Measurement: Sensors (Apr 2024)

Intruder identification using feed forward encasement-based parameters for cybersecurity along with IoT devices

  • R. Sudharsanan,
  • M. Rekha,
  • N. Pritha,
  • G. Ganapathy,
  • G. Arokia Nerling Rasoni,
  • G.S. Uthayakumar

Journal volume & issue
Vol. 32
p. 101035

Abstract

Read online

Using IoT and cloud-based resources that have high-speed storage and processors with maximum bandwidth is obligatory. Live interaction between heterogeneous resources is supported physically and virtually through a variety of modes, which allows heterogeneous resources to interact in real time. These connected devices are often mentioned as pervasive connectivity that can be accessed public often. There are several interactions such as sensors, billing operations and much more services that are highlighted for Internet of Things (IoT) based communication. Existing IoT environments are application oriented data that are mostly sensitive which are ubiquitous collective from various IoT devices. Data classifications are implemented in the surrounding area to facilitate various decisions. The Internet is one of the primary needs in everyone's workplace where multiple advanced handheld devices or laptops are mostly accessed along with the internet for all aspects. Machine learning does the data sharing based on the growth of information collected where some of the intrusion and cyber attacks from IoT devices were not comparatively good in error detection or accurate classifications. Using the proposed algorithm Xception based Feedforward Encasement (XBFE) based Parameters for Cybersecurity along with IoT Devices where cyclic communication among hidden layers that can focus on unsupervised monitoring such that the feature mapping and scaling can filter along with maximum or minimum usage. The main research idea is to use the UNSW-NB15 dataset to analyze cyber attacks from 49 features to enhance the result.

Keywords