A Hybrid Deep Learning-Driven SDN Enabled Mechanism for Secure Communication in Internet of Things (IoT)
Abstract
:1. Introduction
1.1. Contribution
- SDN-enabled deep-learning-driven solution is proposed that is highly cost-effective and scalable for threats detection in IoT environment.
- Cu-DNNGRU + Cu-BLSTM classifiers are used for effective threat detection in IoTs.
- Cu-GRULSTM and Cuda- Cu-DNNLSTM are exploited on the same data set to compare ur results.
- For verification purpose, the proposed mechanism is compared with the existing literature works for a better performance evaluation under CICIDS data set.
- Finally, 10 folds cross-validation is conducted in this research to show the unbiasedness of our results.
- The evaluation results show that the proposed mechanism is able to provide a multiclass detection, and outperforms in terms of detection accuracy and computational complexity.
1.2. Organization
2. Related Work
3. Methodology
3.1. Proposed Network Model
3.2. Hybrid DL-Driven Detection Scheme
3.3. Data Set
3.4. Data Set Preprocessing
4. Experimental Setup
Standard Evaluation Metrics
5. Results and Discussion
5.1. Confusion Matrix Analysis
5.2. Cross-Validation
5.3. Roc Curve Analysis
5.4. Accuracy, Recall, F1-Score, and Precision
5.5. FPR, FOR, FNR, and FDR Analysis
5.6. TNR, TPR, and MCC Analysis
5.7. Speed Efficiency
5.8. Proposed Model Comparison with Existing DL Algorithms
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
IoT | Internet of things |
SVM | Support vector machine |
DNN | Deep neural network |
GRU | Gated recurrent unit |
ANN | Artificial neural network |
LSTM | Long short term memory |
SDN | Software-defined Networking |
API | Application programming interface |
DoS | Denial of service |
DDoS | Distributed denial of service |
BLSTM | Bidirectional long short term memory |
IDS | Intrusion detection system |
RF | Random forest |
RNN | Recurrent neural network |
TCP | Transfer control protocol |
IRC | Internet relay chat |
RBM | Restricted boltzmann machine |
DL | Deep learning |
DAE | Deep autoencoder |
CNN | Convolutional neural network |
LOIC | Low orbit ion cannon |
DNS | Domain name system |
UDP | User datagram protocol |
HOIC | High orbit ion cannon |
DFFNN | Deep feed forward neural network |
ROC | Receiver operating characteristic |
AF | Activation function |
LF | Loss function |
Relu | Rectified linear unit |
References
- Mrabet, H.; Belguith, S.; Alhomoud, A.; Jemai, A. A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis. Sensors 2020, 20, 3625. [Google Scholar] [CrossRef]
- Al Shorman, A.; Faris, H.; Aljarah, I. Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection. J. Ambient. Intell. Humaniz. Comput. 2019, 11, 2809–2825. [Google Scholar] [CrossRef]
- Hasan, T.; Giannetsos, A.A.T.; Malik, J. Orchestrating sdn control plane towards enhanced iot security. In Proceedings of the 2020 6th IEEE Conference on Network Softwarization (NetSoft), Ghent, Belgium, 29 June–3 July 2020; pp. 457–464. [Google Scholar]
- Haller, S.K.S.; Schroth, C. The Internet of Things in an Enterprise Context. In Future Internet Symposium; Springer: Berlin/Heidelberg, Germany, 2008; pp. 14–28. [Google Scholar]
