{"title":"基于LSTM的深度学习技术预测MQTT协议中的物联网攻击","authors":"S. Thavamani, U. Sinthuja","doi":"10.1109/ICAECC54045.2022.9716585","DOIUrl":null,"url":null,"abstract":"Internet of Things networks are becoming more popular for monitoring critical environments of various types, resulting in a large increase in the amount of data transmitted. Because of the large number of linked IoT devices, network and security protocols is a major concern. In the sphere of security, detection systems play a critical role: they are based on cutting-edge algorithms. They can recognize or forecast security attacks using techniques such as machine learning, allowing them to secure the underpinning system. We have depicted some of the Deep Learning based techniques and figured out the best technique called Long Short Term Memory (LSTM) with 87% of accuracy to build the Artificial Intelligence based Interpolation Technique for IoT Environment.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"LSTM based Deep Learning Technique to Forecast Internet of Things Attacks in MQTT Protocol\",\"authors\":\"S. Thavamani, U. Sinthuja\",\"doi\":\"10.1109/ICAECC54045.2022.9716585\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet of Things networks are becoming more popular for monitoring critical environments of various types, resulting in a large increase in the amount of data transmitted. Because of the large number of linked IoT devices, network and security protocols is a major concern. In the sphere of security, detection systems play a critical role: they are based on cutting-edge algorithms. They can recognize or forecast security attacks using techniques such as machine learning, allowing them to secure the underpinning system. We have depicted some of the Deep Learning based techniques and figured out the best technique called Long Short Term Memory (LSTM) with 87% of accuracy to build the Artificial Intelligence based Interpolation Technique for IoT Environment.\",\"PeriodicalId\":199351,\"journal\":{\"name\":\"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAECC54045.2022.9716585\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAECC54045.2022.9716585","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
LSTM based Deep Learning Technique to Forecast Internet of Things Attacks in MQTT Protocol
Internet of Things networks are becoming more popular for monitoring critical environments of various types, resulting in a large increase in the amount of data transmitted. Because of the large number of linked IoT devices, network and security protocols is a major concern. In the sphere of security, detection systems play a critical role: they are based on cutting-edge algorithms. They can recognize or forecast security attacks using techniques such as machine learning, allowing them to secure the underpinning system. We have depicted some of the Deep Learning based techniques and figured out the best technique called Long Short Term Memory (LSTM) with 87% of accuracy to build the Artificial Intelligence based Interpolation Technique for IoT Environment.