Cyber Attack Detection in IoT using Deep Learning Techniques

Kartik Tomar, Krishi Bisht, Kshitiz Joshi, R. Katarya
{"title":"Cyber Attack Detection in IoT using Deep Learning Techniques","authors":"Kartik Tomar, Krishi Bisht, Kshitiz Joshi, R. Katarya","doi":"10.1109/ISCON57294.2023.10111990","DOIUrl":null,"url":null,"abstract":"The Internet of things (IoT) consists of millions of digital devices which interact with each other through minimum user interaction. IoT is one of the most rapidly expanding computing sectors; however, it is vulnerable to many attacks. An emerging concern in the Internet of Things (IoT) space is attack and strange placement on the IoT framework. Attacks and dangers on these systems are also growing proportionally because of the expanding IoT foundation usage across all industries. In this paper, a review of previous work is conducted, and several deep learning techniques are proposed for accurately predicting attacks on IoT systems. Injection attacks, Man-in-the-middle attacks, Information gathering, Malware attacks, and DDoS/Dos attacks are such attacks and irregularities that might occur in an IoT framework. Identifying such attacks and malicious traffic is important for the Internet of things (IoT) network to block unwanted traffic and unauthorized access. The Edge-IIoTset Cyber Security Dataset and the VGG16 and VGG19 algorithms are utilized to evaluate the effectiveness of the proposed solution; F1 score, precision, recall, and accuracy are the assessment metrics used.","PeriodicalId":280183,"journal":{"name":"2023 6th International Conference on Information Systems and Computer Networks (ISCON)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 6th International Conference on Information Systems and Computer Networks (ISCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCON57294.2023.10111990","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The Internet of things (IoT) consists of millions of digital devices which interact with each other through minimum user interaction. IoT is one of the most rapidly expanding computing sectors; however, it is vulnerable to many attacks. An emerging concern in the Internet of Things (IoT) space is attack and strange placement on the IoT framework. Attacks and dangers on these systems are also growing proportionally because of the expanding IoT foundation usage across all industries. In this paper, a review of previous work is conducted, and several deep learning techniques are proposed for accurately predicting attacks on IoT systems. Injection attacks, Man-in-the-middle attacks, Information gathering, Malware attacks, and DDoS/Dos attacks are such attacks and irregularities that might occur in an IoT framework. Identifying such attacks and malicious traffic is important for the Internet of things (IoT) network to block unwanted traffic and unauthorized access. The Edge-IIoTset Cyber Security Dataset and the VGG16 and VGG19 algorithms are utilized to evaluate the effectiveness of the proposed solution; F1 score, precision, recall, and accuracy are the assessment metrics used.
使用深度学习技术检测物联网中的网络攻击
物联网(IoT)由数百万个数字设备组成,这些设备通过最少的用户交互相互作用。物联网是发展最快的计算领域之一;然而,它很容易受到许多攻击。物联网(IoT)领域的一个新问题是攻击和物联网框架上的奇怪位置。由于所有行业的物联网基础使用不断扩大,对这些系统的攻击和危险也在成比例地增长。在本文中,对先前的工作进行了回顾,并提出了几种深度学习技术来准确预测对物联网系统的攻击。注入攻击、中间人攻击、信息收集攻击、恶意软件攻击和DDoS/Dos攻击是物联网框架中可能发生的攻击和违规行为。识别此类攻击和恶意流量对于物联网(IoT)网络阻止不必要的流量和未经授权的访问非常重要。利用Edge-IIoTset网络安全数据集和VGG16和VGG19算法评估了该方案的有效性;F1分数、精度、召回率和准确性是所使用的评估指标。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信