A novel intrusion detection framework for optimizing IoT security.

Sci Rep

Department of Software Engineering, College of Computing, Umm Al-Qura University, Mecca, 24381, Kingdom of Saudi Arabia.

Published: September 2024

AI Article Synopsis

  • * This study introduces a hybrid model that combines convolutional neural networks (CNN) and gated recurrent units (GRU) specifically designed for IoT security, effectively capturing essential features and relationships in the data.
  • * Validation on the IoTID20 dataset achieved a 99.60% accuracy in detecting attacks, and testing on another dataset, UNSW-NB15, showed high accuracy as well, demonstrating the model's effectiveness and potential as a solution for IoT security challenges.

Article Abstract

The emerging expanding scope of the Internet of Things (IoT) necessitates robust intrusion detection systems (IDS) to mitigate security risks effectively. However, existing approaches often struggle with adaptability to emerging threats and fail to account for IoT-specific complexities. To address these challenges, this study proposes a novel approach by hybridizing convolutional neural network (CNN) and gated recurrent unit (GRU) architectures tailored for IoT intrusion detection. This hybrid model excels in capturing intricate features and learning relational aspects crucial in IoT security. Moreover, we integrate the feature-weighted synthetic minority oversampling technique (FW-SMOTE) to handle imbalanced datasets, which commonly afflict intrusion detection tasks. Validation using the IoTID20 dataset, designed to emulate IoT environments, yields exceptional results with 99.60% accuracy in attack detection, surpassing existing benchmarks. Additionally, evaluation on the network domain dataset, UNSW-NB15, demonstrates robust performance with 99.16% accuracy, highlighting the model's applicability across diverse datasets. This innovative approach not only addresses current limitations in IoT intrusion detection but also establishes new benchmarks in terms of accuracy and adaptability. The findings underscore its potential as a versatile and effective solution for safeguarding IoT ecosystems against evolving security threats.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11410947PMC
http://dx.doi.org/10.1038/s41598-024-72049-zDOI Listing

Publication Analysis

Top Keywords

intrusion detection
20
iot security
8
iot intrusion
8
iot
7
detection
6
novel intrusion
4
detection framework
4
framework optimizing
4
optimizing iot
4
security
4

Similar Publications

Industrialization has led to significant increases in the types and quantities of pollutants, with environmental pollutants widely present in various media, including the air, food, and everyday items. These pollutants can enter the human body via multiple pathways, including ingestion through food and absorption through the skin; this intrusion can disrupt the production, release, and circulation of hormones in the body, resulting in a range of illnesses that affect the reproductive, endocrine, and nervous systems. Consequently, these pollutants pose substantial risks to human health.

View Article and Find Full Text PDF

Network intrusion detection (NID) is an effective manner to guarantee the security of cyberspace. However, the scale of normal network traffic is much larger than intrusion traffic (i.e.

View Article and Find Full Text PDF

The Cyber Kill Chain (CKC) defense model aims to assist subject matter experts in planning, identifying, and executing against cyber intrusion activity, by outlining seven stages required for adversaries to execute an attack. Recent advancements in Artificial Intelligence (AI) have empowered adversaries to execute sophisticated attacks to exploit system vulnerabilities. As a result, it is essential to consider how AI-based tools change the cyber threat landscape and affect the current standard CKC model.

View Article and Find Full Text PDF

Introduction: The rapid escalation of cyber threats necessitates innovative strategies to enhance cybersecurity and privacy measures. Artificial Intelligence (AI) has emerged as a promising tool poised to enhance the effectiveness of cybersecurity strategies by offering advanced capabilities for intrusion detection, malware classification, and privacy preservation. However, this work addresses the significant lack of a comprehensive synthesis of AI's use in cybersecurity and privacy across the vast literature, aiming to identify existing gaps and guide further progress.

View Article and Find Full Text PDF

A novel machine learning model for perimeter intrusion detection using intrusion image dataset.

PLoS One

December 2024

Computer Science Academic Group, Faculty of Information and Communication Technology, Mahidol University, Salaya, Nakhon Pathom, Thailand.

Perimeter Intrusion Detection Systems (PIDS) are crucial for protecting any physical locations by detecting and responding to intrusions around its perimeter. Despite the availability of several PIDS, challenges remain in detection accuracy and precise activity classification. To address these challenges, a new machine learning model is developed.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!