IoT-Based Intrusion Detection System Using New Hybrid Deep Learning Algorithm
Abstract
:1. Introduction
- A new IDS has been developed efficiently in a big data environment using a new hybrid deep learning algorithm.
- The developed algorithm has been tested for both binary and multiclass classification and achieved high accuracy in both cases.
- The developed hybrid algorithm has been compared with ten mostly used machine and deep learning algorithms. The results showed that the proposed hybrid method has better accuracy than traditional methods.
- Deep learning algorithms, such as CNN and LSTM, were individually tested. It was observed that the hybrid algorithm created using CNN and LSTM performs better than using them separately.
- High accuracy has been achieved in a large dataset such as CICIoT2023, which exhibits an imbalanced distribution of values without the use of any balancing methods.
- The addition of a second dataset to the study resulted in a high intrusion detection rate in a different dataset.
2. Related Works
3. DDoS Attacks and Intrusion Detection System for IoTs
3.1. Intrusion Detection Systems
3.2. DDoS
4. Materials and Methods
4.1. Dataset
4.1.1. CICIoT2023
4.1.2. TON_IOT
4.2. Preprocessing
4.3. Deep Learning Algorithms
4.3.1. Convolutional Neural Network (CNN)
- In 1D CNN, the filter moves in one dimension. Input and output data must be two-dimensional. It can be used in time series-type data.
- In 2D CNN, the filter moves in two dimensions. Input and output data must be three-dimensional. It can be used in algorithms that use images as input.
- In 3D CNN, the filter moves in three dimensions. Input and output data must be four-dimensional. It can be used in algorithms that use video as input.
4.3.2. Long Short-Term Memory (LSTM)
5. Definition of Model
6. Experiments and Results
- -
- MacOS v12.6 operating system;
- -
- M1 Apple Silicon (2020);
- -
- 13.3″ screen;
- -
- 8-core CPU;
- -
- 8-core GPU;
- -
- 8 GB RAM;
- -
- 256 GB SSD.
- Random forest: max_depth = 4, n_estimators = 100;
- Decision tree: max_depth = 5, random_state = 0;
- Gradient boost: n_estimators = 10, max_depth = 3, learning_rate = 0.1;
- AdaBoost: n_estimators = 10, learning_rate = 0.1, random_state = 0;
- Naive Bayes: default;
- Logistic regression: default;
- K-nearest neighbour: n_neighbors = 3, leaf_size = 50;
- MLP: hidden_layer_sizes = (5,10,5), max_iter = 5;
- CNN: filters = 64, kernel_size = 2, activation = ‘relu’;
- LSTM: units = 100, dropout = 0.2, and recurrent_dropout = 0.2.
6.1. CICIoT2023 Dataset Results
6.2. TON_IOT Dataset Result
7. Discussion
8. Conclusions and Future Works
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Dener, M.; Al, S.; Orman, A. STLGBM-DDS: An Efficient Data Balanced DoS Detection System for Wireless Sensor Networks on Big Data Environment. IEEE Access 2022, 10, 92931–92945. [Google Scholar] [CrossRef]
- Batchu, R.K.; Seetha, H. A generalized machine learning model for DDoS attacks detection using hybrid feature selection and hyperparameter tuning. Comput. Netw. 2021, 200, 108498. [Google Scholar] [CrossRef]
- Al, S.; Dener, M. STL-HDL: A new hybrid network intrusion detection system for imbalanced dataset on big data environment. Comput. Secur. 2021, 110, 102435. [Google Scholar] [CrossRef]
- Cil, A.E.; Yildiz, K.; Buldu, A. Detection of DDoS attacks with feed forward based deep neural network model. Expert Syst. Appl. 2021, 169, 114520. [Google Scholar] [CrossRef]
- Almaraz-Rivera, J.G.; Perez-Diaz, J.A.; Cantoral-Ceballos, J.A. Transport and Application Layer DDoS Attacks Detection to IoT Devices by Using Machine Learning and Deep Learning Models. Sensors 2022, 22, 3367. [Google Scholar] [CrossRef]
- Jia, Y.; Zhong, F.; Alrawais, A.; Gong, B.; Cheng, X. Flowguard: An intelligent edge defense mechanism against IoT DDoS attacks. IEEE Internet Things J. 2020, 7, 9552–9562. [Google Scholar] [CrossRef]
- Alghazzawi, D.; Bamasag, O.; Ullah, H.; Asghar, M.Z. Efficient detection of DDoS attacks using a hybrid deep learning model with improved feature selection. Appl. Sci. 2021, 11, 11634. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Shu, L.; Djallel, H.; Choo, K.-K.R. Deep learning-based intrusion detection for distributed denial of service attack in Agriculture 4.0. Electronics 2021, 10, 1257. [Google Scholar] [CrossRef]
