Attack prevention in IoT through hybrid optimization mechanism and deep learning framework

The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acq...

Full description

Bibliographic Details
Main Authors: Regonda Nagaraju, Jupeth Toriano Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari, G. Uganya
Format: Article
Language:English
Published: Elsevier 2022-12-01
Series:Measurement: Sensors
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2665917422000654
_version_ 1811276687403384832
author Regonda Nagaraju
Jupeth Toriano Pentang
Shokhjakhon Abdufattokhov
Ricardo Fernando CosioBorda
N. Mageswari
G. Uganya
author_facet Regonda Nagaraju
Jupeth Toriano Pentang
Shokhjakhon Abdufattokhov
Ricardo Fernando CosioBorda
N. Mageswari
G. Uganya
author_sort Regonda Nagaraju
collection DOAJ
description The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data set, the cybersecurity warning systems index system is first constructed, then the index factors are picked and measured, and finally, the situation evaluation is done.Numerous bio-inspired techniques were used to enhance the productivity of an IDS by lowering the data dimensionality and deleting unnecessary and noisy input. The Grey Wolf Optimization algorithm (GWO) is a developed bio-inspired algorithm that improves the efficacy of the IDS in detecting both regular and abnormal congestion in the network. The smart initialization step integrates the different pre-processing strategies to make sure that informative features are incorporated in the early development stages, has been improved. Researchers pick multi-source material in a big data environment for the identification and verification of index components and present a parallel reduction approach based on the classification significance matrix to decrease data underlying data characteristics. For the simulation of this situation, grey wolf optimization and whale optimization were combined to detect the attack prevention and the deep learning approach was presented. Utilizing system software plagiarism, the TensorFlow deep neural network is intended to classify stolen software. To reduce the noise from the signal and to zoom the significance of each word in the perspective of open-source plagiarism, the tokenization and weighting feature approaches are utilized. Malware specimens have been collected from the Mailing database for testing purposes. The experimental findings show that the suggested technique for measuring cyber security hazards in IoT has superior classification results to existing methods. Hence to detect the attack prevention in IoT process Whale with Grey wolf optimization (WGWO) and deep convolution network is used.
first_indexed 2024-04-13T00:02:13Z
format Article
id doaj.art-386cf1ed61d84b4ea66afd0bc90b4656
institution Directory Open Access Journal
issn 2665-9174
language English
last_indexed 2024-04-13T00:02:13Z
publishDate 2022-12-01
publisher Elsevier
record_format Article
series Measurement: Sensors
spelling doaj.art-386cf1ed61d84b4ea66afd0bc90b46562022-12-22T03:11:19ZengElsevierMeasurement: Sensors2665-91742022-12-0124100431Attack prevention in IoT through hybrid optimization mechanism and deep learning frameworkRegonda Nagaraju0Jupeth Toriano Pentang1Shokhjakhon Abdufattokhov2Ricardo Fernando CosioBorda3N. Mageswari4G. Uganya5Department of Information Technology, St.Martin's Engineering College, Dhulapally, Secunderabad, 500100, India; Corresponding author.Western Philippines University, PhilippinesAutomatic Control and Computer Engineering Department, Turin Polytechnic University in Tashkent, Tashkent, UzbekistanUniversidad Autónoma del Perú, Lima, PeruDepartment of ECE, Ashoka Women's Engineering College, Kurnool, Andhra Pradesh, IndiaDepartment of ECE, Assistant Professor, Saveetha School of Engineering, SIMATS, Chennai, IndiaThe Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data set, the cybersecurity warning systems index system is first constructed, then the index factors are picked and measured, and finally, the situation evaluation is done.Numerous bio-inspired techniques were used to enhance the productivity of an IDS by lowering the data dimensionality and deleting unnecessary and noisy input. The Grey Wolf Optimization algorithm (GWO) is a developed bio-inspired algorithm that improves the efficacy of the IDS in detecting both regular and abnormal congestion in the network. The smart initialization step integrates the different pre-processing strategies to make sure that informative features are incorporated in the early development stages, has been improved. Researchers pick multi-source material in a big data environment for the identification and verification of index components and present a parallel reduction approach based on the classification significance matrix to decrease data underlying data characteristics. For the simulation of this situation, grey wolf optimization and whale optimization were combined to detect the attack prevention and the deep learning approach was presented. Utilizing system software plagiarism, the TensorFlow deep neural network is intended to classify stolen software. To reduce the noise from the signal and to zoom the significance of each word in the perspective of open-source plagiarism, the tokenization and weighting feature approaches are utilized. Malware specimens have been collected from the Mailing database for testing purposes. The experimental findings show that the suggested technique for measuring cyber security hazards in IoT has superior classification results to existing methods. Hence to detect the attack prevention in IoT process Whale with Grey wolf optimization (WGWO) and deep convolution network is used.http://www.sciencedirect.com/science/article/pii/S2665917422000654Grey wolf optimizationWhale optimizationInternet of thingsDeep learningCybersecurityWhale with grey wolf optimization
spellingShingle Regonda Nagaraju
Jupeth Toriano Pentang
Shokhjakhon Abdufattokhov
Ricardo Fernando CosioBorda
N. Mageswari
G. Uganya
Attack prevention in IoT through hybrid optimization mechanism and deep learning framework
Measurement: Sensors
Grey wolf optimization
Whale optimization
Internet of things
Deep learning
Cybersecurity
Whale with grey wolf optimization
title Attack prevention in IoT through hybrid optimization mechanism and deep learning framework
title_full Attack prevention in IoT through hybrid optimization mechanism and deep learning framework
title_fullStr Attack prevention in IoT through hybrid optimization mechanism and deep learning framework
title_full_unstemmed Attack prevention in IoT through hybrid optimization mechanism and deep learning framework
title_short Attack prevention in IoT through hybrid optimization mechanism and deep learning framework
title_sort attack prevention in iot through hybrid optimization mechanism and deep learning framework
topic Grey wolf optimization
Whale optimization
Internet of things
Deep learning
Cybersecurity
Whale with grey wolf optimization
url http://www.sciencedirect.com/science/article/pii/S2665917422000654
work_keys_str_mv AT regondanagaraju attackpreventioniniotthroughhybridoptimizationmechanismanddeeplearningframework
AT jupethtorianopentang attackpreventioniniotthroughhybridoptimizationmechanismanddeeplearningframework
AT shokhjakhonabdufattokhov attackpreventioniniotthroughhybridoptimizationmechanismanddeeplearningframework
AT ricardofernandocosioborda attackpreventioniniotthroughhybridoptimizationmechanismanddeeplearningframework
AT nmageswari attackpreventioniniotthroughhybridoptimizationmechanismanddeeplearningframework
AT guganya attackpreventioniniotthroughhybridoptimizationmechanismanddeeplearningframework