- Ferdowsi, A.; Saad, W. Deep Learning for Signal Authentication and Security in Massive Internet-of-Things Systems. IEEE Trans. Commun. 2019, 67, 1371–1387. [Google Scholar] [CrossRef] [Green Version]
- Bhunia, S.S.G.M. Dynamic attack detection and mitigation in IoT using SDN. In Proceedings of the 27th International Telecommunication Networks and Applications Conference (ITNAC), Melbourne, VIC, Australia, 22–24 November 2017; pp. 1–6. [Google Scholar]
- Ben-Asher, N.; Gonzalez, C. Effects of cyber security knowledge on attack detection. Comput. Hum. Behav. 2015, 48, 51–61. [Google Scholar] [CrossRef]
- Ding, D.; Han, Q.-L.; Xiang, Y.; Ge, X.; Zhang, X.-M. A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 2018, 275, 1674–1683. [Google Scholar] [CrossRef]
- Al-Rubaye, S.; Kadhum, E.; Ni, Q.; Anpalagan, A. Industrial Internet of Things Driven by SDN Platform for Smart Grid Resiliency. IEEE Internet Things J. 2019, 6, 267–277. [Google Scholar] [CrossRef] [Green Version]
- Du, M.; Wang, K. An SDN-Enabled Pseudo-Honeypot Strategy for Distributed Denial of Service Attacks in Industrial Internet of Things. IEEE Trans. Ind. Inform. 2020, 16, 648–657. [Google Scholar] [CrossRef]
- Javeed, D.; Gao, T.; Khan, M.T. SDN-Enabled Hybrid DL-Driven Framework for the Detection of Emerging Cyber Threats in IoT. Electronics 2021, 10, 918. [Google Scholar] [CrossRef]
- Zarca, A.M.; Garcia-Carrillo, D.; Bernabe, J.B.; Ortiz, J.; Marin-Perez, R.; Skarmeta, A. Enabling Virtual AAA Management in SDN-Based IoT Networks (dagger). Sensors 2019, 19, 295. [Google Scholar] [CrossRef] [Green Version]
- Wu, K.; Chen, Z.; Li, W. A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks. IEEE Access 2018, 6, 50850–50859. [Google Scholar] [CrossRef]
- Saharkhizan, M.; Azmoodeh, A.; Dehghantanha, A.; Choo, K.-K.R.; Parizi, R.M. An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic. IEEE Internet Things J. 2020, 7, 8852–8859. [Google Scholar] [CrossRef]
- Vinayakumar, R.; Soman, K.P.; Poornachandran, P. Evaluation of Recurrent Neural Network and its Variants for Intrusion Detection System (IDS). Int. J. Inf. Syst. Model. Des. 2017, 8, 43–63. [Google Scholar] [CrossRef]
- Meidan, Y.; Bohadana, M.; Shabtai, A.; Ochoa, M.; Tippenhauer, N.O.; Guarnizo, J.D.; Elovici, Y. Detection of unauthorized iot devices using machine learning techniques. arXiv 2017, arXiv:1709.04647. [Google Scholar]
- Schueller, Q.B.K.; Younas, M.; Patel, M.; Ball, F. A hierarchical intrusion detection system using support vector machine for SDN network in cloud data center. In Proceedings of the 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), Sydney, NSW, Australia, 21–23 November 2018; pp. 1–6. [Google Scholar]
- Nguyen, T.D.; Marchal, S.; Miettinen, M.; Fereidooni, H.; Asokan, N.; Sadeghi, A.-R. DÏoT: A Federated Self-learning Anomaly Detection System for IoT. In Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA, 7–10 July 2019; pp. 756–767. [Google Scholar]
- Torres, P.; Garcia, C.C.S.; Garino, C.G. An analysis of recurrent neural networks for botnet detection behavior. In Proceedings of the 2016 IEEE Biennial Congress of Argentina (ARGENCON), Buenos Aires, Argentina, 15–17 June 2016; pp. 1–6. [Google Scholar]
