M. Minu, K. Reddy, DouleNithishkumar, AmbadasRithvikBhargav
{"title":"基于多尺度深度表征学习的混合深度物联网网络驱动异常检测","authors":"M. Minu, K. Reddy, DouleNithishkumar, AmbadasRithvikBhargav","doi":"10.1109/ICECAA58104.2023.10212368","DOIUrl":null,"url":null,"abstract":"Due to the exponential increase in IoT device production, the IoT (Internet of Things) business has experienced rapid expansion on the market, which gives attackers a larger attack surface from which to launch potentially more devastating assaults. There has been a rise in cyber-attacks. When intruders perform cyber-attacks utilizing unique and inventive ways, many of these attacks have effectively fulfilled the maliciousintentions. Conventional machine learning approaches seem ineffective in the context of unanticipated network technology and various penetration strategies. The introduction of new vulnerabilities is a result of cyber-physical applications leveraging Internet of Things (IoT) devices. Because of the cross-domain, cross-layer, and multidisciplinary nature of the emerging security and dependability concerns, a comprehensive solution is required.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Hybrid Deep IoT Network-Driven Anomaly Detection using Multi-Scale Deep Representation Learning\",\"authors\":\"M. Minu, K. Reddy, DouleNithishkumar, AmbadasRithvikBhargav\",\"doi\":\"10.1109/ICECAA58104.2023.10212368\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to the exponential increase in IoT device production, the IoT (Internet of Things) business has experienced rapid expansion on the market, which gives attackers a larger attack surface from which to launch potentially more devastating assaults. There has been a rise in cyber-attacks. When intruders perform cyber-attacks utilizing unique and inventive ways, many of these attacks have effectively fulfilled the maliciousintentions. Conventional machine learning approaches seem ineffective in the context of unanticipated network technology and various penetration strategies. The introduction of new vulnerabilities is a result of cyber-physical applications leveraging Internet of Things (IoT) devices. Because of the cross-domain, cross-layer, and multidisciplinary nature of the emerging security and dependability concerns, a comprehensive solution is required.\",\"PeriodicalId\":114624,\"journal\":{\"name\":\"2023 2nd International Conference on Edge Computing and Applications (ICECAA)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 2nd International Conference on Edge Computing and Applications (ICECAA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECAA58104.2023.10212368\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECAA58104.2023.10212368","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Hybrid Deep IoT Network-Driven Anomaly Detection using Multi-Scale Deep Representation Learning
Due to the exponential increase in IoT device production, the IoT (Internet of Things) business has experienced rapid expansion on the market, which gives attackers a larger attack surface from which to launch potentially more devastating assaults. There has been a rise in cyber-attacks. When intruders perform cyber-attacks utilizing unique and inventive ways, many of these attacks have effectively fulfilled the maliciousintentions. Conventional machine learning approaches seem ineffective in the context of unanticipated network technology and various penetration strategies. The introduction of new vulnerabilities is a result of cyber-physical applications leveraging Internet of Things (IoT) devices. Because of the cross-domain, cross-layer, and multidisciplinary nature of the emerging security and dependability concerns, a comprehensive solution is required.