Hybrid Ensemble Model for Real-Time Intrusion Detection in IoT Networks Using Machine Learning and Deep Learning Techniques
(1) Universitas Katolik Indonesia Atma Jaya, Indonesia
(*) Corresponding Author
Abstract
Full Text:
PDFReferences
R. S. Jha and P. R. Sahoo, “Internet of things (IoT)--enabler for connecting world,” in ICT for competitive strategies, CRC Press, 2020, pp. 1–7.
M. A. Rahim, M. A. Rahman, M. M. Rahman, A. T. Asyhari, M. Z. A. Bhuiyan, and D. Ramasamy, “Evolution of IoT-enabled connectivity and applications in automotive industry: A review,” Veh. Commun., vol. 27, p. 100285, 2021.
O. C. Abikoye et al., “Application of internet of thing and cyber physical system in Industry 4.0 smart manufacturing,” in Emergence of Cyber Physical System and IoT in Smart Automation and Robotics: Computer Engineering in Automation, Springer, 2021, pp. 203–217.
M. Umair, M. A. Cheema, O. Cheema, H. Li, and H. Lu, “Impact of COVID-19 on IoT adoption in healthcare, smart homes, smart buildings, smart cities, transportation and industrial IoT,” Sensors, vol. 21, no. 11, p. 3838, 2021.
R. Chataut, A. Phoummalayvane, and R. Akl, “Unleashing the power of IoT: A comprehensive review of IoT applications and future prospects in healthcare, agriculture, smart homes, smart cities, and industry 4.0,” Sensors, vol. 23, no. 16, p. 7194, 2023.
A. K. Tyagi, T. F. Fernandez, S. Mishra, and S. Kumari, “Intelligent automation systems at the core of industry 4.0,” in International conference on intelligent systems design and applications, 2020, pp. 1–18.
X. Jiang, M. Lora, and S. Chattopadhyay, “An experimental analysis of security vulnerabilities in industrial IoT devices,” ACM Trans. Internet Technol., vol. 20, no. 2, pp. 1–24, 2020.
E. Bout, V. Loscri, and A. Gallais, “How machine learning changes the nature of cyberattacks on IoT networks: A survey,” IEEE Commun. Surv. & Tutorials, vol. 24, no. 1, pp. 248–279, 2021.
R. R. Krishna, A. Priyadarshini, A. V Jha, B. Appasani, A. Srinivasulu, and N. Bizon, “State-of-the-art review on IoT threats and attacks: Taxonomy, challenges and solutions,” Sustainability, vol. 13, no. 16, p. 9463, 2021.
O. I. Abiodun, E. O. Abiodun, M. Alawida, R. S. Alkhawaldeh, and H. Arshad, “A review on the security of the internet of things: Challenges and solutions,” Wirel. Pers. Commun., vol. 119, pp. 2603–2637, 2021.
S. Rizvi, R. J. Orr, A. Cox, P. Ashokkumar, and M. R. Rizvi, “Identifying the attack surface for IoT network,” Internet of Things, vol. 9, p. 100162, 2020.
K. Sathupadi, “Ai-based intrusion detection and ddos mitigation in fog computing: Addressing security threats in decentralized systems,” Sage Sci. Rev. Appl. Mach. Learn., vol. 6, no. 11, pp. 44–58, 2023.
A. Thakkar and R. Lohiya, “A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges,” Arch. Comput. Methods Eng., vol. 28, no. 4, pp. 3211–3243, 2021.
N. Mishra and S. Pandya, “Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review,” IEEE Access, vol. 9, pp. 59353–59377, 2021.
G. Kornaros, “Hardware-assisted machine learning in resource-constrained IoT environments for security: review and future prospective,” IEEE Access, vol. 10, pp. 58603–58622, 2022.
P. Malhotra, Y. Singh, P. Anand, D. K. Bangotra, P. K. Singh, and W.-C. Hong, “Internet of things: Evolution, concerns and security challenges,” Sensors, vol. 21, no. 5, p. 1809, 2021.
Y. K. Saheed, A. I. Abiodun, S. Misra, M. K. Holone, and R. Colomo-Palacios, “A machine learning-based intrusion detection for detecting internet of things network attacks,” Alexandria Eng. J., vol. 61, no. 12, pp. 9395–9409, 2022.
B. S. Sharmila and R. Nagapadma, “Quantized autoencoder (QAE) intrusion detection system for anomaly detection in resource-constrained IoT devices using RT-IoT2022 dataset,” Cybersecurity, vol. 6, no. 1, p. 41, 2023.
M. Elsisi, M. Amer, C.-L. Su, and others, “A comprehensive review of machine learning and IoT solutions for demand side energy management, conservation, and resilient operation,” Energy, p. 128256, 2023.
R. A. Disha and S. Waheed, “Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection technique,” Cybersecurity, vol. 5, no. 1, p. 1, 2022.
K. Lee, M. Eo, E. Jung, Y. Yoon, and W. Rhee, “Short-term traffic prediction with deep neural networks: A survey,” IEEE Access, vol. 9, pp. 54739–54756, 2021.
J. Zhang, Y. Zeng, and B. Starly, “Recurrent neural networks with long term temporal dependencies in machine tool wear diagnosis and prognosis,” SN Appl. Sci., vol. 3, no. 4, p. 442, 2021.
Y. Li et al., “Weather forecasting using ensemble of spatial-temporal attention network and multi-layer perceptron,” Asia-Pacific J. Atmos. Sci., vol. 57, pp. 533–546, 2021.
M. A. Khan and Y. Kim, “Deep Learning-Based Hybrid Intelligent Intrusion Detection System.,” Comput. Mater. & Contin., vol. 68, no. 1, 2021.
A. Aldallal, “Toward efficient intrusion detection system using hybrid deep learning approach,” Symmetry (Basel)., vol. 14, no. 9, p. 1916, 2022.
S. Kumari, D. Kumar, and M. Mittal, “An ensemble approach for classification and prediction of diabetes mellitus using soft voting classifier,” Int. J. Cogn. Comput. Eng., vol. 2, pp. 40–46, 2021.
N. Khan, M. I. Mohmand, S. ur Rehman, Z. Ullah, Z. Khan, and W. Boulila, “Advancements in intrusion detection: A lightweight hybrid RNN-RF model,” PLoS One, vol. 19, no. 6, p. e0299666, 2024.
J. B. Capital, “Real-Time Internet of Things (RT-IoT2022).” 2022. https://archive.ics.uci.edu/dataset/942/rt-iot2022}.
DOI: https://doi.org/10.30645/kesatria.v5i4.523
DOI (PDF): https://doi.org/10.30645/kesatria.v5i4.523.g518
Refbacks
- There are currently no refbacks.
Published Papers Indexed/Abstracted By: