[Poster Presentation]Cyber-attack detection using Gradient Clipping Long short term memory networks (GC-LSTM) in Internet of Things (IoT)

Cyber-attack detection using Gradient Clipping Long short term memory networks (GC-LSTM) in Internet of Things (IoT)
ID:72 Submission ID:165 View Protection:ATTENDEE Updated Time:2024-10-13 11:44:01 Hits:88 Poster Presentation

Start Time:2024-10-25 16:10 (Asia/Bangkok)

Duration:5min

Session:[PS] Poster Session » [PS] Poster

Video No Permission Presentation File

Tips: The file permissions under this presentation are only for participants. You have not logged in yet and cannot view it temporarily.

Abstract
The Internet of Things (IoT) is a network that connects a vast number of objects, enabling them to communicate and interact each other with human intervention. The IoT is seeing rapid growth in the field of computing. However, it is important to acknowledge that IoT is very susceptible to many forms of assaults due to the hostile nature of the internet. In order to address this problem, it is necessary to implement practical steps to ensure the security of IoT networks, such as the implementation of network anomaly detection. While it is impossible to completely prevent assaults indefinitely, timely discovery of an attack is essential for effective defence. Because IoT devices have limited storage and processing power, standard high-end security solutions cannot protect them. In addition, IoT devices are now autonomously linked for extended durations. Consequently, it is necessary to create advanced network-based security solutions such as deep neural network solutions. While several research have focused on the use of neural network methods for attack detection, there has been less emphasis on detecting assaults especially in IoT networks. The objective of this research is to develop a Gradient Clipping Long Short-Term Memory network (GC-LSTM) that can efficiently and promptly identify IoT network assaults. The Bot-IoT dataset is employed for evaluating various detection methodologies. The incorporation of additional features resulted in improved results. The GC-LSTM model, as proposed, achieves a remarkable accuracy of 99.98%.
Keywords
Cyberattack,internet of things,Neural network,intrusion detection,bot-IoT dataset
Speaker
Madan Mohan Tito Ayyalasomayajula
Aspen University, Arizona

Submission Author
Madan Mohan Tito Ayyalasomayajula Aspen University, Arizona
Vishwanadham Mandala Data Engineering Lead, Cummins, Inc
A Hanumat Prasad Kallam Haranadha Reddy Institute of Technology
Amit Gangopadhyay Mohan Babu University (Erstwhile Sree Vidyanikethan Engineering College)
Neeraj Shrivastava Research scholar from Medicaps university
Ajith Sundaram Amrita School of Business
Comment submit
Verification code Change another
All comments

CONTACT US

Conference Email: asiancomnet@usssociety.org

Whatsapp Group:  https://chat.whatsapp.com/HWRmX5hM1hFJKsbgMvpNTz

 

 

 

Registration Submit Paper