Skip to main content

Applied Soft Computing

Intrusion detection in IoT and wireless networks using image-based neural network classification



Telecommunication networks play more and more important role in our modern times, and there are significant security risks associated with both wireless and wired networks. These risks stem from various malicious actions and security threats that have emerged with the development of Fourth Generation (4G), Fifth Generation (5G), and Internet of Things (IoT) networks. Machine learning (ML) algorithms have been applied to Intrusion Detection Systems (IDSs) due to their capacity to their ability to detect complex network traffic patterns. Deep learning (DL) networks are highly effective in processing images and videos and they have potential to solve other types of data.
 
Given the characteristics of network traffic records used for intrusion detection in wireless and wired networks, we propose a simple data preprocessing method to convert the data into a grid-structured format, making it compatible with image processing networks. To validate the proposed structure, modified LeNet networks have been used for intrusion detection based on the NSL-KDD and CICIoV2024 (Canadian Institute for Cybersecurity Internet of Vehicles 2024 dataset) benchmark datasets. The simulation results indicate that methods based on extracted features may not always guarantee improved performance.
 
The proposed Image Classification Neural Network-based Intrusion Detection (ICNN-ID) outperforms the compared existing methods. The multiclass classification experimental results show that the proposed LeNet-based IDS achieved a test accuracy (TAC) of 89.97% for NSL-KDD and nearly 100% (99.996%) for CICIoV2024. Additionally, it offers higher accuracy and improved robustness compared to a one-dimensional CNN and a recent deep learning model that integrates deep convolutional neural networks (DCNN) and bidirectional long short-term memory (BiLSTM).

The miniaturization of chips has promoted the rapid development of networks, including mobile networks, wireless networks and wired networks including computer networks. The network has greatly facilitated the acquisition of personal information and industrial upgrading. However, this advantage comes with increased vulnerability to various cyber threats. Intrusion Detection Systems (IDS) have become essential for safeguarding wireless networks by identifying and mitigating unauthorized access and malicious activities. Traditional IDS approaches often rely on signature-based detection methods, which, although effective against known threats, struggle with novel and evolving attacks. Artificial Intelligence (AI) refers to the simulation of human intelligence in machines, enabling them to perform tasks such as learning, reasoning, and problem-solving.

Soft computing encompasses various computational techniques such as fuzzy logic, neural networks, genetic algorithms, probabilistic reasoning, machine learning, rough sets, swarm intelligence, evolutionary computation, deep learning, support vector machines, bio-inspired algorithms, hybrid systems, neuro-fuzzy systems, ant colony optimization, particle swarm optimization, nature-inspired computing, soft set theory, chaos theory, and artificial intelligence

#SoftComputing, #FuzzyLogic, #NeuralNetworks, #GeneticAlgorithms, #MachineLearning, #DeepLearning, #EvolutionaryComputation, #SwarmIntelligence, #BioInspiredAlgorithms, #HybridSystems, #NeuroFuzzy, #SupportVectorMachines, #AI, #ProbabilisticReasoning, #RoughSets, #SoftSetTheory, #ChaosTheory, #AntColonyOptimization, #ParticleSwarmOptimization, #NatureInspiredComputing

Comments

Popular posts from this blog

HealthAIoT: Revolutionizing Smart Healthcare! HealthAIoT combines Artificial Intelligence and the Internet of Things to transform healthcare through real-time monitoring, predictive analytics, and personalized treatment. It enables smarter diagnostics, remote patient care, and proactive health management, enhancing efficiency and outcomes while reducing costs. HealthAIoT is the future of connected, intelligent, and patient-centric healthcare systems. What is HealthAIoT? HealthAIoT is the convergence of Artificial Intelligence (AI) and the Internet of Things (IoT) in the healthcare industry. It integrates smart devices, sensors, and wearables with AI-powered software to monitor, diagnose, and manage health conditions in real-time. This fusion is enabling a new era of smart, connected, and intelligent healthcare systems . Key Components IoT Devices in Healthcare Wearables (e.g., smartwatches, fitness trackers) Medical devices (e.g., glucose monitors, heart rate sensors) Rem...
Detecting Co-Resident Attacks in 5G Clouds! Detecting co-resident attacks in 5G clouds involves identifying malicious activities where attackers share physical cloud resources with victims to steal data or disrupt services. Techniques like machine learning, behavioral analysis, and resource monitoring help detect unusual patterns, ensuring stronger security and privacy in 5G cloud environments. Detecting Co-Resident Attacks in 5G Clouds In a 5G cloud environment, many different users (including businesses and individuals) share the same physical infrastructure through virtualization technologies like Virtual Machines (VMs) and containers. Co-resident attacks occur when a malicious user manages to place their VM or container on the same physical server as a target. Once co-residency is achieved, attackers can exploit shared resources like CPU caches, memory buses, or network interfaces to gather sensitive information or launch denial-of-service (DoS) attacks. Why are Co-Resident Attack...
                        Neural Networks Neural networks are computing systems inspired by the human brain, consisting of layers of interconnected nodes (neurons). They process data by learning patterns from input, enabling tasks like image recognition, language translation, and decision-making. Neural networks power many AI applications by adjusting internal weights through training with large datasets.                                                    Structure of a Neural Network Input Layer : This is where the network receives data. Each neuron in this layer represents a feature in the dataset (e.g., pixels in an image or values in a spreadsheet). Hidden Layers : These layers sit between the input and output layers. They perform calculations and learn patterns. The more hidden layers a ne...