- Mamoudan, M.M.; Ostadi, A.; Pourkhodabakhsh, N.; Fathollahi-Fard, A.M.; Soleimani, F. Hybrid neural network-based metaheuristics for prediction of financial markets: A case study on global gold market. J. Comput. Des. Eng. 2023, 10, 1110–1125. [Google Scholar] [CrossRef]
- Wei, Y.; Jang-Jaccard, J.; Sabrina, F.; Singh, A.; Xu, W.; Camtepe, S. Ae-mlp: A hybrid deep learning approach for ddos detection and classification. IEEE Access 2021, 9, 146810–146821. [Google Scholar] [CrossRef]
- Kumar, P.; Bagga, H.; Netam, B.S.; Uduthalapally, V. SAD-IoT: Security analysis of ddos attacks in iot networks. Wirel. Pers. Commun. 2022, 122, 87–108. [Google Scholar] [CrossRef]
- Alzahrani, R.J.; Alzahrani, A. Security Analysis of DDoS Attacks Using Machine Learning Algorithms in Networks Traffic. Electronics 2021, 10, 2919. [Google Scholar] [CrossRef]
- Patil, N.V.; Krishna, C.R.; Kumar, K. SSK-DDoS: Distributed stream processing framework based classification system for DDoS attacks. Clust. Comput. 2022, 25, 1355–1372. [Google Scholar] [CrossRef]
- Haq, M.A.; Khan, M.A.R.; AL-Harbi, T. Development of PCCNN-Based Network Intrusion Detection System for EDGE Computing. Comput. Mater. Contin. 2021, 71, 1769. [Google Scholar] [CrossRef]
- Iwendi, C.; Rehman, S.U.; Javed, A.R.; Khan, S.; Srivastava, G. Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures. ACM Trans. Internet Technol. 2021, 21, 1–22. [Google Scholar] [CrossRef]
- Gamal, M.; Abbas, H.M.; Moustafa, N.; Sitnikova, E.; Sadek, R.A. Few-Shot Learning for Discovering Anomalous Behaviors in Edge Networks. Comput. Mater. Contin. 2021, 69, 1823–1837. [Google Scholar] [CrossRef]
- Gad, A.R.; Nashat, A.A.; Barkat, T.M. Intrusion Detection System Using Machine Learning for Vehicular Ad Hoc Networks Based on ToN-IoT Dataset. IEEE Access 2021, 9, 142206–142217. [Google Scholar] [CrossRef]
- Disha, R.A.; Waheed, S. Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection technique. Cybersecurity 2022, 5, 1–22. [Google Scholar] [CrossRef]
- Kaur, J.; Agrawal, A.; Khan, R.A. P2ADF: A privacy-preserving attack detection framework in fog-IoT environment. Int. J. Inf. Secur. 2023, 22, 749–762. [Google Scholar] [CrossRef]
- Verma, R.; Chandra, S. RepuTE: A soft voting ensemble learning framework for reputation-based attack detection in fog-IoT milieu. Eng. Appl. Artif. Intell. 2023, 118, 105670. [Google Scholar] [CrossRef]
- Neto, E.C.P.; Dadkhah, S.; Ferreira, R.; Zohourian, A.; Lu, R.; Ghorbani, A.A. CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment. Sensors 2023, 23, 5941. [Google Scholar] [CrossRef] [PubMed]
- Wang, Z.; Chen, H.; Yang, S.; Luo, X.; Li, D.; Wang, J. A lightweight intrusion detection method for IoT based on deep learning and dynamic quantization. PeerJ Comput. Sci. 2023, 9, e1569. [Google Scholar] [CrossRef] [PubMed]
- Guven, E.N. Examination, Design and Implementation of Intelligent Intrusion Detection Systems. Master’s Thesis, Gazi University Graduate School of Natural and Applied Sciences, Ankara, Turkey, 2007. [Google Scholar]
- Cebeloglu, F.S.; Karakose, M. A cyber security analysis used for unmanned aerial vehicles in the smart city. In Proceedings of the 2019 1st International Informatics and Software Engineering Conference (UBMYK), Ankara, Turkey, 6–7 November 2019; pp. 1–6. [Google Scholar]
- Sreeram, I.; Vuppala, V.P.K. HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm. Appl. Comput. Inform. 2019, 15, 59–66. [Google Scholar] [CrossRef]
- Chen, E.Y. Detecting TCP-based DDoS attacks by linear regression analysis. In Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, Athens, Greece, 21 December 2005; pp. 381–386. [Google Scholar]
- Raptis, G.E.; Katsini, C.; Alexakos, C. Towards Automated Matching of Cyber Threat Intelligence Reports based on Cluster Analysis in an Internet-of-Vehicles Environment. In Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, 26–28 July 2021; pp. 366–371. [Google Scholar]
- Kumari, P.; Jain, A.K. A Comprehensive Study of DDoS Attacks over IoT Network and Their Countermeasures. Comput. Secur. 2023, 127, 103096. [Google Scholar] [CrossRef]
- Ton IoT Dataset. Available online: https://www.unsw.adfa.edu.au/unsw-canberra-cyber/cybersecurity/ADFA-ton-iot-Datasets/ (accessed on 22 October 2023).
