Suppr超能文献

迈向安全的物联网网络:使用自生成数据集对元启发式算法与卷积神经网络相结合的综合研究。

Towards secure IoT networks: A comprehensive study of metaheuristic algorithms in conjunction with CNN using a self-generated dataset.

作者信息

Choudhary Vandana, Tanwar Sarvesh, Choudhury Tanupriya, Kotecha Ketan

机构信息

Amity Institute of Information Technology, Amity University, Noida 201313, India.

Research Professor, CSE Department, Graphic Era Deemed to be University, Dehradun, Uttarakhand 248002, India.

出版信息

MethodsX. 2024 May 4;12:102747. doi: 10.1016/j.mex.2024.102747. eCollection 2024 Jun.

Abstract

The Internet of Things (IoT) has radically reformed various sectors and industries, enabling unprecedented levels of connectivity and automation. However, the surge in the number of IoT devices has also widened the attack surface, rendering IoT networks potentially susceptible to a plethora of security risks. Addressing the critical challenge of enhancing security in IoT networks is of utmost importance. Moreover, there is a considerable lack of datasets designed exclusively for IoT applications. To bridge this gap, a customized dataset that accurately mimics real-world IoT scenarios impacted by four different types of attacks-blackhole, sinkhole, flooding, and version number attacks was generated using the Contiki-OS Cooja Simulator in this study. The resulting dataset is then consequently employed to evaluate the efficacy of several metaheuristic algorithms, in conjunction with Convolutional Neural Network (CNN) for IoT networks. •The proposed study's goal is to identify optimal hyperparameters for CNNs, ensuring their peak performance in intrusion detection tasks.•This study not only intensifies our comprehension of IoT network security but also provides practical guidance for implementation of the robust security measures in real-world IoT applications.

摘要

物联网(IoT)已经彻底改变了各个部门和行业,实现了前所未有的连接性和自动化水平。然而,物联网设备数量的激增也扩大了攻击面,使物联网网络可能容易受到大量安全风险的影响。应对增强物联网网络安全性这一关键挑战至关重要。此外,专门为物联网应用设计的数据集相当匮乏。为了弥补这一差距,本研究使用Contiki-OS Cooja模拟器生成了一个定制数据集,该数据集准确模拟了受四种不同类型攻击——黑洞攻击、陷洞攻击、泛洪攻击和版本号攻击影响的真实世界物联网场景。然后,将所得数据集用于评估几种元启发式算法与物联网网络卷积神经网络(CNN)相结合的效果。•本研究的目标是为卷积神经网络识别最优超参数,确保其在入侵检测任务中的最佳性能。•本研究不仅加深了我们对物联网网络安全的理解,还为在实际物联网应用中实施强大的安全措施提供了实践指导。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7616/11107349/f837153c7de0/ga1.jpg

文献AI研究员

20分钟写一篇综述,助力文献阅读效率提升50倍。

立即体验

用中文搜PubMed

大模型驱动的PubMed中文搜索引擎

马上搜索

文档翻译

学术文献翻译模型,支持多种主流文档格式。

立即体验