Authors :
Katikam Mahesh; Dr. Kunjam Nageswara Rao
Volume/Issue :
Volume 9 - 2024, Issue 10 - October
Google Scholar :
https://tinyurl.com/yh7zuz76
Scribd :
https://tinyurl.com/yhnhu3mt
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24OCT580
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
Millions of digital devices total the Internet of
Things (IoT), and this allows very easy interaction from
users connecting the devices. IoT is one of the tech
sectors that is expanding most rapidly, but it can also be
very vulnerable to hazards. Infections and abnormal
placement on the Internet of Things (IoT) framework is
an increasing threat in the field of technology. In view of
the growing IoT foundation usage across all industries,
attacks and dangers on these systems have also grown
proportional. Leveraging typical machine learning
methods, cyber-attack detection plays a critical role in
avoiding damage from cyberattacks on IoT devices. IoT
Cyber Attacks are Not Detected by ANN Artificial
Neural Networks Using Deep Learning Techniques
CNN-DRL (Convolutional Neural Networks-Deep
Reinforcement Learning) Hybrid Approach: Detects
Attacks, including Distributed Denial of Service (DDoS),
Zero-day, and Eavesdropping Attacks.
Keywords :
Cyber Attacks, Internet of Things (IoT), Convolutional Neural Networks, Deep Reinforcement Learning.
References :
- G. Eason, B. Noble, and I.N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529-551, April 1955. (references)
- J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68-73.
- I.S. Jacobs and C.P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G.T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271-350.
- K. Elissa, “Title of paper if known,” unpublished.
- R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press.
- Y. Mirsky, T. Doitshman, Y. Elovici, and A. Shabtai, “Kitsune: an ensemble of autoencoders for online network intrusion detection,” arXiv preprint arXiv:1802.09089, 2018.
- X. Yuan, C. Li, and X. Li, “Deepdefense: identifying ddos attack via deep learning,” IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1–8, 2017.
- Y. Meidan, M. Bohadana, Y. Mathov, Y. Mirsky, A. Shabtai, D. Breitenbacher, and Y. Elovici, “N-baiot—network-based detection of iot botnet attacks using deep autoencoders,” IEEE Pervasive Computing, vol. 17, no. 3, pp. 12–22, 2018.
- M. A. Ferrag and L. Maglaras, “Deepcoin: A novel deep learning and blockchain-based energy exchange framework for smart grids,” IEEE Transactions on Engineering Management, 2019.
- Y. Meidan, M. Bohadana, A. Shabtai, M. Ochoa, N. O. Tippenhauer, J. D. Guarnizo, and Y. Elovici, “Detection of unauthorized iot devices using machine learning techniques,” arXiv preprint arXiv:1709.04647, 2017.
- N. Koroniotis, N. Moustafa, E. Sitnikova, and J. Slay, “Towards developing network forensic mechanism for botnet activities in the iot based on machine learning techniques,” International Conference on Mobile Networks and Management, pp. 30–44, 2017.
- Y. N. Soe, Y. Feng, P. I. Santosa, R. Hartanto, and K. Sakurai, “Rule generation for signature-based detection systems of cyber-attacks in iot environments,” Bulletin of Networking, Computing, Systems, and Software, vol. 8, no. 2, pp. 93–97, 2019.
- V. H. Bezerra, V. G. T. da Costa, S. B. Junior, R. S. Miani, and B. B. Zarpelao, “One-class classification to detect botnets in iot devices,” Anais do XVIII Simposio Brasileiro em Seguranc¸a da Informac¸ ´ ao e ˜ de Sistemas Computacionais, pp. 43–56, 2018.
- E. Hodo, X. Bellekens, A. Hamilton, P.-L. Dubouilh, E. Iorkyase, C. Tachtatzis, and R. Atkinson, “Threat analysis of iot networks using artificial neural network intrusion detection system,” International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–6, 2016.
Millions of digital devices total the Internet of
Things (IoT), and this allows very easy interaction from
users connecting the devices. IoT is one of the tech
sectors that is expanding most rapidly, but it can also be
very vulnerable to hazards. Infections and abnormal
placement on the Internet of Things (IoT) framework is
an increasing threat in the field of technology. In view of
the growing IoT foundation usage across all industries,
attacks and dangers on these systems have also grown
proportional. Leveraging typical machine learning
methods, cyber-attack detection plays a critical role in
avoiding damage from cyberattacks on IoT devices. IoT
Cyber Attacks are Not Detected by ANN Artificial
Neural Networks Using Deep Learning Techniques
CNN-DRL (Convolutional Neural Networks-Deep
Reinforcement Learning) Hybrid Approach: Detects
Attacks, including Distributed Denial of Service (DDoS),
Zero-day, and Eavesdropping Attacks.
Keywords :
Cyber Attacks, Internet of Things (IoT), Convolutional Neural Networks, Deep Reinforcement Learning.