nanoll extt
Please use this identifier to cite or link to this item: http://lrcdrs.bennett.edu.in:80/handle/123456789/1890
Title: Designing Framework for Intrusion Detection in IoT Based on Spotted Hyena-Based ANN
Authors: Muhuri, Samya
Gupta, Suneet Kumar
Keywords: Artificial neural network
Internet of Things
Intrusion detection system
Security
Spotted hyena optimization
Issue Date: 2022
Publisher: Springer Science and Business Media Deutschland GmbH
Abstract: Internet of Things (IoT) is the platform for resource sharing amidst the computing platforms, mainly memory, power, large data, and storage. Securing the data in the IoT has become a prime concern as the hackers can access through the invaluable information from the IoT database. Once the attacks are incurred on the IoT environment, the loss of data is inevitable, and it can have a major effect on the progress of the IoT platform. In this paper, an Intrusion Detection System (IDS) with improved artificial intelligence is proposed. This paper makes use of standard benchmark datasets from diverse sources for performing the experiment. A well-performing machine learning algorithm called Artificial Neural Network (ANN) is developed with improved network architecture. The usage of a renowned meta-heuristic algorithm called Spotted Hyena Optimization (SHO) is used for selecting the optimal hidden neurons for ANN. The main objective of the improved training is to reduce the error difference between the target and the measured outputs to enhance the detection accuracy. Finally, the experimental outcomes and simulations prove the stability and robustness of the proposed model in terms of a variety of performance metrics over other machine learning models. © 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
URI: https://doi.org/10.1007/978-981-16-3690-5_153
http://lrcdrs.bennett.edu.in:80/handle/123456789/1890
ISSN: 1876-1100
Appears in Collections:Conference/Seminar Papers_ SCSET

Files in This Item:
File SizeFormat 
1051.pdf
  Restricted Access
378.73 kBAdobe PDFView/Open Request a copy

Contact admin for Full-Text

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.