LI Xiaojia, ZHAO Guosheng, WANG Yang, NING Ke. Improved Internet of Things Intrusion Detection Model for CNN and RNN[J]. Computer Engineering and Applications, 2023, 59(14): 242-250.
[1] MISGRA N,PANDYA S.Internet of things applications,security challenges,attacks,intrusion detection,and future visions:a systematic review[J].IEEE Access,2021,9(10):59353-59377.
[2] ABIODUN O I,ABIODUN E O,ALAWIDA M,et al.A review on the security of the Internet of things:challenges and solutions[J].Wireless Personal Communications,2021,119(3):2603-2637.
[3] KHRAISAT A,ALAZAB A.A critical review of intrusion detection systems in the Internet of things:techniques,deployment strategy,validation strategy,attacks,public datasets and challenges[J].Cybersecurity,2021,4(1):1-27.
[4] ASHARF J,MOUSTAFA N,KHURSHID H,et al.A review of intrusion detection systems using machine and deep learning in Internet of things:challenges,solutions and future directions[J].Electronics,2020,9(7):1177-1222.
[5] LEE S W,MOHAMMADI M,RASHIDI S,et al.Towards secure intrusion detection systems using deep learning techniques:comprehensive analysis and review[J].Journal of Network and Computer Applications,2021,187(10):103111-103133.
[6] MOUSTAFA N.A new distributed architecture for evaluating AI-based security systems at the edge:network TON_IoT datasets[J].Sustainable Cities and Society,2021,72(10):1-36.
[7] WANG W,SHENG Y,WANG J,et al.HAST-IDS:learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection[J].IEEE Access,2017,6(20):1792-1806.
[8] WU P,GUO H.LuNET:a deep neural network for network intrusion detection[C]//2019 IEEE Symposium Series on Computational Intelligence(SSCI),2019:617-624.
[9] SINHA J,MANOLLAS M.Efficient deep CNN-BiLSTM model for network intrusion detection[C]//Proceedings of the 2020 3rd International Conference on Artificial Intelligence and Pattern Recognition,2020:223-231.
[10] HOSSAIN M D,INOUE H,OCHIAI H,et al.LSTM-based intrusion detection system for in-vehicle can bus communications[J].IEEE Access,2020,8(20):185489-185502.
[11] LAGHRISSI F E,DOUZI S,DOUZI K,et al.Intrusion detection systems using long short-term memory (LSTM)[J].Journal of Big Data,2021,8(1):1-16.
[12] ALKAHTANI H,ALDHYANI T H H.Botnet attack detection by using CNN-LSTM model for Internet of things applications[J].Security and Communication Networks,2021,2021(20):1-23.
[13] FU X,ZHOU N,JIAO L,et al.The robust deep learning-based schemes for intrusion detection in Internet of things environments[J].Annals of Telecommunications,2021,76(5):273-285.
[14] LIU C,LIU Y,YAN Y,et al.An intrusion detection model with hierarchical attention mechanism[J].IEEE Access,2020,8(15):67542-67554.
[15] YOU C,WANG Q,SUN C.SBiLSAN:stacked bidirectional self-attention LSTM network for anomaly detection and diagnosis from system logs[C]//Proceedings of SAI Intelligent Systems Conference,2021:777-793.
[16] LO W W,LAYEGHY S,SARHAN M,et al.E-GraphSAGE:a graph neural network based intrusion detection system for IoT[C]//NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium,2022:1-9.
[17] KUMAR P,GUPTA G P,TRIPATHI R.An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks[J].Computer Communications,2021,166(20):110-124.
[18] SARHAN M,LAYEGHY S,MOUSTAFA N,et al.Netflow datasets for machine learning-based network intrusion detection systems[M]//Big data technologies and applications.Cham:Springer,2020:117-135.
[19] WANG Z,OATES T.Imaging time-series to improve classification and imputation[C]//Twenty-Fourth International Joint Conference on Artificial Intelligence,2015:3939-3945.
[20] STERGIOU A,POPPE R,KALLIATAKIS G.Refining activation downsampling with SoftPool[C]//Proceedings of the IEEE/CVF International Conference on Computer Vision,2021:10357-10366.
[21] VASWANI A,SHAZEER N,PARMAR N,et al.Attention is all you need[C]//Advances in Neural Information Processing Systems,2017:1-11.