Samriddha Adikari, Jinfeng Su, Kamini (Simi) Bajaj,
{"title":"回顾使用深度学习对物联网设备攻击的网络取证分析优化","authors":"Samriddha Adikari, Jinfeng Su, Kamini (Simi) Bajaj,","doi":"10.1109/citisia53721.2021.9719982","DOIUrl":null,"url":null,"abstract":"The growth in the number of systems based on Internet of Things (IoT), real-time service and automation that can be provided to users is enormous in the last decade. One of the major obstacles in securing IoT based network is tracking and tracing cyber-attack events and their sources. The aim of this study is to analyze current research on deep learning-based network forensic optimization techniques using secondary research. Major findings are that deep learning technology can effectively identify attacks during data communication in IoT systems than the state-of-the-art methods. In this study, major components of the systems proposed by researchers were identified, presented in a table format and classified based on methodology which revealed that deep learning technology can identify attacks in IoT devices.","PeriodicalId":252063,"journal":{"name":"2021 6th International Conference on Innovative Technology in Intelligent System and Industrial Applications (CITISIA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Review of network-forensic analysis optimization using deep learning against attacks on IoT devices\",\"authors\":\"Samriddha Adikari, Jinfeng Su, Kamini (Simi) Bajaj,\",\"doi\":\"10.1109/citisia53721.2021.9719982\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The growth in the number of systems based on Internet of Things (IoT), real-time service and automation that can be provided to users is enormous in the last decade. One of the major obstacles in securing IoT based network is tracking and tracing cyber-attack events and their sources. The aim of this study is to analyze current research on deep learning-based network forensic optimization techniques using secondary research. Major findings are that deep learning technology can effectively identify attacks during data communication in IoT systems than the state-of-the-art methods. In this study, major components of the systems proposed by researchers were identified, presented in a table format and classified based on methodology which revealed that deep learning technology can identify attacks in IoT devices.\",\"PeriodicalId\":252063,\"journal\":{\"name\":\"2021 6th International Conference on Innovative Technology in Intelligent System and Industrial Applications (CITISIA)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 6th International Conference on Innovative Technology in Intelligent System and Industrial Applications (CITISIA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/citisia53721.2021.9719982\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 6th International Conference on Innovative Technology in Intelligent System and Industrial Applications (CITISIA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/citisia53721.2021.9719982","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Review of network-forensic analysis optimization using deep learning against attacks on IoT devices
The growth in the number of systems based on Internet of Things (IoT), real-time service and automation that can be provided to users is enormous in the last decade. One of the major obstacles in securing IoT based network is tracking and tracing cyber-attack events and their sources. The aim of this study is to analyze current research on deep learning-based network forensic optimization techniques using secondary research. Major findings are that deep learning technology can effectively identify attacks during data communication in IoT systems than the state-of-the-art methods. In this study, major components of the systems proposed by researchers were identified, presented in a table format and classified based on methodology which revealed that deep learning technology can identify attacks in IoT devices.