DETECTING DOS ATTACKS IN THE INTERNET OF THINGS (IOT) USING INTELLIGENT NEURAL NETWORK
Keywords:intrusion detection, cyberattacks, neural networks, data mining
ICT is increasingly used in the last decade. One of the greatest challenges in this area is system and information security. This security is threatened by cyberattacks on networks. New techniques have been devised for the field by expanding research into network security. Among the most popular techniques, various data mining algorithms can be noted that are used either alone or in combination for intrusion detection. In this study, neural network technique was used for intrusion detection. The results of simulation of this technique on KDD dataset and MATLAB software indicated high precision of 98%. Comparison of this technique with other techniques such as CNN and BiLSTM suggested that these techniques had a less precision than the proposed one. In addition, the technique had a low error rate.
I. Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.
II. Chen, C. M., Chen, Y. L., & Lin, H. C. (2010). An efficient network intrusion detection. Computer Communications, 33(4), 477-484.
III. Dutt, I., Borah, S., Maitra, I. K., Bhowmik, K., Maity, A., & Das, S. (2018). Real-time hybrid intrusion detection system using machine learning techniques. In Advances in Communication, Devices and Networking (pp. 885-894). Springer, Singapore.
IV. Elhag, S., Fernández, A., Bawakid, A., Alshomrani, S., & Herrera, F. (2015). On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems. Expert Systems with Applications, 42(1), 193-202.
V. Guo, Y., Zhang, H., Zhang, L., Fang, L., & Li, F. (2019). A game theoretic approach to cooperative intrusion detection. Journal of computational science, 30, 118-126.
VI. Kim, G., Lee, S., & Kim, S. (2014). A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Systems with Applications, 41(4), 1690-1700.
VII. Kumar, U., & Gohil, B. N. (2015). A survey on intrusion detection systems for cloud computing environment. International Journal of Computer Applications, 109(1).
VIII. Meena, G., & Choudhary, R. R. (2017, July). A review paper on IDS classification using KDD 99 and NSL KDD dataset in WEKA. In 2017 International Conference on Computer, Communications and Electronics (Comptelix) (pp. 553-558). IEEE.
IX. Mohammadi, S., Mirvaziri, H., Ghazizadeh-Ahsaee, M., & Karimipour, H. (2019). Cyber intrusion detection by combined feature selection algorithm. Journal of information security and applications, 44, 80-88.
X. Nandeshwar, K. K., & Bijwe, K. B. (2015). Distributed Intrusion Detection System Using Mobile Agent Technology. International Journal of Engineering Research and General Science, 3(2).
XI. Nskh, P., Varma, M. N., & Naik, R. R. (2016, May). Principle component analysis based intrusion detection system using support vector machine. In 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) (pp. 1344-1350). IEEE.
XII. Ranjan, R., & Sahoo, G. (2014). A new clustering approach for anomaly intrusion detection. arXiv preprint arXiv:1404.2772.
XIII. Salo, F., Nassif, A. B., & Essex, A. (2019). Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection. Computer Networks, 148, 164-175.
XIV. Yahalom, R., Steren, A., Nameri, Y., Roytman, M., Porgador, A., & Elovici, Y. (2019). Improving the effectiveness of intrusion detection systems for hierarchical data. Knowledge-Based Systems, 168, 59-69.
How to Cite
Copyright (c) 2022 International Education and Research Journal (IERJ)
This work is licensed under a Creative Commons Attribution 4.0 International License.