메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색
질문

논문 기본 정보

자료유형
학술저널
저자정보
James Agajo (Federal University of Technology) Thomas Sadiq (Nile University of Nigeria) Fatima Ajiya Umar (Nile University of Nigeria)
저널정보
한국디지털콘텐츠학회 The Journal of Contents Computing JCC Vol.5 No.2
발행연도
2023.12
수록면
699 - 708 (10page)
DOI
10.9728/jcc.2023.12.5.2.699

이용수

표지
📌
연구주제
📖
연구배경
🔬
연구방법
🏆
연구결과
AI에게 요청하기
추천
검색
질문

초록· 키워드

오류제보하기
With the increase in the use of the Internet, most applications now have an online presence, which has increased Internet of Things-based applications. Therefore, implies that most of our applications could be exposed to malicious activity with-in the network, and the burden of protecting the network and detecting any attack quickly becomes more significant as new attacks surface and cyberattacks in-crease. The development of a multi-level data security system for the Internet of Things using dimensionality reduction techniques was first realized by analyzing existing data security systems. This was achieved by developing a multi-level data security system using Dimensionality Reduction Technique. Machine Learning Technique was used to dynamically detect malicious activity beyond the Intruder Detection System (IDS). Firstly, Principal Component Analysis (PCA) was used to authenticate the status of the source of data transmitted. The first layer of IDS was achieved using Naïve Bayes classifier, while Random Forest was adopted in the second layer. The work was able to identify the normal and malicious packets in the first layer, while in the second layer, the type of attacks on the IoT network were identified. Finally, PCA enhanced security by classifying malicious packets. The results demonstrate that our proposed PCA detection model gives a relatively high Precision rate with 95%, 94.4%, 97.5%, 95%, and 96% for the Normal, Flooding, Scheduling, Gray hole, and Blackhole attacks, respectively. The re-search shows that the PCA Technique performed well when deployed, and the test with relevant performance evaluation metrics shows better accuracy regarding detecting malicious Nodes.

목차

Abstract
1. Introduction
2. Review of Related Work
3. Methodology and system analysis
4. Experiment and Result
5. Conclusion
References

참고문헌 (0)

참고문헌 신청

함께 읽어보면 좋을 논문

논문 유사도에 따라 DBpia 가 추천하는 논문입니다. 함께 보면 좋을 연관 논문을 확인해보세요!

이 논문의 저자 정보

최근 본 자료

전체보기

댓글(0)

0

UCI(KEPA) : I410-151-24-02-089273061