- Moustafa, N.; Keshky, M.; Debiez, E.; Janicke, H. Federated TON_IoT Windows datasets for evaluating AI-based security applications. In Proceedings of the IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, 29 December 2020–1 January 2021; IEEE: Piscataway, NJ, USA; pp. 848–855. [Google Scholar]
- Description of Windows 10 Features. Available online: https://cloudstor.aarnet.edu.au/plus/s/ds5zW91vdgjEj9i?path=%2FDescrip[]tion_stats_datasets%2FDescription_stats_Windows_dataset#pdfviewer (accessed on 23 October 2023).
- Kumar, P.; Gupta, G.P.; Tripathi, R. TP2SF: A Trustworthy Privacy-Preserving Secured Framework for sustainable smart cities by leveraging blockchain and machine learning. J. Syst. Arch. 2020, 115, 101954. [Google Scholar] [CrossRef]
- Tsimenidis, S.; Lagkas, T.; Rantos, K. Deep Learning in IoT Intrusion Detection. J. Netw. Syst. Manag. 2022, 30, 8. [Google Scholar] [CrossRef]
- Lin, S.; Tian, H. Short-Term Metro Passenger Flow Prediction Based on Random Forest and LSTM. In Proceedings of the 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chongqing, China, 12–14 June 2020; pp. 2520–2526. [Google Scholar] [CrossRef]
- Khattak, A.; Asghar, M.Z.; Ali, M.; Batool, U. An efficient deep learning technique for facial emotion recognition. Multimedia Tools Appl. 2021, 81, 1649–1683. [Google Scholar] [CrossRef]
- Srivastava, N.; Hinton, G.; Krizhevsky, A.; Sutskever, I.; Salakhutdinov, R. Dropout: A Simple Way to Prevent Neural Networks from Overfitting. J. Mach. Learn. Res. 2014, 15, 1929–1958. [Google Scholar]
- Chartuni, A.; Márquez, J. Multi-Classifier of DDoS Attacks in Computer Networks Built on Neural Networks. Appl. Sci. 2021, 11, 10609. [Google Scholar] [CrossRef]
- Kumar, P.; Gupta, G.P.; Tripathi, R. An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks. Comput. Commun. 2020, 166, 110–124. [Google Scholar] [CrossRef]
- Mohamed, R.H.; Mosa, F.A.; Sadek, R.A. Efficient Intrusion Detection System for IoT Environment. Int. J. Adv. Comput. Sci. Appl. 2022, 13, 4. [Google Scholar] [CrossRef]
- Hairab, B.I.; Aslan, H.K.; Elsayed, M.S.; Jurcut, A.D.; Azer, M.A. Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques. Electronics 2023, 12, 573. [Google Scholar] [CrossRef]
- Dobrojevic, M.; Zivkovic, M.; Chhabra, A.; Sani, N.S.; Bacanin, N.; Amin, M.M. Addressing Internet of Things security by enhanced sine cosine metaheuristics tuned hybrid machine learning model and results interpretation based on SHAP approach. PeerJ Comput. Sci. 2023, 9, e1405. [Google Scholar] [CrossRef] [PubMed]
- Asharf, J.; Moustafa, N.; Khurshid, H.; Debie, E.; Haider, W.; Wahab, A. A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions. Electronics 2020, 9, 1177. [Google Scholar] [CrossRef]
- Zhan, C.; Zhang, X.; Yuan, J.; Chen, X.; Zhang, X.; Fathollahi-Fard, A.M.; Wang, C.; Wu, J.; Tian, G. A hybrid approach for low-carbon transportation system analysis: Integrating CRITIC-DEMATEL and deep learning features. Int. J. Environ. Sci. Technol. 2023, 1–14. [Google Scholar] [CrossRef] [PubMed]
Years | Author | Model | Dataset | Accuracy |
---|---|---|---|---|
2021 | Cil et al. [4] | DNN | CICDDoS2019 | 99.97% (b), 94.57% (m) |
2022 | Almaraz-Rivera et al. [5] | DT, MLP, RNN, RF, GRU, LSTM, and SVM | Bot-IoT | 99.972% (b), 99.945% (m) |
2022 | Jia et al. [6] | DNN, LSTM | CICDDoS2019 | 99.9% (b), 98.9% (m) |
2021 | Alghazzawi et al. [7] | CNN, BiLSTM | CICDDoS2019 | 94.52% (b) |
2021 | Ferrag et al. [8] | CNN, RNN, and DNN | CICDDoS2019, TON_IoT | 99.95% (b), 95.12% (m) 99.92% (m) |
2021 | Wei et al. [10] | MLP | CICDDOS2019 | 99.96% (b), 98.34% (m) |
2022 | Kumar et al. [11] | DT, RF, KNN, NB, and ANN | Bot-IOT | 99.611% (m) |
2021 | Al and Dener [3] | CNN, LSTM | UNS-NB15 and CIDDS-001 | 99.17% (b), 99.83% (m) |
2021 | Alzahrani and Alzahrani [12] | SVM, KNN, DT, NB, RF, and LR. | CICDDOS2019 | 99% (m) |
2021 | Batchu and Seetha [2] | LR, DT, GB, KNN, and SVM | CICDDOS2019 | 99.97% (b) |
2022 | Patil et al. [13] | DT, MLP, NB, and RF | CICDDOS2019 | 89.05% (m) |
2021 | Haq et al. [14] | CNN | NSL-KDD | 99.34% (b), 99.13% (m) |
2021 | Iwendi et al. [15] | LSTM | CICDDOS2019 | 99.97% (b) |
2021 | Gamal et al. [16] | CNN | UNSW-NB15 and Bot-IoT | 99.9% (b) |
2021 | Gad et al. [17] | LR, NB, DT, RF, AdaBoost, KNN, SVM, and XGBoost | TON_IoT | 99.3% (b), 98.6% (m) |
2022 | Disha and Waheed [18] | DT, AdaBoost, GBT, MLP, LSTM, and GRU | TON_IoT, UNSW-NB 15 | 99.98% (b) |
2023 | Kaur et al. [19] | AdaBoost, LR, and KNN | CICDDOS2019, TON_IoT, IoTID20, N-BaIoT, UNSW-NB15 | 99.98 (b) (LDAP), 99.95% (b) (DDoS) |
2023 | Verme and Chandra [20] | Extra Tree, KNN and Quadratic Discriminant Analysis | CICDDOS2019, TON_IoT, NSL-KDD, IoTID20, NBaIoT2018, UNSW_NB15 | 99.9988% (b) (NTP), 99.9851% (b) (DDoS) |
2023 | Neto et al. [21] | RF, DNN, MLP, LR, AdaBoost | CICIoT2023 | 99.68% (b), 99.43% (m) (8 classes) |
2023 | Wang et al. [22] | DL-BiLSTM | CICIoT2023 | 93.13% (m) |
Feature | Description |
---|---|
ts | Timestamp |
flow_duration | Duration of the packet’s flow |
Header_Length | Header length |
ProtocolType | IP, UDP, TCP, IGMP, ICMP, Unknown (integers) |
Duration | Time-to-live (ttl) |
Rate | Rate of packet transmission in a flow |
Srate | Rate of outbound packets’ transmission in a flow |
Drate | Rate of inbound packets’ transmission in a flow |
fin_flag_number | FIN flag value |
syn_flag_number | SYN flag value |
rst_flag_number | RST flag value |
psh_flag_number | PSH flag value |
ack_flag_number | ACK flag value |
ece_flag_number | ECE flag value |
cwr_flag_number | CWR flag value |
ack_count | Number of packets with ACK flag set in the same flow |
syn_count | Number of packets with SYN flag set in the same flow |
fin_count | Number of packets with FIN flag set in the same flow |
urg_count | Number of packets with URG flag set in the same flow |
rst_count | Number of packets with RST flag set in the same flow |
