Your browser doesn't support javascript.
loading
Analyzing anonymous activities using Interrupt-aware Anonymous User-System Detection Method (IAU-S-DM) in IoT.
Alshahrani, Hani; Anjum, Mohd; Shahab, Sana; Al Reshan, Mana Saleh; Sulaiman, Adel; Shaikh, Asadullah.
Affiliation
  • Alshahrani H; Department Computer Science, College of Computer Science and Information Systems, Najran University, 61441, Najran, Saudi Arabia.
  • Anjum M; Emerging Technologies Research Lab (ETRL), College of Computer Science and Information Systems, Najran University, 61441, Najran, Saudi Arabia.
  • Shahab S; Department of Computer Engineering, Aligarh Muslim University, Aligarh, 202002, India.
  • Al Reshan MS; Department of Business Administration, College of Business Administration, Princess Nourah Bint Abdulrahman University, PO Box 84428, 11671, Riyadh, Saudi Arabia.
  • Sulaiman A; Emerging Technologies Research Lab (ETRL), College of Computer Science and Information Systems, Najran University, 61441, Najran, Saudi Arabia.
  • Shaikh A; Department Information Systems, College of Computer Science and Information Systems, Najran University, 61441, Najran, Saudi Arabia.
Sci Rep ; 14(1): 18075, 2024 Aug 05.
Article in En | MEDLINE | ID: mdl-39103381
ABSTRACT
The intrusion detection process is important in various applications to identify unauthorized Internet of Things (IoT) network access. IoT devices are accessed by intermediators while transmitting the information, which causes security issues. Several intrusion detection systems are developed to identify intruders and unauthorized access in different software applications. Existing systems consume high computation time, making it difficult to identify intruders accurately. This research issue is mitigated by applying the Interrupt-aware Anonymous User-System Detection Method (IAU-S-DM). The method uses concealed service sessions to identify the anonymous interrupts. During this process, the system is trained with the help of different parameters such as origin, session access demands, and legitimate and illegitimate users of various sessions. These parameters help to recognize the intruder's activities with minimum computation time. In addition, the collected data is processed using the deep recurrent learning approach that identifies service failures and breaches, improving the overall intruder detection rate. The created system uses the TON-IoT dataset information that helps to identify the intruder activities while accessing the different data resources. This method's consistency is verified using the metrics of service failures of 10.65%, detection precision of 14.63%, detection time of 15.54%, and classification ratio of 20.51%.
Key words

Full text: 1 Collection: 01-internacional Database: MEDLINE Language: En Journal: Sci Rep Year: 2024 Document type: Article Affiliation country: Saudi Arabia Country of publication: United kingdom

Full text: 1 Collection: 01-internacional Database: MEDLINE Language: En Journal: Sci Rep Year: 2024 Document type: Article Affiliation country: Saudi Arabia Country of publication: United kingdom