- Livadas, C.; Walsh, R.; Lapsley, D.; Strayer, W.T. Using machine learning technliques to identify botnet traffic. In Proceedings of the 2006 31st IEEE Conference on Local Computer Networks, Tampa, FL, USA, 14–16 November 2006. [Google Scholar]
- Meng, F.F.; Fu, Y.; Lou, F. A network threat analysis method combined with kernel PCA and LSTM-RNN. In Proceedings of the 2018 Tenth International Conference on Advanced Computational Intelligence (ICACI), Xiamen, China, 29–31 March 2018; pp. 508–513. [Google Scholar]
- Hodo, E.; Bellekens, X.; Hamilton, A.; Dubouilh, P.L.; Iorkyase, E.; Tachtatzis, C.; Atkinson, R. Threat analysis of IoT networks using artificial neural network intrusion detection system. In Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC), Yasmine Hammamet, Tunisia, 11–13 May 2016; pp. 1–6. [Google Scholar]
- Diro, A.A.; Chilamkurti, N. Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener. Comput. Syst. 2018, 82, 761–768. [Google Scholar] [CrossRef]
- Dawoud, A.; Shahristani, S.; Raun, C. Deep learning and software-defined networks: Towards secure IoT architecture. Internet Things 2018, 3–4, 82–89. [Google Scholar] [CrossRef]
- Bull, P.; Austin, R.; Popov, E.; Sharma, M.; Watson, R. Flow Based Security for IoT Devices Using an SDN Gateway. In Proceedings of the 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, Austria, 22–24 August 2016; pp. 157–163. [Google Scholar]
- Latah, M.; Toker, L. Artificial intelligence enabled software-defined networking: A comprehensive overview. IET Netw. 2019, 8, 79–99. [Google Scholar] [CrossRef] [Green Version]
- Haider, A.; Adnan Khan, M.; Rehman, A.; Rahman, M.; Seok Kim, H. A Real-Time Sequential Deep Extreme Learning Machine Cybersecurity Intrusion Detection System. Comput. Mater. Contin. 2021, 66, 1785–1798. [Google Scholar] [CrossRef]
- Arora, K.C.R. Improvement in the performance of deep neural network model using learning rate. In Proceedings of the Innovations in Power and Advanced Computing Technologies (i-PACT), Vellore, India, 21–22 April 2017; pp. 1–5. [Google Scholar]
- Pektaş, A.; Acarman, T. Botnet detection based on network flow summary and deep learning. Int. J. Netw. Manag. 2018, 28, e2039. [Google Scholar] [CrossRef]
- Mansour, A.A.M.; Rizk, M.R.; Abdelazim, M. Biologically-inspired SDN-based intrusion detection and prevention mechanism for heterogeneous IoT networks. In Proceedings of the IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 1–3 November 2018; pp. 1120–1125. [Google Scholar]
- Yuan, X.; Li, C.; Li, X. DeepDefense: Identifying DDoS Attack via Deep Learning. In Proceedings of the IEEE International Conference on Smart Computing (SMARTCOMP), Hong Kong, China, 29–31 May 2017; pp. 1–8. [Google Scholar]
- Li, C.; Wu, Y.; Yuan, X.; Sun, Z.; Wang, W.; Li, X.; Gong, L. Detection and defense of DDoS attack-based on deep learning in OpenFlow-based SDN. Int. J. Commun. Syst. 2018, 31, e3497. [Google Scholar] [CrossRef]
- Priyadarshini, R.; Barik, R.K. A deep learning based intelligent framework to mitigate DDoS attack in fog environment. J. King Saud Univ. Comput. Inf. Sci. 2019, in press. [Google Scholar] [CrossRef]
- Ali, S.; Li, Y. Learning Multilevel Auto-Encoders for DDoS Attack Detection in Smart Grid Network. IEEE Access 2019, 7, 108647–108659. [Google Scholar] [CrossRef]
