Overview of Cyber Attacks Classification and Detection in IoT using CNN-Deep Reinforcement Learning


Authors : Katikam Mahesh; Dr. Kunjam Nageswara Rao

Volume/Issue : Volume 9 - 2024, Issue 10 - October


Google Scholar : https://tinyurl.com/yh7zuz76

Scribd : https://tinyurl.com/yhnhu3mt

DOI : https://doi.org/10.38124/ijisrt/IJISRT24OCT580

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : Millions of digital devices total the Internet of Things (IoT), and this allows very easy interaction from users connecting the devices. IoT is one of the tech sectors that is expanding most rapidly, but it can also be very vulnerable to hazards. Infections and abnormal placement on the Internet of Things (IoT) framework is an increasing threat in the field of technology. In view of the growing IoT foundation usage across all industries, attacks and dangers on these systems have also grown proportional. Leveraging typical machine learning methods, cyber-attack detection plays a critical role in avoiding damage from cyberattacks on IoT devices. IoT Cyber Attacks are Not Detected by ANN Artificial Neural Networks Using Deep Learning Techniques CNN-DRL (Convolutional Neural Networks-Deep Reinforcement Learning) Hybrid Approach: Detects Attacks, including Distributed Denial of Service (DDoS), Zero-day, and Eavesdropping Attacks.

Keywords : Cyber Attacks, Internet of Things (IoT), Convolutional Neural Networks, Deep Reinforcement Learning.

References :

  1. G. Eason, B. Noble, and I.N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529-551, April 1955. (references)
  2. J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68-73.
  3. I.S. Jacobs and C.P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G.T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271-350.
  4. K. Elissa, “Title of paper if known,” unpublished.
  5. R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press.
  6. Y. Mirsky, T. Doitshman, Y. Elovici, and A. Shabtai, “Kitsune: an ensemble of autoencoders for online network intrusion detection,” arXiv preprint arXiv:1802.09089, 2018.
  7. X. Yuan, C. Li, and X. Li, “Deepdefense: identifying   ddos attack via deep learning,” IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1–8, 2017.
  8. Y. Meidan, M. Bohadana, Y. Mathov, Y. Mirsky, A. Shabtai, D. Breitenbacher, and Y. Elovici, “N-baiot—network-based detection of iot botnet attacks using deep autoencoders,” IEEE Pervasive Computing, vol. 17, no. 3, pp. 12–22, 2018.
  9. M. A. Ferrag and L. Maglaras, “Deepcoin: A novel deep learning and blockchain-based energy exchange framework for smart grids,” IEEE Transactions on Engineering Management, 2019.
  10. Y. Meidan, M. Bohadana, A. Shabtai, M. Ochoa, N. O. Tippenhauer, J. D. Guarnizo, and Y. Elovici, “Detection of unauthorized iot devices using machine learning techniques,” arXiv preprint arXiv:1709.04647, 2017.
  11. N. Koroniotis, N. Moustafa, E. Sitnikova, and J. Slay, “Towards developing network forensic mechanism for botnet activities in the iot based on machine learning techniques,” International Conference on Mobile Networks and Management, pp. 30–44, 2017.
  12. Y. N. Soe, Y. Feng, P. I. Santosa, R. Hartanto, and K. Sakurai, “Rule generation for signature-based detection systems of cyber-attacks in iot environments,” Bulletin of Networking, Computing, Systems, and Software, vol. 8, no. 2, pp. 93–97, 2019.
  13. V. H. Bezerra, V. G. T. da Costa, S. B. Junior, R. S.   Miani, and B. B. Zarpelao, “One-class classification to detect botnets in iot devices,” Anais do XVIII Simposio Brasileiro em Seguranc¸a da Informac¸ ´ ao e ˜ de Sistemas Computacionais, pp. 43–56, 2018.
  14. E. Hodo, X. Bellekens, A. Hamilton, P.-L. Dubouilh, E.  Iorkyase, C. Tachtatzis, and R. Atkinson, “Threat analysis of iot networks using artificial neural network intrusion detection system,” International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–6, 2016.

Millions of digital devices total the Internet of Things (IoT), and this allows very easy interaction from users connecting the devices. IoT is one of the tech sectors that is expanding most rapidly, but it can also be very vulnerable to hazards. Infections and abnormal placement on the Internet of Things (IoT) framework is an increasing threat in the field of technology. In view of the growing IoT foundation usage across all industries, attacks and dangers on these systems have also grown proportional. Leveraging typical machine learning methods, cyber-attack detection plays a critical role in avoiding damage from cyberattacks on IoT devices. IoT Cyber Attacks are Not Detected by ANN Artificial Neural Networks Using Deep Learning Techniques CNN-DRL (Convolutional Neural Networks-Deep Reinforcement Learning) Hybrid Approach: Detects Attacks, including Distributed Denial of Service (DDoS), Zero-day, and Eavesdropping Attacks.

Keywords : Cyber Attacks, Internet of Things (IoT), Convolutional Neural Networks, Deep Reinforcement Learning.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe