Conţinutul numărului revistei |
Articolul precedent |
Articolul urmator |
306 19 |
Ultima descărcare din IBN: 2024-03-28 12:35 |
Căutarea după subiecte similare conform CZU |
004.056.53+004.62+004.8 (1) |
Știința și tehnologia calculatoarelor. Calculatoare. Procesarea datelor (4156) |
Date (108) |
Inteligență artificială (303) |
SM ISO690:2012 IFTIKHAR, Saman, KHAN, Danish, AL-MADANI, Daniah, ALI ALHEETI, Khattab M , FATIMAH, Kiran. An Intelligent Detection of Malicious Intrusions in IoT Based on Machine Learning and Deep Learning Techniques. In: Computer Science Journal of Moldova, 2022, nr. 3(90), pp. 288-307. ISSN 1561-4042. DOI: https://doi.org/10.56415/csjm.v30.16 |
EXPORT metadate: Google Scholar Crossref CERIF DataCite Dublin Core |
Computer Science Journal of Moldova | ||||||
Numărul 3(90) / 2022 / ISSN 1561-4042 /ISSNe 2587-4330 | ||||||
|
||||||
DOI:https://doi.org/10.56415/csjm.v30.16 | ||||||
CZU: 004.056.53+004.62+004.8 | ||||||
Pag. 288-307 | ||||||
|
||||||
Descarcă PDF | ||||||
Rezumat | ||||||
The devices of the Internet of Things (IoT) are facing various types of attacks, and IoT applications present unique and new protection challenges. These security challenges in IoT must be addressed to avoid any potential attacks. Malicious intrusions in IoT devices are considered one of the most aspects required for IoT users in modern applications. Machine learning techniques are widely used for intelligent detection of malicious intrusions in IoT. This paper proposes an intelligent detection method of malicious intrusions in IoT systems that leverages effective classification of benign and malicious attacks. An ensemble approach combined with various machine learning algorithms and a deep learning technique, is used to detect anomalies and other malicious activities in IoT. For the consideration of the detection of malicious intrusions and anomalies in IoT devices, UNSW-NB15 dataset is used as one of the latest IoT datasets. In this research, malicious and normal intrusions in IoT devices are classified with the use of various models. |
||||||
Cuvinte-cheie Malicious Intrusions, Anomaly detection, Machine Learning, Deep learning, classification, IoT dataset |
||||||
|