- Xia, S.-M.; Zhang, L.; Bai, W.; Zhou, X.-Y.; Pan, Z.-S. DDoS Traffic Control Using Transfer Learning DQN With Structure Information. IEEE Access 2019, 7, 81481–81493. [Google Scholar] [CrossRef]
- Chen, J.; Yang, Y.-T.; Hu, K.-K.; Zheng, H.-B.; Wang, Z. DAD-MCNN: DDoS Attack Detection via Multi-channel CNN. In Proceedings of the 2019 11th International Conference on Machine Learning and Computing (ICMLC’19), New York, NY, USA, 22–24 February 2019; pp. 484–488. [Google Scholar]
- Narayanadoss, A.R.; Mohan, T.T.-H.P.M.; Gurusamy, M. Crossfire Attack Detection Using Deep Learning in Software Defined ITS Networks. In Proceedings of the IEEE 89th Vehicular Technology Conference (VTC2019-Spring), Kuala Lumpur, Malaysia, 28 April–1 May 2019; pp. 1–6. [Google Scholar]
- Lin, P.; Ye, K.; Xu, C.-Z. Dynamic Network Anomaly Detection System by Using Deep Learning Techniques. In Proceedings of the International Conference on Cloud Computing, San Diego, CA, USA, 25–30 June 2019; Volume 11513, pp. 161–176. [Google Scholar]
- Hussain, B.; Du, Q.; Sun, B.; Han, Z. Deep Learning-Based DDoS-Attack Detection for Cyber–Physical System Over 5G Network. IEEE Trans. Ind. Inform. 2021, 17, 860–870. [Google Scholar] [CrossRef]
- Ma, L.; Chai, Y.; Cui, L.; Ma, D.; Fu, Y.; Xiao, A. A Deep Learning-Based DDoS Detection Framework for Internet of Things. In Proceedings of the InICC 2020—2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar]
- Ghanbari, M.; Kinsner, W. Detecting DDoS Attacks Using Polyscale Analysis and Deep Learning. Int. J. Cogn. Inform. Nat. Intell. 2020, 14, 17–34. [Google Scholar] [CrossRef]
- Ujjan, R.M.A.; Pervez, Z.; Dahal, K.; Bashir, A.K.; Mumtaz, R.; González, J. Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN. Future Gener. Comput. Syst. 2020, 111, 763–779. [Google Scholar] [CrossRef]
- Koroniotis, N.; Moustafa, N.; Sitnikova, E.; Turnbull, B. Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst. 2019, 100, 779–796. [Google Scholar] [CrossRef] [Green Version]
- Vaccari, I.; Chiola, G.; Aiello, M.; Mongelli, M.; Cambiaso, E. MQTTset, a New Dataset for Machine Learning Techniques on MQTT. Sensors 2020, 20, 6578. [Google Scholar] [CrossRef]
- Nõmm, S.; Bahsi, H.; Medina-Galindo, J.; Guerra-Manzanares, A. MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT Network. In Proceedings of the 6th International Conference on Information Systems Security and Privacy, Valelletta, Malta, 25–27 February 2020; pp. 207–218. [Google Scholar]
- Acar, G.; Huang, D.Y.; Li, F.; Narayanan, A.; Feamster, N. Web-based Attacks to Discover and Control Local IoT Devices. In Proceedings of the 2018 Workshop on IoT Security and Privacy, Budapest, Hungary, 20 August 2018; pp. 29–35. [Google Scholar]
- Ghorbani, A.A.; Habibi Lashkari, A.; Sharafaldin, I. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. In Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP 2018), Madeira, Portugal, 22–24 January 2018; pp. 108–116. [Google Scholar]
- Kim, J.; Kim, J.; Kim, H.; Shim, M.; Choi, E. CNN-Based Network Intrusion Detection against Denial-of-Service Attacks. Electronics 2020, 9, 916. [Google Scholar] [CrossRef]
