Kartik Tomar, Krishi Bisht, Kshitiz Joshi, R. Katarya
{"title":"Cyber Attack Detection in IoT using Deep Learning Techniques","authors":"Kartik Tomar, Krishi Bisht, Kshitiz Joshi, R. Katarya","doi":"10.1109/ISCON57294.2023.10111990","DOIUrl":null,"url":null,"abstract":"The Internet of things (IoT) consists of millions of digital devices which interact with each other through minimum user interaction. IoT is one of the most rapidly expanding computing sectors; however, it is vulnerable to many attacks. An emerging concern in the Internet of Things (IoT) space is attack and strange placement on the IoT framework. Attacks and dangers on these systems are also growing proportionally because of the expanding IoT foundation usage across all industries. In this paper, a review of previous work is conducted, and several deep learning techniques are proposed for accurately predicting attacks on IoT systems. Injection attacks, Man-in-the-middle attacks, Information gathering, Malware attacks, and DDoS/Dos attacks are such attacks and irregularities that might occur in an IoT framework. Identifying such attacks and malicious traffic is important for the Internet of things (IoT) network to block unwanted traffic and unauthorized access. The Edge-IIoTset Cyber Security Dataset and the VGG16 and VGG19 algorithms are utilized to evaluate the effectiveness of the proposed solution; F1 score, precision, recall, and accuracy are the assessment metrics used.","PeriodicalId":280183,"journal":{"name":"2023 6th International Conference on Information Systems and Computer Networks (ISCON)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 6th International Conference on Information Systems and Computer Networks (ISCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCON57294.2023.10111990","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The Internet of things (IoT) consists of millions of digital devices which interact with each other through minimum user interaction. IoT is one of the most rapidly expanding computing sectors; however, it is vulnerable to many attacks. An emerging concern in the Internet of Things (IoT) space is attack and strange placement on the IoT framework. Attacks and dangers on these systems are also growing proportionally because of the expanding IoT foundation usage across all industries. In this paper, a review of previous work is conducted, and several deep learning techniques are proposed for accurately predicting attacks on IoT systems. Injection attacks, Man-in-the-middle attacks, Information gathering, Malware attacks, and DDoS/Dos attacks are such attacks and irregularities that might occur in an IoT framework. Identifying such attacks and malicious traffic is important for the Internet of things (IoT) network to block unwanted traffic and unauthorized access. The Edge-IIoTset Cyber Security Dataset and the VGG16 and VGG19 algorithms are utilized to evaluate the effectiveness of the proposed solution; F1 score, precision, recall, and accuracy are the assessment metrics used.