{"title":"加强物联网网络的网络安全:用于异常检测的 SLSTM-WCO 算法","authors":"Tripti Sharma, Sanjeev Kumar Prasad","doi":"10.1007/s12083-024-01712-z","DOIUrl":null,"url":null,"abstract":"<p>Internet of Things (IoT) security refers to different aspects of security, including methods, tactics, and technologies used to protect these devices from unauthorized access. However, it is connected with multiple physical devices to perform huge tasks simultaneously and secure the data transmitted through the IoT network. Furthermore, the IoT is used to transmit sensitive data and validate security performance. Mostly Machine Learning (ML) algorithms are widely utilized for the process of anomaly detection. However the application of the ML model fails to detect attacks in IoT, to overcome this, a novel Stacked Long Short Term Memory based Willow Catkin Optimization (SLSTM-WCO) algorithm is proposed to detect intrusion anomalies in IoT networks. The complex patterns and abnormalities are predicted by determining the regularization method. Also, the deep learning (DL) model such as stacked LSTM detects the anomaly accurately and improves the effectiveness. The detection performance is validated by using benchmark datasets such as BoT-IoT, IoT network Intrusion, IoT-23, MQTT, and MQTTset which enhanced the efficiency. The outcome of the SLSTM-WCO method improved accuracy by 99.49% and improved anomaly detection in IoT networks compared to existing methods.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"20 1","pages":""},"PeriodicalIF":3.3000,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Enhancing cybersecurity in IoT networks: SLSTM-WCO algorithm for anomaly detection\",\"authors\":\"Tripti Sharma, Sanjeev Kumar Prasad\",\"doi\":\"10.1007/s12083-024-01712-z\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>Internet of Things (IoT) security refers to different aspects of security, including methods, tactics, and technologies used to protect these devices from unauthorized access. However, it is connected with multiple physical devices to perform huge tasks simultaneously and secure the data transmitted through the IoT network. Furthermore, the IoT is used to transmit sensitive data and validate security performance. Mostly Machine Learning (ML) algorithms are widely utilized for the process of anomaly detection. However the application of the ML model fails to detect attacks in IoT, to overcome this, a novel Stacked Long Short Term Memory based Willow Catkin Optimization (SLSTM-WCO) algorithm is proposed to detect intrusion anomalies in IoT networks. The complex patterns and abnormalities are predicted by determining the regularization method. Also, the deep learning (DL) model such as stacked LSTM detects the anomaly accurately and improves the effectiveness. The detection performance is validated by using benchmark datasets such as BoT-IoT, IoT network Intrusion, IoT-23, MQTT, and MQTTset which enhanced the efficiency. The outcome of the SLSTM-WCO method improved accuracy by 99.49% and improved anomaly detection in IoT networks compared to existing methods.</p>\",\"PeriodicalId\":49313,\"journal\":{\"name\":\"Peer-To-Peer Networking and Applications\",\"volume\":\"20 1\",\"pages\":\"\"},\"PeriodicalIF\":3.3000,\"publicationDate\":\"2024-05-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Peer-To-Peer Networking and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s12083-024-01712-z\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Peer-To-Peer Networking and Applications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s12083-024-01712-z","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Enhancing cybersecurity in IoT networks: SLSTM-WCO algorithm for anomaly detection
Internet of Things (IoT) security refers to different aspects of security, including methods, tactics, and technologies used to protect these devices from unauthorized access. However, it is connected with multiple physical devices to perform huge tasks simultaneously and secure the data transmitted through the IoT network. Furthermore, the IoT is used to transmit sensitive data and validate security performance. Mostly Machine Learning (ML) algorithms are widely utilized for the process of anomaly detection. However the application of the ML model fails to detect attacks in IoT, to overcome this, a novel Stacked Long Short Term Memory based Willow Catkin Optimization (SLSTM-WCO) algorithm is proposed to detect intrusion anomalies in IoT networks. The complex patterns and abnormalities are predicted by determining the regularization method. Also, the deep learning (DL) model such as stacked LSTM detects the anomaly accurately and improves the effectiveness. The detection performance is validated by using benchmark datasets such as BoT-IoT, IoT network Intrusion, IoT-23, MQTT, and MQTTset which enhanced the efficiency. The outcome of the SLSTM-WCO method improved accuracy by 99.49% and improved anomaly detection in IoT networks compared to existing methods.
期刊介绍:
The aim of the Peer-to-Peer Networking and Applications journal is to disseminate state-of-the-art research and development results in this rapidly growing research area, to facilitate the deployment of P2P networking and applications, and to bring together the academic and industry communities, with the goal of fostering interaction to promote further research interests and activities, thus enabling new P2P applications and services. The journal not only addresses research topics related to networking and communications theory, but also considers the standardization, economic, and engineering aspects of P2P technologies, and their impacts on software engineering, computer engineering, networked communication, and security.
The journal serves as a forum for tackling the technical problems arising from both file sharing and media streaming applications. It also includes state-of-the-art technologies in the P2P security domain.
Peer-to-Peer Networking and Applications publishes regular papers, tutorials and review papers, case studies, and correspondence from the research, development, and standardization communities. Papers addressing system, application, and service issues are encouraged.