scholarly journals Learner’s Dilemma: IoT Devices Training Strategies in Collaborative Deep Learning

Author(s):  
Deepti Gupta ◽  
Olumide Kayode ◽  
Smriti Bhatt ◽  
Maanak Gupta ◽  
Ali Saman Tosun
Electronics ◽  
2021 ◽  
Vol 10 (16) ◽  
pp. 1876
Author(s):  
Ioana Apostol ◽  
Marius Preda ◽  
Constantin Nila ◽  
Ion Bica

The Internet of Things has become a cutting-edge technology that is continuously evolving in size, connectivity, and applicability. This ecosystem makes its presence felt in every aspect of our lives, along with all other emerging technologies. Unfortunately, despite the significant benefits brought by the IoT, the increased attack surface built upon it has become more critical than ever. Devices have limited resources and are not typically created with security features. Lately, a trend of botnet threats transitioning to the IoT environment has been observed, and an army of infected IoT devices can expand quickly and be used for effective attacks. Therefore, identifying proper solutions for securing IoT systems is currently an important and challenging research topic. Machine learning-based approaches are a promising alternative, allowing the identification of abnormal behaviors and the detection of attacks. This paper proposes an anomaly-based detection solution that uses unsupervised deep learning techniques to identify IoT botnet activities. An empirical evaluation of the proposed method is conducted on both balanced and unbalanced datasets to assess its threat detection capability. False-positive rate reduction and its impact on the detection system are also analyzed. Furthermore, a comparison with other unsupervised learning approaches is included. The experimental results reveal the performance of the proposed detection method.


Author(s):  
S. Arokiaraj ◽  
Dr. N. Viswanathan

With the advent of Internet of things(IoT),HA (HA) recognition has contributed the more application in health care in terms of diagnosis and Clinical process. These devices must be aware of human movements to provide better aid in the clinical applications as well as user’s daily activity.Also , In addition to machine and deep learning algorithms, HA recognition systems has significantly improved in terms of high accurate recognition. However, the most of the existing models designed needs improvisation in terms of accuracy and computational overhead. In this research paper, we proposed a BAT optimized Long Short term Memory (BAT-LSTM) for an effective recognition of human activities using real time IoT systems. The data are collected by implanting the Internet of things) devices invasively. Then, proposed BAT-LSTM is deployed to extract the temporal features which are then used for classification to HA. Nearly 10,0000 dataset were collected and used for evaluating the proposed model. For the validation of proposed framework, accuracy, precision, recall, specificity and F1-score parameters are chosen and comparison is done with the other state-of-art deep learning models. The finding shows the proposed model outperforms the other learning models and finds its suitability for the HA recognition.


Author(s):  
Sema Candemir ◽  
Xuan V. Nguyen ◽  
Les R. Folio ◽  
Luciano M. Prevedello

2021 ◽  
Author(s):  
Jishnu Banerjee ◽  
Sahidul Islam ◽  
Wei Wei ◽  
Chen Pan ◽  
Dakai Zhu ◽  
...  

2021 ◽  
pp. 1247-1254
Author(s):  
N. Naveen ◽  
Mohammed Asim Safwan ◽  
T. G. Manoj Nayaka ◽  
N. Nischal

2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Bandar Alotaibi ◽  
Munif Alotaibi

Internet of things (IoT) devices and applications are dramatically increasing worldwide, resulting in more cybersecurity challenges. Among these challenges are malicious activities that target IoT devices and cause serious damage, such as data leakage, phishing and spamming campaigns, distributed denial-of-service (DDoS) attacks, and security breaches. In this paper, a stacked deep learning method is proposed to detect malicious traffic data, particularly malicious attacks targeting IoT devices. The proposed stacked deep learning method is bundled with five pretrained residual networks (ResNets) to deeply learn the characteristics of the suspicious activities and distinguish them from normal traffic. Each pretrained ResNet model consists of 10 residual blocks. We used two large datasets to evaluate the performance of our detection method. We investigated two heterogeneous IoT environments to make our approach deployable in any IoT setting. Our proposed method has the ability to distinguish between benign and malicious traffic data and detect most IoT attacks. The experimental results show that our proposed stacked deep learning method can provide a higher detection rate in real time compared with existing classification techniques.


2021 ◽  
Vol 1818 (1) ◽  
pp. 012219
Author(s):  
Pradeep Sudhakaran ◽  
C Malathy ◽  
T Harsha Vardhan ◽  
T Sainadh

2021 ◽  
Author(s):  
H. Azath H ◽  
M. NAGESWARA GUPTHA M ◽  
L. SHAKKEERA L ◽  
M.R.M. VEERA MANICKAM M.R.M ◽  
B. LANITHA B ◽  
...  

Abstract With the rapid increase in the usage of IoT devices, the cyber threats are increasing among the communication between the IoT devices. The challenges related to security surmounts with increasing number of IoT devices due to its functionality and heterogeneity. In recent times, deep learning algorithms are offered to resolve the constraints associated with detection of malicious devices among the networks. In this paper, we utilize deep belief network (DBN) to resolve the problems associated with identification, detection of anomaly IoT devices. Several features are extracted initially to find the malicious devices in the IoT device network that includes storage, computational resources and high dimensional features. These features extracted from the network traffic assists in achieving the classification of devices by DBN. The simulation is performed to test the accuracy and detection rate of the proposed deep learning classifier. The results show that the proposed method is effective in implementing the detection of malicious nodes in the network than existing methods.


Sign in / Sign up

Export Citation Format

Share Document