Sensor Network Security
LITNET-2020: An Annotated Real-World Network Flow Dataset for Network Intrusion Detection
Mimicking Anti-Viruses with Machine Learning and Entropy Profiles
Intelligent Resource Allocation in Residential Buildings Using Consumer to Fog to Cloud Based Framework
Grey wolf optimizer: a review of recent variants and applications
Whale optimization algorithm for optimal sizing of renewable resources for loss reduction in distribution systems
Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle
Evaluation of machine learning classifiers for mobile malware detection
Grey Wolf Optimizer
BONMIN solver-based coordination of distributed FACTS compensators and distributed generation units in modern distribution networks