Attack prevention in IoT through hybrid optimization mechanism and deep learning framework
The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acq...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2022-12-01
|
Series: | Measurement: Sensors |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2665917422000654 |
_version_ | 1811276687403384832 |
---|---|
author | Regonda Nagaraju Jupeth Toriano Pentang Shokhjakhon Abdufattokhov Ricardo Fernando CosioBorda N. Mageswari G. Uganya |
author_facet | Regonda Nagaraju Jupeth Toriano Pentang Shokhjakhon Abdufattokhov Ricardo Fernando CosioBorda N. Mageswari G. Uganya |
author_sort | Regonda Nagaraju |
collection | DOAJ |
description | The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data set, the cybersecurity warning systems index system is first constructed, then the index factors are picked and measured, and finally, the situation evaluation is done.Numerous bio-inspired techniques were used to enhance the productivity of an IDS by lowering the data dimensionality and deleting unnecessary and noisy input. The Grey Wolf Optimization algorithm (GWO) is a developed bio-inspired algorithm that improves the efficacy of the IDS in detecting both regular and abnormal congestion in the network. The smart initialization step integrates the different pre-processing strategies to make sure that informative features are incorporated in the early development stages, has been improved. Researchers pick multi-source material in a big data environment for the identification and verification of index components and present a parallel reduction approach based on the classification significance matrix to decrease data underlying data characteristics. For the simulation of this situation, grey wolf optimization and whale optimization were combined to detect the attack prevention and the deep learning approach was presented. Utilizing system software plagiarism, the TensorFlow deep neural network is intended to classify stolen software. To reduce the noise from the signal and to zoom the significance of each word in the perspective of open-source plagiarism, the tokenization and weighting feature approaches are utilized. Malware specimens have been collected from the Mailing database for testing purposes. The experimental findings show that the suggested technique for measuring cyber security hazards in IoT has superior classification results to existing methods. Hence to detect the attack prevention in IoT process Whale with Grey wolf optimization (WGWO) and deep convolution network is used. |
first_indexed | 2024-04-13T00:02:13Z |
format | Article |
id | doaj.art-386cf1ed61d84b4ea66afd0bc90b4656 |
institution | Directory Open Access Journal |
issn | 2665-9174 |
language | English |
last_indexed | 2024-04-13T00:02:13Z |
publishDate | 2022-12-01 |
publisher | Elsevier |
record_format | Article |
series | Measurement: Sensors |
spelling | doaj.art-386cf1ed61d84b4ea66afd0bc90b46562022-12-22T03:11:19ZengElsevierMeasurement: Sensors2665-91742022-12-0124100431Attack prevention in IoT through hybrid optimization mechanism and deep learning frameworkRegonda Nagaraju0Jupeth Toriano Pentang1Shokhjakhon Abdufattokhov2Ricardo Fernando CosioBorda3N. Mageswari4G. Uganya5Department of Information Technology, St.Martin's Engineering College, Dhulapally, Secunderabad, 500100, India; Corresponding author.Western Philippines University, PhilippinesAutomatic Control and Computer Engineering Department, Turin Polytechnic University in Tashkent, Tashkent, UzbekistanUniversidad Autónoma del Perú, Lima, PeruDepartment of ECE, Ashoka Women's Engineering College, Kurnool, Andhra Pradesh, IndiaDepartment of ECE, Assistant Professor, Saveetha School of Engineering, SIMATS, Chennai, IndiaThe Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data set, the cybersecurity warning systems index system is first constructed, then the index factors are picked and measured, and finally, the situation evaluation is done.Numerous bio-inspired techniques were used to enhance the productivity of an IDS by lowering the data dimensionality and deleting unnecessary and noisy input. The Grey Wolf Optimization algorithm (GWO) is a developed bio-inspired algorithm that improves the efficacy of the IDS in detecting both regular and abnormal congestion in the network. The smart initialization step integrates the different pre-processing strategies to make sure that informative features are incorporated in the early development stages, has been improved. Researchers pick multi-source material in a big data environment for the identification and verification of index components and present a parallel reduction approach based on the classification significance matrix to decrease data underlying data characteristics. For the simulation of this situation, grey wolf optimization and whale optimization were combined to detect the attack prevention and the deep learning approach was presented. Utilizing system software plagiarism, the TensorFlow deep neural network is intended to classify stolen software. To reduce the noise from the signal and to zoom the significance of each word in the perspective of open-source plagiarism, the tokenization and weighting feature approaches are utilized. Malware specimens have been collected from the Mailing database for testing purposes. The experimental findings show that the suggested technique for measuring cyber security hazards in IoT has superior classification results to existing methods. Hence to detect the attack prevention in IoT process Whale with Grey wolf optimization (WGWO) and deep convolution network is used.http://www.sciencedirect.com/science/article/pii/S2665917422000654Grey wolf optimizationWhale optimizationInternet of thingsDeep learningCybersecurityWhale with grey wolf optimization |
spellingShingle | Regonda Nagaraju Jupeth Toriano Pentang Shokhjakhon Abdufattokhov Ricardo Fernando CosioBorda N. Mageswari G. Uganya Attack prevention in IoT through hybrid optimization mechanism and deep learning framework Measurement: Sensors Grey wolf optimization Whale optimization Internet of things Deep learning Cybersecurity Whale with grey wolf optimization |
title | Attack prevention in IoT through hybrid optimization mechanism and deep learning framework |
title_full | Attack prevention in IoT through hybrid optimization mechanism and deep learning framework |
title_fullStr | Attack prevention in IoT through hybrid optimization mechanism and deep learning framework |
title_full_unstemmed | Attack prevention in IoT through hybrid optimization mechanism and deep learning framework |
title_short | Attack prevention in IoT through hybrid optimization mechanism and deep learning framework |
title_sort | attack prevention in iot through hybrid optimization mechanism and deep learning framework |
topic | Grey wolf optimization Whale optimization Internet of things Deep learning Cybersecurity Whale with grey wolf optimization |
url | http://www.sciencedirect.com/science/article/pii/S2665917422000654 |
work_keys_str_mv | AT regondanagaraju attackpreventioniniotthroughhybridoptimizationmechanismanddeeplearningframework AT jupethtorianopentang attackpreventioniniotthroughhybridoptimizationmechanismanddeeplearningframework AT shokhjakhonabdufattokhov attackpreventioniniotthroughhybridoptimizationmechanismanddeeplearningframework AT ricardofernandocosioborda attackpreventioniniotthroughhybridoptimizationmechanismanddeeplearningframework AT nmageswari attackpreventioniniotthroughhybridoptimizationmechanismanddeeplearningframework AT guganya attackpreventioniniotthroughhybridoptimizationmechanismanddeeplearningframework |