DeepAK-IoT: An effective deep learning model for cyberattack detection in IoT networks

Faculty Computer Science Year: 2023
Type of Publication: ZU Hosted Pages:
Authors:
Journal: Information Sciences Elsevier Inc. Volume:
Keywords : DeepAK-IoT: , effective deep learning model , cyberattack    
Abstract:
Our daily lives have been profoundly changed over the past few years owing to the growing presence of the Internet of Things (IoT). Importantly, IoT makes our lives more convenient, simpler, and more efficient; however, gadgets are vulnerable to a wide variety of cyberattacks due to the lack of robust security mechanisms and hardware security support. This paper presents an alternative deep learning model known as DeepAK-IoT to detect cyberattacks against IoT devices. DeepAK-IoT uses three blocks as its foundation: the residual-based-spatial representation (RSR) block, the temporal representation block (TRB), and the detection block (DB). The RSR block uses five residual blocks to extract a feature representation from the output of the preceding layer. The four convolutional layers are connected in parallel with a skip connection within each block to avoid vanishing or exploding gradients. Then, the second block uses the extracted spatial representation to learn a temporal representation to detect cyber threats. The final block decides how to classify the input record. We evaluated the accuracy and generalization ability of DeepAK-IoT using three well-known public datasets: TON-IoT, Edge-IIoTset, and UNSW-NB15. The proposed model was compared to three state-of-the-art deep learning models to demonstrate its effectiveness in detecting cyber threats in IoT systems. According to the experimental results, DeepAK-IoT was found to be a powerful alternative model for managing cyber threats in IoT networks, as it provided 90.57% accuracy for TON IoT, 94.96% for Edge-IIoTset, and 98.41% for UNSW NB15.
   
     
 
       

Author Related Publications

  • Mohammed Abdel Basset Metwally Attia, "Discrete greedy flower pollination algorithm for spherical traveling salesman problem", Springer, 2019 More
  • Mohammed Abdel Basset Metwally Attia, "A New Hybrid Flower Pollination Algorithm for Solving Constrained Global Optimization Problems", Natural Sciences Publishing Cor., 2014 More
  • Mohammed Abdel Basset Metwally Attia, "A novel equilibrium optimization algorithm for multi-thresholding image segmentation problems", Springer London, 2021 More
  • Mohammed Abdel Basset Metwally Attia, "An efficient binary slime mould algorithm integrated with a novel attacking-feeding strategy for feature selection", Pergamon, 2021 More
  • Mohammed Abdel Basset Metwally Attia, "An efficient teaching-learning-based optimization algorithm for parameters identification of photovoltaic models: Analysis and validations", Pergamon, 2021 More

Department Related Publications

  • Heba Zaki Mohamed Abdallah Elfiqi, "A computational linguistic approach for the identification of translator stylometry using Arabic-English text", IEEE, 2011 More
  • Heba Zaki Mohamed Abdallah Elfiqi, "Measuring Complexity of Mouse Brain Morphological Changes Using GeoEntropy", AIP Publishing, 2009 More
  • Mustafa Khamis Baz Ramadan, "An Efficient method for choosing most suitable cloud storage provider reducing top security risks based on multi-criteria neutrosophic decision making", An Efficient method for choosing most suitable cloud storage provider reducing top security risks based on multi-criteria neutrosophic decision making, 2017 More
  • Ibrahiem Mahmoud Mohamed Elhenawy, "2-Levels of clustering strategy to detect and locate copy-move forgery in digital images", springer, 2020 More
Tweet