Anomaly based Intrusion Detection to Enhance IoT Devices Security using LSTM and Radial Basis Function Approach
The growing prevalence of IoT devices has rendered their security a paramount issue. Intrusion detection is essential for protecting IoT systems from potential attackers. Anomaly-based intrusion detection systems, despite their capacity to identify previously undiscovered threats, are frequently dis...
Saved in:
| Published in: | 2025 3rd International Conference on Data Science and Information System (ICDSIS) pp. 1 - 6 |
|---|---|
| Main Authors: | , , , , , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
16.05.2025
|
| Subjects: | |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | The growing prevalence of IoT devices has rendered their security a paramount issue. Intrusion detection is essential for protecting IoT systems from potential attackers. Anomaly-based intrusion detection systems, despite their capacity to identify previously undiscovered threats, are frequently disregarded in favour of signature-based detection methods. Nonetheless, anomaly-based methods can be equally efficacious in thwarting intrusions. A significant problem in this field is assessing the efficacy of diverse anomaly detection strategies, which has led to reluctance among organisations in implementing these methods. The suggested methodology comprises three fundamental steps: data cleansing, feature extraction, and model training. During preprocessing, the most pertinent properties are chosen. PCA is utilised for feature extraction to discern the most informative attributes. The model is further trained with LSTM-RBF networks to improve detecting skills. The experimental findings demonstrate that the suggested method surpasses the two predominant alternatives, LSTM and RBF, attaining a detection rate of 97% and a low false alarm rate of 2%. The findings underscore the exceptional efficacy of the proposed LSTM-RBF method in accurately detecting intrusions while minimising false alarms, thereby illustrating its potential to enhance IoT security frameworks and promote the broader implementation of anomaly-based techniques in practical applications. |
|---|---|
| DOI: | 10.1109/ICDSIS65355.2025.11071203 |