HTTP | Indicates if the application layer protocol is HTTP |
HTTPS | Indicates if the application layer protocol is HTTPS |
DNS | Indicates if the application layer protocol is DNS |
Telnet | Indicates if the application layer protocol is Telnet |
SMTP | Indicates if the application layer protocol is SMTP |
SSH | Indicates if the application layer protocol is SSH |
IRC | Indicates if the application layer protocol is IRC |
TCP | Indicates if the application layer protocol is TCP |
UDP | Indicates if the application layer protocol is UDP |
DHCP | Indicates if the application layer protocol is DHCP |
ARP | Indicates if the application layer protocol is ARP |
ICMP | Indicates if the application layer protocol is ICMP |
IPv | Indicates if the application layer protocol is IPv |
LLC | Indicates if the application layer protocol is LLC |
Totsum | Summation of packets’ lengths in flow |
Min | Minimum packet length in the flow |
Max | Maximum packet length in the flow |
AVG | Average packet length in the flow |
Std | Standard deviation of packet length in the flow |
Totsize | Packet’s length |
IAT | The time difference with previous packet |
Number | The number of packets in the flow |
Magnitue | (Average of the lengths of incoming packets in the flow + average of the lengths of outgoing packets in the flow) × 0.5 |
Radius | (Variance of the lengths of incoming packets in the flow + variance of the lengths of outgoing packets in the flow) × 0.5 |
Covariance | Covariance of the lengths of incoming and outgoing packets |
Variance | Variance of the lengths of incoming packets in the flow/variance of the lengths of outgoing packets in the flow |
Weight | (Number of incoming packets) × (Number of outgoing packets) |
Label | Class | Count |
---|---|---|
DDoS-ICMP_Flood | DDoS | 7,200,047 |
DDoS-UDP_Flood | DDoS | 5,411,768 |
DDoS-TCP_Flood | DDoS | 4,497,763 |
DDoS-PSHACK_Flood | DDoS | 4,094,563 |
DDoS-SYN_Flood | DDoS | 4,059,403 |
DDoS-RSTFINFlood | DDoS | 4,045,410 |
DDoS-SynonymousIP_Flood | DDoS | 3,598,454 |
DoS-UDP_Flood | DoS | 3,318,467 |
DoS-TCP_Flood | DoS | 2,671,471 |
DoS-SYN_Flood | DoS | 2,028,995 |
BenignTraffic | Normal | 1,098,282 |
Mirai-greeth_flood | Mirai | 991,846 |
Mirai-udpplain | Mirai | 890,708 |
Mirai-greip_flood | Mirai | 751,891 |
DDoS-ICMP_Fragmentation | DDoS | 452,557 |
MITM-ArpSpoofing | Spoofing | 307,598 |
DDoS-UDP_Fragmentation | DDoS | 286,968 |
DDoS-ACK_Fragmentation | DDoS | 285,089 |
DNS_Spoofing | Spoofing | 178,902 |
Recon-HostDiscovery | Recon | 134,375 |
Recon-OSScan | Recon | 98,269 |
Recon-PortScan | Recon | 82,267 |
DoS-HTTP_Flood | DoS | 71,844 |
VulnerabilityScan | Recon | 37,379 |
DDoS-HTTP_Flood | DDoS | 28,795 |
DDoS-SlowLoris | DDoS | 23,414 |
DictionaryBruteForce | Brute Force | 13,048 |
BrowserHijacking | Web-Based | 5858 |
CommandInjection | Web-Based | 5419 |
SqlInjection | Web-Based | 5253 |
XSS | Web-Based | 3852 |
Backdoor_Malware | Web-Based | 3221 |
