Skip to main content

An Intrusion Detection Method Fused Deep Learning and Fuzzy Neural Network for Smart Home

  • Conference paper
  • First Online:
Intelligent Computing Theories and Application (ICIC 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13393))

Included in the following conference series:

Abstract

Smart home depending on Internet of things (IoT) technologies is facing severe risks in information security. An intrusion detection method fused deep learning and fuzzy neural network for smart home is proposed, according to the method, the data features are built by deep learning methods, the high-dimensional data is mapped into low-dimensional one, and the categories of attack can be analyzed and distinguished based on fuzzy neural network. A method used in optimizing network depth also is provided, and this can overcome the problem from the traditional method which determines the layer number of network depending on experience. The simulation results show that the proposed method including artificial intelligence can improve the detection rate of attacks, for example, the detection rate can reach 94% for the denial of service attack and remote illegal access, and the detection rate of the tested new types of attacks in the network exceeds 60%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yang, Y., Huang, H., Shen, Q., et al.: Research on intrusion detection based on incremental GHSOM. Chin J. Comput. 37(5), 1216–1224 (2014)

    Google Scholar 

  2. Chen, S., Zhong, X., Liu, J., et al.: Safety monitoring for intelligent living-room based on GPRS. Comput. Measur. Control 19(2), 326–328 (2011)

    Google Scholar 

  3. Wu, Z., Zhou, Y., Ma, J.: A security transmission model for Internet of Things. Chin. J. Comput. 34(8), 1351–1364 (2011)

    Article  Google Scholar 

  4. Nobakht, M., Sivaraman, V., Boreli, R.: A host-based intrusion detection and mitigation framework for smart home IoT using open flow. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 147–156. IEEE (2016)

    Google Scholar 

  5. Umer, M.F., Sher, M., Bi, Y.: Flow-based intrusion detection: technique sand challenges. Comput. Secur. 70, 238–254 (2017)

    Article  Google Scholar 

  6. Hinton, G.E., Sejnowski, T.J.: Learning and releaming in Boltzmann machines. Parallel Distril. Process. 1, 282–317 (1986)

    Google Scholar 

  7. Takagi, T., Sugeno, M.: Fuzzy identification of systems and its applications to modeling and control. IEEE Trans. Syst. Man Cybern. 1, 116–132 (1985)

    Article  MATH  Google Scholar 

  8. Alrawashdeh, K., Purdy, C.: Toward an online anomaly intrusion detection system based on deep learning. In: 2016 15th IEEE International Conference on Machine Learning and Applications, pp. 195–200 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangdong Hu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hu, X., Zhang, Q., Yang, X., Yang, L. (2022). An Intrusion Detection Method Fused Deep Learning and Fuzzy Neural Network for Smart Home. In: Huang, DS., Jo, KH., Jing, J., Premaratne, P., Bevilacqua, V., Hussain, A. (eds) Intelligent Computing Theories and Application. ICIC 2022. Lecture Notes in Computer Science, vol 13393. Springer, Cham. https://doi.org/10.1007/978-3-031-13870-6_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-13870-6_52

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-13869-0

  • Online ISBN: 978-3-031-13870-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics