使用卷积神经网络、长短期记忆和门控循环单元的物联网威胁检测

Naomi A. Bajao, Jae-an Sarucam
{"title":"使用卷积神经网络、长短期记忆和门控循环单元的物联网威胁检测","authors":"Naomi A. Bajao, Jae-an Sarucam","doi":"10.58496/mjcs/2023/005","DOIUrl":null,"url":null,"abstract":"Security for IoT gadgets is an undertaking that has been made more troublesome by the far-reaching utilization of network safety in different applications, including wise modern frameworks, homes, individual devices, and vehicles. The fact that has been introduced makes deep learning for interruption recognition one productive security method. I thought about a few relevant systematic reviews that had already been written. Recent systematic reviews may include older and more recent works on the subject. For better IoT security, late exploration has focused on improving deep learning calculations. The ideal methodology for carrying out interruption recognition in the Internet of Things is determined by looking at the exhibition of different deep learning executions and investigating interruption location techniques that utilise them. Convolutional neural networks (CNNs), long short-term memory (LSTM), and gated recurrent units (GRUs) are the deep learning models used in this review. A standard dataset for IoT interruption identification is considered to evaluate the proposed model. The practical information is then investigated and diverged from current IoT interruption discovery strategies. In contrast with currently utilized approaches, the recommended strategy seems to have the best precision.","PeriodicalId":369414,"journal":{"name":"Mesopotamian Journal of Cyber Security","volume":"189 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Threats Detection in the Internet of Things Using Convolutional neural networks, long short-term memory, and gated recurrent units\",\"authors\":\"Naomi A. Bajao, Jae-an Sarucam\",\"doi\":\"10.58496/mjcs/2023/005\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security for IoT gadgets is an undertaking that has been made more troublesome by the far-reaching utilization of network safety in different applications, including wise modern frameworks, homes, individual devices, and vehicles. The fact that has been introduced makes deep learning for interruption recognition one productive security method. I thought about a few relevant systematic reviews that had already been written. Recent systematic reviews may include older and more recent works on the subject. For better IoT security, late exploration has focused on improving deep learning calculations. The ideal methodology for carrying out interruption recognition in the Internet of Things is determined by looking at the exhibition of different deep learning executions and investigating interruption location techniques that utilise them. Convolutional neural networks (CNNs), long short-term memory (LSTM), and gated recurrent units (GRUs) are the deep learning models used in this review. A standard dataset for IoT interruption identification is considered to evaluate the proposed model. The practical information is then investigated and diverged from current IoT interruption discovery strategies. In contrast with currently utilized approaches, the recommended strategy seems to have the best precision.\",\"PeriodicalId\":369414,\"journal\":{\"name\":\"Mesopotamian Journal of Cyber Security\",\"volume\":\"189 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Mesopotamian Journal of Cyber Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.58496/mjcs/2023/005\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Mesopotamian Journal of Cyber Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58496/mjcs/2023/005","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

由于网络安全在不同应用(包括智能现代框架、家庭、个人设备和车辆)中的广泛应用,物联网设备的安全性变得更加麻烦。引入的这一事实使得用于中断识别的深度学习成为一种有效的安全方法。我想到了一些已经写过的相关的系统评论。最近的系统评论可能包括关于该主题的旧的和最近的作品。为了更好的物联网安全性,后期的探索主要集中在改进深度学习计算上。在物联网中进行中断识别的理想方法是通过查看不同深度学习执行的展示和调查利用它们的中断定位技术来确定的。卷积神经网络(cnn)、长短期记忆(LSTM)和门控循环单元(gru)是本综述中使用的深度学习模型。考虑了物联网中断识别的标准数据集来评估所提出的模型。然后对实际信息进行调查,并与当前的物联网中断发现策略进行区分。与目前使用的方法相比,建议的策略似乎具有最好的精度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Threats Detection in the Internet of Things Using Convolutional neural networks, long short-term memory, and gated recurrent units
Security for IoT gadgets is an undertaking that has been made more troublesome by the far-reaching utilization of network safety in different applications, including wise modern frameworks, homes, individual devices, and vehicles. The fact that has been introduced makes deep learning for interruption recognition one productive security method. I thought about a few relevant systematic reviews that had already been written. Recent systematic reviews may include older and more recent works on the subject. For better IoT security, late exploration has focused on improving deep learning calculations. The ideal methodology for carrying out interruption recognition in the Internet of Things is determined by looking at the exhibition of different deep learning executions and investigating interruption location techniques that utilise them. Convolutional neural networks (CNNs), long short-term memory (LSTM), and gated recurrent units (GRUs) are the deep learning models used in this review. A standard dataset for IoT interruption identification is considered to evaluate the proposed model. The practical information is then investigated and diverged from current IoT interruption discovery strategies. In contrast with currently utilized approaches, the recommended strategy seems to have the best precision.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信