- Tang, T.A.; McLernon, D.; Mhamdi, L.; Zaidi, S.A.R.; Ghogho, M. Intrusion Detection in Sdn-Based Networks: Deep Recurrent Neural Network Approach in Deep Learning Applications for Cyber Security. In Deep Learning Applications for Cyber Security; Springer: Berlin/Heidelberg, Germany, 2019; pp. 175–195. [Google Scholar]
- Malik, J.; Akhunzada, A.; Bibi, I.; Imran, M.; Musaddiq, A.; Kim, S.W. Hybrid Deep Learning: An Efficient Reconnaissance and Surveillance Detection Mechanism in SDN. IEEE Access 2020, 8, 134695–134706. [Google Scholar] [CrossRef]
- Catillo, M.; Rak, M.; Villano, U. 2L-ZED-IDS: A Two-Level Anomaly Detector for Multiple Attack Classes. In Proceedings of the AINA Workshops 2020, Caserta, Italy, 15–17 April 2020; pp. 687–696. [Google Scholar]
Ref | Algorithm | Approach | Data Set | D.Accuracy | Time Complexity |
---|---|---|---|---|---|
[14] | LSTM | Cyber threats detection in a smart device using a deep learning model | Modbus-TCP | High | High |
[15] | RNN, LSTM, and GRU | Presented ML and DL techniques for intrusion detection | KDDCUP99 | Low | N/A |
[16] | RF | Presented a technique using ML classifier for DDoS attack detection in IoT | Self-generated data set by using Wireshark | High | N/A |
[17] | SVM | Proposed an ML technique for IDS in SDN | DARPA | Medium | N/A |
[18] | GRU | Proposed a self-learning distribution for identifying infected smart devices | Real Shelf Consumer IoT devices | Low | Medium |
[19] | LSTM | Proposed a deep-learning-driven technique for botnet detection | CVUT real-time traffic | High | N/A |
[20] | Bayesian, J48, naïve Bayes | Presented a machine learning approach for IRC botnet detection | Dartmouth wireless network | Low | N/A |
[21] | LSTM-RNN | Propose an ML-driven approach to detected known and unknown threats | NSL-KDD | Low | N/A |
[22] | ANN | Presented ANN learning procedures for intrusion detection by using feed-forward and back learning algorithms | Internet packet traces | High | N/A |
[23] | Deep model | Presented a DL-driven scheme in IoT for the detection of DoS attacks. | NSL-KDD | Medium | Medium |
[24] | RBM | SDN-based DL technique for DoS attacks detection in intelligent devices | KDD99 | Low | N/A |
[27] | RTS-DELM-CSIDS | Presented ML-based approach to develop an intrusion detection system | NSLKDD | Low | High |
[28] | DNN, SVM, J48 and Naivebayes | Presented different algorithms to improve the learning rate of the algorithm, which can predict attacks in IDS | NSL-KDD | Low | N/A |
[29] | CNN and RNN | The proposed methodology can detect botnets at the packet level | ISOT and CTU-13 | Low | High |
Algorithm | Layers | AF | Neurons | LF | Optimizer | Batch-Size | Epochs |
---|---|---|---|---|---|---|---|
Cu-DNNGRU + Cu-BLSTM | Cu-DNNGRU (1) | Relu | (200) | CC-E | |||
Cu-BLSTM (1) | Relu | (100) | CC-E | ||||
Dropout | – | (0.3) | – | Adamax | 32 | 05 | |
Output Layer (1) | Softmax | 07 | |||||
Dense (3) | – | (200,100,50) | – | ||||
Cu-GRULSTM | GRU Layer (1) | Relu | (200) | CC-E | |||
LSTM Layer (1) | Relu | (100) | CC-E | ||||
Dropout | – | (0.3) | – | Adamax | 32 | 05 | |
Dense (3) | – | (200,100,50) | – | ||||
Output Layer (1) | Softmax | 07 | |||||
Cu-DNNLSTM | DNN Layer (1) | Relu | (200) | CC-E | |||
LSTM Layer (1) | Relu | (100) | CC-E | ||||
Dropout | – | (0.3) | – | Adamax | 32 | 05 | |
Dense (3) | – | (200,100,50) | – | ||||
Output Layer (1) | Softmax | 07 |
