A network intrusion detection system based on deep learning in the IoT

Abstract

As industrial and everyday devices become increasingly interconnected, the data volume within the Internet of Things (IoT) has experienced a substantial surge. This surge in data presents a heightened risk of IoT environments being vulnerable to cyber attacks, which poses a significant threat to the seamless functioning of both industrial and daily activities. Therefore, the implementation of Network Intrusion Detection System (IDS) is vital for safeguarding the security of IoT network environments. This paper introduces a network intrusion detection model based on deep learning (DL). The model aims to enhance detection accuracy by extracting features from both the spatial and temporal dimensions of network traffic data. To tackle the challenge of low detection accuracy arising from data imbalance, in this study, a Conditional Tabular Generative Adversarial Network (CTGAN) is utilized to generate synthetic data for the minority class. The objective is to enhance the volume of minority class samples, address data imbalance, and subsequently enhance the accuracy of network intrusion detection. The classification performance of the proposed model is validated on UNSW-NB15, CIC-IDS2018, and CIC-IOT2023 datasets. The experimental findings demonstrate that the suggested model attains elevated levels of classification accuracy across all three datasets. The model presented in this article is particularly well suited to handle multi-class intrusion detection tasks. The model demonstrates superior performance compared to other models used for comparison.

Optimizing U-Net CNN performance: a comparative study of noise filtering techniques for enhanced thermal image analysis

Abstract

Infrared thermal imaging presents a promising avenue for detecting physiological phenomena such as hot flushes in animals, presenting a non-invasive and efficient approach for monitoring health and behavior. However, thermal images often suffer from various types of noise, which can impede the accuracy of analysis. In this study, the efficacy of different noise filtering algorithms is investigated utilizing filtering algorithms as preprocessing steps to enhance U-Net convolutional neural network (CNN) performance in processing animal skin infrared image sets for hot flush recognition. This study compares the performance of four commonly used filtering methods: mean, median, Gaussian, and bilateral filters. The impact of each filtering technique on noise reduction and preservation of features critical for hot flush detection is evaluated in a machine learning hot flush detection algorithm. The optimal filtering for skin thermal imaging was a median filter which significantly improved the U-Net CNN’s ability to accurately identify hot flush patterns, achieving an Intersection over Union score of 92.6% compared to 90.4% without filters. This research contributes to the advancement of thermal image processing methodologies for animal health monitoring applications, providing valuable insights for researchers and practitioners in the field of veterinary medicine and animal behavior studies utilizing autonomous thermal image segmentation.

Novel dual-image encryption scheme based on memristive cellular neural network and K-means alogrithm

Abstract

In this paper, we propose a lossless encryption method based on dual images. A cosine perturbation is added to the generalized voltage-controlled memristor, thus constituting a generalized voltage-controlled cosine memristor. And the characteristics of the memristor are analyzed and introduced into a four-dimensional cellular neural network, thus constituting the memristor-based four-dimensional cellular neural network (M4DCNN). The parameters of the M4DCNN are adjusted to achieve a hyperchaotic state for the diffusion and scrambling stages of the image. On the key, the partial key is obtained by K-means algorithm to make the key more random. In the scrambling phase, perturbed logistic chaotic map is introduced in this paper, which makes the image pixels better satisfy the avalanche effect. Through security analysis and comparison with other encryption methods, it is found that the encryption method shows to have good encryption effect in various indexes such as key sensitivity, key space, pixel correlation, information entropy, resistance to shear attack, resistance to noise attack, UACI and NPCR analysis.