Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Computer Engineering
Proposed Mitigation Framework For The Internet Of Insecure Things, Mahmoud M. Elgindy, Sally M. Elghamrawy, Ali I. El-Desouky
Proposed Mitigation Framework For The Internet Of Insecure Things, Mahmoud M. Elgindy, Sally M. Elghamrawy, Ali I. El-Desouky
Mansoura Engineering Journal
Intrusion detection systems IDS are increasingly utilizing machine learning methods. IDSs are important tools for ensuring the security of network data and resources. The Internet of Things (IoT) is an expanding network of intelligent machines and sensors. However, they are vulnerable to attackers because of the ubiquitous and extensive IoT networks. Datasets from intrusion detection systems (IDS) have been analyzed deep learning methods such as Bidirectional long-short term memory (BiLSTM). This research presents an BiLSTM intrusion detection framework with Principal Component Analysis PCA (PCA-LSTM-IDS). The PCA-LSTM-IDS is comprised of two layers: extracting layer which using PCA, and the anomaly BiLSTM …