Classes | Attack | Instances |
---|---|---|
Benign | – | 69,654 |
Bot | – | 2977 |
Brute Force | FTP | 3066 |
DDoS | Loic-UDP | 3015 |
Hoic | 3037 | |
Infiltration | – | 3043 |
Total | 84,702 |
CPU | 7700, i7, 7th Generation with 2.80 GHz processor |
OS | Windows 10, 64 Bit |
GPU | Nvidia GeForce 1060 6 GB |
RAM | 16 GB |
Libraries | Pandas, TensorFlow, Numpy, Scikitlearn, and Keras |
Language | Python with version 3.8 |
Parameter | DL Models | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|---|---|---|---|---|---|---|---|---|---|---|
Accuracy (%) | Cu-DNNGRU + Cu-BLSTM | 99.81 | 99.77 | 99.85 | 99.91 | 99.88 | 99.90 | 99.90 | 99.90 | 99.92 | 99.87 |
Cu-GRULSTM | 98.85 | 99.83 | 99.81 | 98.86 | 98.59 | 99.72 | 99.15 | 99.56 | 99.84 | 99.85 | |
Cu-DNNLSTM | 99.81 | 99.85 | 99.81 | 99.74 | 99.72 | 99.71 | 99.72 | 99.74 | 99.62 | 99.71 | |
F1-score (%) | Cu-DNNGRU + Cu-BLSTM | 99.97 | 99.91 | 99.98 | 99.98 | 99.91 | 100 | 100 | 100 | 100 | 99.94 |
Cu-GRULSTM | 99.89 | 99.92 | 99.95 | 99.95 | 99.96 | 99.98 | 99.65 | 99.95 | 99.91 | 99.95 | |
Cu-DNNLSTM | 99.92 | 99.89 | 99.95 | 99.89 | 99.97 | 99.91 | 99.94 | 99.88 | 99.81 | 99.82 | |
Recall (%) | Cu-DNNGRU + Cu-BLSTM | 99.97 | 99.91 | 99.98 | 99.98 | 99.91 | 100 | 100 | 100 | 100 | 99.94 |
Cu-GRULSTM | 99.89 | 99.92 | 99.95 | 99.95 | 99.45 | 99.86 | 99.95 | 99.89 | 99.91 | 99.95 | |
Cu-DNNLSTM | 99.92 | 99.89 | 99.95 | 99.89 | 99.83 | 99.87 | 99.86 | 99.89 | 99.90 | 99.91 | |
Precision (%) | Cu-DNNGRU + Cu-BLSTM | 99.79 | 99.81 | 99.84 | 99.91 | 99.94 | 99.88 | 99.88 | 99.88 | 99.91 | 99.89 |
Cu-GRULSTM | 99.85 | 99.87 | 99.81 | 99.18 | 99.66 | 99.84 | 99.85 | 99.78 | 99.76 | 99.51 | |
Cu-DNNLSTM | 99.84 | 99.85 | 99.85 | 99.88 | 99.69 | 99.76 | 99.69 | 99.88 | 99.82 | 99.87 |
Ref | Data Set | Accuracy | T.Time | Algorithm | 10 Fold | Cu-E | Precision | F1-Score | Recall |
---|---|---|---|---|---|---|---|---|---|
Proposed model | CICIDS2018 | 99.87% | 18.9 ms | Cu-DNNGRU + Cu-BLSTM | √ | √ | 99.87% | 99.96% | 99.96% |
[48] | CICIDS2018 | 91.50% | – | CNN | – | – | – | – | – |
[49] | CICIDS2017 | 89.00% | – | GRU-RNN | – | – | 99.00% | 99.00% | 99.00% |
[50] | CICIDS2017 | 98.60% | 296 ms | LSTM-CNN | √ | √ | 99.37% | 99.35% | 99.50% |
[51] | CICIDS2018 | 96.11% | – | 2L-ZED-IDS | – | – | 93.20% | – | 96.90% |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Javeed, D.; Gao, T.; Khan, M.T.; Ahmad, I. A Hybrid Deep Learning-Driven SDN Enabled Mechanism for Secure Communication in Internet of Things (IoT). Sensors 2021, 21, 4884. https://doi.org/10.3390/s21144884
Javeed D, Gao T, Khan MT, Ahmad I. A Hybrid Deep Learning-Driven SDN Enabled Mechanism for Secure Communication in Internet of Things (IoT). Sensors. 2021; 21(14):4884. https://doi.org/10.3390/s21144884
Chicago/Turabian StyleJaveed, Danish, Tianhan Gao, Muhammad Taimoor Khan, and Ijaz Ahmad. 2021. "A Hybrid Deep Learning-Driven SDN Enabled Mechanism for Secure Communication in Internet of Things (IoT)" Sensors 21, no. 14: 4884. https://doi.org/10.3390/s21144884
APA StyleJaveed, D., Gao, T., Khan, M. T., & Ahmad, I. (2021). A Hybrid Deep Learning-Driven SDN Enabled Mechanism for Secure Communication in Internet of Things (IoT). Sensors, 21(14), 4884. https://doi.org/10.3390/s21144884