Recon-PingSweep | Recon | 2262 |
Uploading_Attack | Web-Based | 1253 |
Total | 46,686,691 |
Label | Windows 10 |
---|---|
Normal | 24,871 |
DDoS | 4608 |
Injection | 612 |
XSS | 1268 |
Password | 3628 |
Scanning | 447 |
DoS | 525 |
MITM | 15 |
Total | 35,974 |
Filter Number | Kernel Size | Activation Function | |
---|---|---|---|
Conv1D_1 | 128 | 4 | Relu |
Conv1D_2 | 128 | 2 | Relu |
Accuracy | Precision | Recall | F1 Score | |
---|---|---|---|---|
DT | 99.91 | 99.91 | 99.91 | 99.91 |
RF | 99.85 | 99.86 | 99.85 | 99.86 |
LR | 99.86 | 99.86 | 99.86 | 99.86 |
GB | 99.98 | 99.98 | 99.98 | 99.98 |
ADA | 99.75 | 99.75 | 99.75 | 99.75 |
KNN | 99.97 | 99.97 | 99.97 | 99.97 |
MLP | 99.98 | 99.98 | 99.98 | 99.98 |
NB | 99.28 | 99.41 | 99.28 | 99.32 |
CNN | 99.98 | 99.98 | 99.98 | 99.98 |
LSTM | 98.73 | 99.74 | 99.74 | 99.74 |
Proposed | 99.995 | 99.995 | 99.995 | 99.995 |
Accuracy | Precision | Recall | F1 Score | |
---|---|---|---|---|
DT | 86.34 | 82.39 | 86.34 | 82.69 |
RF | 96.58 | 96.98 | 96.58 | 96.51 |
LR | 99.43 | 99.44 | 99.43 | 99.43 |
GB | 99.88 | 99.88 | 99.88 | 99.88 |
ADA | 86.14 | 79.44 | 86.14 | 81.91 |
KNN | 99.86 | 99.86 | 99.86 | 99.86 |
MLP | 99.91 | 99.91 | 99.91 | 99.91 |
NB | 99.09 | 99.13 | 99.09 | 99.10 |
CNN | 99.90 | 99.93 | 99.90 | 99.91 |
LSTM | 98.66 | 98.71 | 98.63 | 98.67 |
Proposed | 99.96 | 99.96 | 99.96 | 99.96 |
Article | Model | Dataset | Accuracy |
---|---|---|---|
Neto et al. (2023) [21] | RF, DNN, MLP, LR, AdaBoost | CICIoT2023 | 99.68% (b), 99.43% (m) (8 classes) |
Wang et al. (2023) [22] | DL-BiLSTM | CICIoT2023 | 93.13% (m) |
Proposed | Hybrid Deep Learning | CICIoT2023 | 99.995% (b), 99.96% (m) (9 classes) |
Accuracy | Precision | Recall | F1 Score | |
---|---|---|---|---|
DT | 97.67 | 97.67 | 97.67 | 97.67 |
RF | 98.23 | 98.23 | 98.23 | 98.23 |
LR | 96.69 | 96.69 | 96.69 | 96.69 |
GB | 97.50 | 97.49 | 97.50 | 97.44 |
ADA | 92.96 | 93.01 | 92.96 | 92.22 |
KNN | 98.50 | 98.58 | 98.50 | 98.52 |
MLP | 98.54 | 98.57 | 98.54 | 98.55 |
CNN | 98.32 | 98.32 | 98.32 | 98.32 |
LSTM | 90.94 | 90.94 | 90.94 | 90.94 |
NB | 76.98 | 88.07 | 76.98 | 77.83 |
Proposed | 98.75 | 98.75 | 98.75 | 98.75 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yaras, S.; Dener, M. IoT-Based Intrusion Detection System Using New Hybrid Deep Learning Algorithm. Electronics 2024, 13, 1053. https://doi.org/10.3390/electronics13061053
Yaras S, Dener M. IoT-Based Intrusion Detection System Using New Hybrid Deep Learning Algorithm. Electronics. 2024; 13(6):1053. https://doi.org/10.3390/electronics13061053
Chicago/Turabian StyleYaras, Sami, and Murat Dener. 2024. "IoT-Based Intrusion Detection System Using New Hybrid Deep Learning Algorithm" Electronics 13, no. 6: 1053. https://doi.org/10.3390/electronics13061053
APA StyleYaras, S., & Dener, M. (2024). IoT-Based Intrusion Detection System Using New Hybrid Deep Learning Algorithm. Electronics, 13(6), 1053. https://doi.org/10.3390/electronics13061053