Skip to main content

Applied Soft Computing

Intrusion detection in IoT and wireless networks using image-based neural network classification



Telecommunication networks play more and more important role in our modern times, and there are significant security risks associated with both wireless and wired networks. These risks stem from various malicious actions and security threats that have emerged with the development of Fourth Generation (4G), Fifth Generation (5G), and Internet of Things (IoT) networks. Machine learning (ML) algorithms have been applied to Intrusion Detection Systems (IDSs) due to their capacity to their ability to detect complex network traffic patterns. Deep learning (DL) networks are highly effective in processing images and videos and they have potential to solve other types of data.
 
Given the characteristics of network traffic records used for intrusion detection in wireless and wired networks, we propose a simple data preprocessing method to convert the data into a grid-structured format, making it compatible with image processing networks. To validate the proposed structure, modified LeNet networks have been used for intrusion detection based on the NSL-KDD and CICIoV2024 (Canadian Institute for Cybersecurity Internet of Vehicles 2024 dataset) benchmark datasets. The simulation results indicate that methods based on extracted features may not always guarantee improved performance.
 
The proposed Image Classification Neural Network-based Intrusion Detection (ICNN-ID) outperforms the compared existing methods. The multiclass classification experimental results show that the proposed LeNet-based IDS achieved a test accuracy (TAC) of 89.97% for NSL-KDD and nearly 100% (99.996%) for CICIoV2024. Additionally, it offers higher accuracy and improved robustness compared to a one-dimensional CNN and a recent deep learning model that integrates deep convolutional neural networks (DCNN) and bidirectional long short-term memory (BiLSTM).

The miniaturization of chips has promoted the rapid development of networks, including mobile networks, wireless networks and wired networks including computer networks. The network has greatly facilitated the acquisition of personal information and industrial upgrading. However, this advantage comes with increased vulnerability to various cyber threats. Intrusion Detection Systems (IDS) have become essential for safeguarding wireless networks by identifying and mitigating unauthorized access and malicious activities. Traditional IDS approaches often rely on signature-based detection methods, which, although effective against known threats, struggle with novel and evolving attacks. Artificial Intelligence (AI) refers to the simulation of human intelligence in machines, enabling them to perform tasks such as learning, reasoning, and problem-solving.

Soft computing encompasses various computational techniques such as fuzzy logic, neural networks, genetic algorithms, probabilistic reasoning, machine learning, rough sets, swarm intelligence, evolutionary computation, deep learning, support vector machines, bio-inspired algorithms, hybrid systems, neuro-fuzzy systems, ant colony optimization, particle swarm optimization, nature-inspired computing, soft set theory, chaos theory, and artificial intelligence

#SoftComputing, #FuzzyLogic, #NeuralNetworks, #GeneticAlgorithms, #MachineLearning, #DeepLearning, #EvolutionaryComputation, #SwarmIntelligence, #BioInspiredAlgorithms, #HybridSystems, #NeuroFuzzy, #SupportVectorMachines, #AI, #ProbabilisticReasoning, #RoughSets, #SoftSetTheory, #ChaosTheory, #AntColonyOptimization, #ParticleSwarmOptimization, #NatureInspiredComputing

Comments

Popular posts from this blog

HealthAIoT: Revolutionizing Smart Healthcare! HealthAIoT combines Artificial Intelligence and the Internet of Things to transform healthcare through real-time monitoring, predictive analytics, and personalized treatment. It enables smarter diagnostics, remote patient care, and proactive health management, enhancing efficiency and outcomes while reducing costs. HealthAIoT is the future of connected, intelligent, and patient-centric healthcare systems. What is HealthAIoT? HealthAIoT is the convergence of Artificial Intelligence (AI) and the Internet of Things (IoT) in the healthcare industry. It integrates smart devices, sensors, and wearables with AI-powered software to monitor, diagnose, and manage health conditions in real-time. This fusion is enabling a new era of smart, connected, and intelligent healthcare systems . Key Components IoT Devices in Healthcare Wearables (e.g., smartwatches, fitness trackers) Medical devices (e.g., glucose monitors, heart rate sensors) Rem...
Detecting Co-Resident Attacks in 5G Clouds! Detecting co-resident attacks in 5G clouds involves identifying malicious activities where attackers share physical cloud resources with victims to steal data or disrupt services. Techniques like machine learning, behavioral analysis, and resource monitoring help detect unusual patterns, ensuring stronger security and privacy in 5G cloud environments. Detecting Co-Resident Attacks in 5G Clouds In a 5G cloud environment, many different users (including businesses and individuals) share the same physical infrastructure through virtualization technologies like Virtual Machines (VMs) and containers. Co-resident attacks occur when a malicious user manages to place their VM or container on the same physical server as a target. Once co-residency is achieved, attackers can exploit shared resources like CPU caches, memory buses, or network interfaces to gather sensitive information or launch denial-of-service (DoS) attacks. Why are Co-Resident Attack...
 How Network Polarization Shapes Our Politics! Network polarization amplifies political divisions by clustering like-minded individuals into echo chambers, where opposing views are rarely encountered. This reinforces biases, reduces dialogue, and deepens ideological rifts. Social media algorithms further intensify this divide, shaping public opinion and influencing political behavior in increasingly polarized and fragmented societies. Network polarization refers to the phenomenon where social networks—both offline and online—become ideologically homogenous, clustering individuals with similar political beliefs together. This segregation leads to the formation of echo chambers , where people are primarily exposed to information that reinforces their existing views and are shielded from opposing perspectives. In political contexts, such polarization has profound consequences: Reinforcement of Biases : When individuals only interact with like-minded peers, their existing beliefs bec...