Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/525075
Title: Attack detection and secure IOT using adaptive neuro fuzzy inference scheme
Researcher: Duraisamy, A
Guide(s): Subramaniam, M
Keywords: Attack detection
Computer Science
Computer Science Information Systems
Engineering and Technology
Internet of Things
Neuro fuzzy
University: Anna University
Completed Date: 2022
Abstract: Nowadays, the wide adoption of the modern Internet of Things newline(IoT) paradigm has brought about the tremendous development of smart newlinecities. Smart cities operate in real-time world to promote ease and also the newlinehuman life quality with regard to efficiency and comfort. A security concern newlinealong with privacy is considered as a foremost issue in several smart cities. newlineThe security vulnerability in IoT-centered systems creates security threats newlinewhich affect smart surroundings applications. Therefore, there is basically a newlinerequirement for Intrusion Detection Systems (IDS) for mitigating the newlineIoT-related security outbreaks which took the entire benefits of security newlineliabilities. In existing works, the accuracy in the procedure of detection and newlinesecurity are the main challenge. To trounce these drawbacks, in the first stage newlineof the work the IDS are proposed intended for the identification of attacks in newlineIoT of city depending on the Deep Learning Modified Neural Networks newline(DLMNN) classification approach. Initially, the values of sensor from smart newlinecities are provided to the training phase of IDS system which is then newlineemployed for the purpose of testing values. Then, the step of preprocessing is newlinecarried out, followed by feature selection using entropy-Hummingbird newlineOptimization Algorithm (HOA). The classified outcomes are analyzed newlineafterwards and is employed for the prediction of outcome. Then, the task of newlinesecured data sharing is carried with the use of Krill Heard Advanced newlineEncryption Standard (KH-AES) approach. Finally, the resultant outcome is newlineforecasted. Experimental result of the suggested method employed in newlineclassification, feature selection, and secured data sharing are then compared newlinewith the traditional methods. newline newline
Pagination: xix,133p.
URI: http://hdl.handle.net/10603/525075
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File204.66 kBAdobe PDFView/Open
02_prelim pages.pdf2.58 MBAdobe PDFView/Open
03_content.pdf16.82 kBAdobe PDFView/Open
04_abstract.pdf124.85 kBAdobe PDFView/Open
05_chapter 1.pdf516.28 kBAdobe PDFView/Open
06_chapter 2.pdf449.39 kBAdobe PDFView/Open
07_chapter 3.pdf933.41 kBAdobe PDFView/Open
08_chapter 4.pdf729.53 kBAdobe PDFView/Open
09_chapter 5.pdf584.32 kBAdobe PDFView/Open
10_annexures.pdf171.01 kBAdobe PDFView/Open
80_recommendation.pdf215.27 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: