AI-based Intrusion Detection System for Internet of Things (IoT) Networks
Main Article Content
Abstract
The rise of the Internet of Things has brought about various advantages, such as providing us with more efficient and effortless activities. Unfortunately, the lack of security solutions has also led to the development of new threats. One of these is the exploitation of vulnerabilities in the networks of IoT devices. In order to effectively address the security threats that can arise in the networks of IoT devices, there needs to be an effective intrusion detection system (IDS). In the field of security, the use of artificial intelligence (AI) powered IDS has shown promising promise. Through deep learning and machine learning techniques, these systems can learn and adapt quickly to new threats. This paper presents an evaluation of the performance of an AI-based security system on a large dataset. The research begins with a literature review of the previous studies related to the security of IoT devices and intrusion detection. We then develop a methodology that includes the data collected for evaluation and training, an AI model architecture for intrusion detection, and the evaluation metrics. The paper presents the results of the study and discusses the performance of the AI-based IDS compared to the existing solutions for addressing security threats in Internet of Things networks. It also explores the potential of this technology for future research. The findings of this study contribute to the growing body of research on the security of IoT networks and intrusion detection. It shows that an AI-based IDS can perform better than the existing solutions in identifying and mitigating threats. The study's findings show the potential of deep learning and machine learning techniques to enhance the security of IoT networks. It also highlights the scope of this technology's application in other security domains.
Downloads
Metrics
Article Details
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.