Analyzing anonymous activities using Interrupt-aware Anonymous User-System Detection Method (IAU-S-DM) in IoT
- Hani Alshahrani 1,2, Mohd Anjum 3, Sana Shahab 4, Mana Saleh Al Reshan 2,5, Adel Sulaiman 6,7, Asadullah Shaikh 2,5
- Hani Alshahrani 1,2, Mohd Anjum 3, Sana Shahab 4
- 1Department Computer Science, College of Computer Science and Information Systems, Najran University, 61441, Najran, Saudi Arabia.
- 2Emerging Technologies Research Lab (ETRL), College of Computer Science and Information Systems, Najran University, 61441, Najran, Saudi Arabia.
- 3Department of Computer Engineering, Aligarh Muslim University, Aligarh, 202002, India.
- 4Department of Business Administration, College of Business Administration, Princess Nourah Bint Abdulrahman University, PO Box 84428, 11671, Riyadh, Saudi Arabia.
- 5Department Information Systems, College of Computer Science and Information Systems, Najran University, 61441, Najran, Saudi Arabia.
- 6Department Computer Science, College of Computer Science and Information Systems, Najran University, 61441, Najran, Saudi Arabia. aaalsulaiman@nu.edu.sa.
- 7Emerging Technologies Research Lab (ETRL), College of Computer Science and Information Systems, Najran University, 61441, Najran, Saudi Arabia. aaalsulaiman@nu.edu.sa.
- 0Department Computer Science, College of Computer Science and Information Systems, Najran University, 61441, Najran, Saudi Arabia.
Related Experiment Videos
Contact us if these videos are not relevant.
Contact us if these videos are not relevant.
View abstract on PubMed
Summary
This summary is machine-generated.This study introduces the Interrupt-aware Anonymous User-System Detection Method (IAU-S-DM) to efficiently detect intruders in Internet of Things (IoT) networks. The novel method significantly reduces computation time for accurate intrusion detection.
Area Of Science
- Cybersecurity
- Network Security
- Internet of Things (IoT)
Background
- Unauthorized access to Internet of Things (IoT) networks poses significant security risks.
- Existing intrusion detection systems often suffer from high computation times, hindering accurate and timely intruder identification.
- Intermediary access during IoT data transmission introduces vulnerabilities.
Purpose Of The Study
- To develop an efficient intrusion detection method for IoT networks.
- To address the challenge of high computation time in existing systems.
- To improve the accuracy and speed of identifying unauthorized access in IoT environments.
Main Methods
- Implementation of the Interrupt-aware Anonymous User-System Detection Method (IAU-S-DM).
- Utilizing concealed service sessions to detect anonymous interrupts.
- Training the system with parameters including origin, session access demands, and user legitimacy.
- Employing a deep recurrent learning approach for data processing to identify service failures and breaches.
Main Results
- The IAU-S-DM method demonstrated a service failure rate of 10.65%.
- Achieved a detection precision of 14.63% and a detection time improvement of 15.54%.
- The classification ratio reached 20.51%, indicating effective intruder activity recognition.
Conclusions
- The IAU-S-DM method offers a computationally efficient solution for detecting intrusions in IoT networks.
- Deep recurrent learning enhances the identification of service failures and breaches, improving detection rates.
- The method effectively utilizes the TON-IoT dataset for identifying intruder activities and validating system consistency.
Related Experiment Videos
Contact us if these videos are not relevant.
Contact us if these videos are not relevant.

