User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 16
A new Intrusion Detection System for Secured IoT/IIoT Networks based on LGBM
2023
Journal:  
Gazi Üniversitesi Fen Bilimleri Dergisi Part C: Tasarım ve Teknoloji
Author:  
Abstract:

The Internet of Things (IoT) is one of the technologies used in many fields today. Cyber attacks against IoT/Industrial IoT (IIoT) networks, which are increasingly used thanks to the convenience it provides, are constantly increasing. Detection of attacks against IoT/IIoT networks is one of the popular topics recently. The development of a dataset for IoT applications is essential for the intrusion detection in IoT networks. In this context, the ToN_IoT dataset created in the laboratory of UNSW Canberra (Australia) is one of the most comprehensive datasets that can be used to detect cyber attacks on IoT networks. In this study, fridge, garage door, GPS tracker, modbus, motion light, weather, thermostat datasets related to IoT sensors from ToN_IoT datasets were used. The datasets used were subjected to multi-class classification with the Light Gradient Boosting Machine (LGBM) classifier proposed in the study. The obtained results were compared with the literature and it was seen that the proposed method provided the highest classification performance in the literature. It has been determined that the proposed method is effective in preventing cyber attacks on IoT/IIoT networks.

Keywords:

0
2023
Author:  
Citation Owners
Information: There is no ciation to this publication.
Similar Articles










Gazi Üniversitesi Fen Bilimleri Dergisi Part C: Tasarım ve Teknoloji

Field :   Mühendislik

Journal Type :   Ulusal

Metrics
Article : 690
Cite : 1.542
2023 Impact : 0.057
Gazi Üniversitesi Fen Bilimleri Dergisi Part C: Tasarım ve Teknoloji