{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T07:01:23Z","timestamp":1777705283299,"version":"3.51.4"},"reference-count":14,"publisher":"SAGE Publications","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2024,2,14]]},"abstract":"<jats:p>In the past couple of years, neural networks have gained widespread use in network security analysis. This type of analysis is usually performed in a nonlinear and highly correlated manner. Due to the immense amount of data traffic, the current models are prone to false alarms and poor detection. Deep-learning models can help security researchers identify and extract data features that are related to an attack. They can also minimize the data\u2019s dimensionality and detect intrusions. Unfortunately, the complexity of the network structure and hidden neurons of a deep-learning model can be set by error-prone procedures. In order to improve the performance of deep learning models, a new algorithm is proposed. This method combines a gradient boost regression and particle swarm optimization. The proposes a method called the Spark-DBN-SVM-GBR algorithm. The simulations conducted proposed algorithm revealed that it has a better accuracy rate than other deep learning models and the experiments conducted on the PSO-GBR algorithm revealed that it performed better than the current optimization technique when detecting unauthorized attack activities.<\/jats:p>","DOI":"10.3233\/jifs-221351","type":"journal-article","created":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T11:03:07Z","timestamp":1695985387000},"page":"5455-5463","source":"Crossref","is-referenced-by-count":1,"title":["An early discovery of intrusion attack using novel optimized deep learning for internet of things"],"prefix":"10.1177","volume":"46","author":[{"given":"M.","family":"Anandha Kumar","sequence":"first","affiliation":[{"name":"Department of Information Technology, MAM College of Engineering, Trichy, Tamil Nadu, India"}]},{"given":"M.","family":"Shanmuga Priya","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, MAM College of Engineering, Trichy, Tamil Nadu, India"}]},{"given":"R.","family":"Arunprakash","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University College of Engineering, Ariyalur, Tamilnadu, India"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-221351_ref2","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.comcom.2020.05.043","article-title":"Learning to upgrade internet information security and protection strategy in big data era","volume":"160","author":"Guo","year":"2020","journal-title":"Computer Communications"},{"key":"10.3233\/JIFS-221351_ref3","first-page":"1","article-title":"The rise of \u201cInternet of Things\u201d: review and open research issues related to detection and prevention of IoT-based security attacks","volume":"2022","author":"Shafiq","year":"2022","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"1","key":"10.3233\/JIFS-221351_ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-019-0248-6","article-title":"Big data analysis and distributed deep learning for next-generation intrusion detection system optimization","volume":"6","author":"Al Jallad","year":"2019","journal-title":"Journal of Big Data"},{"issue":"1","key":"10.3233\/JIFS-221351_ref5","doi-asserted-by":"crossref","first-page":"30","DOI":"10.34306\/ijcitsm.v2i1.74","article-title":"Wireless Network Security Design And Analysis Using Wireless Intrusion Detection System","volume":"2","author":"Maesaroh","year":"2022","journal-title":"International Journal of Cyber and IT Service Management"},{"key":"10.3233\/JIFS-221351_ref6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10922-021-09589-6","article-title":"As-ids: Anomaly and signature based ids for the internet of things","volume":"29","author":"Otoum","year":"2021","journal-title":"Journal of Network and Systems Management"},{"issue":"18","key":"10.3233\/JIFS-221351_ref7","doi-asserted-by":"crossref","first-page":"8383","DOI":"10.3390\/app11188383","article-title":"Anomaly-based intrusion detection systems in iot using deep learning: A systematic literature review","volume":"11","author":"Alsoufi","year":"2021","journal-title":"Applied Sciences"},{"issue":"1","key":"10.3233\/JIFS-221351_ref8","doi-asserted-by":"crossref","first-page":"e4150","DOI":"10.1002\/ett.4150","article-title":"Network intrusion detection system: A systematic study of machine learning and deep learning approaches","volume":"32","author":"Ahmad","year":"2021","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"14","key":"10.3233\/JIFS-221351_ref9","doi-asserted-by":"crossref","first-page":"1631","DOI":"10.3390\/math9141631","article-title":"Blockchain technology for secure accounting management: research trends analysis","volume":"9","author":"Abad-Segura","year":"2021","journal-title":"Mathematics"},{"key":"10.3233\/JIFS-221351_ref10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-018-0141-8","article-title":"Privacy preservation techniques in big data analytics: a survey","volume":"5","author":"Ram Mohan Rao","year":"2018","journal-title":"Journal of Big Data"},{"issue":"3","key":"10.3233\/JIFS-221351_ref11","doi-asserted-by":"crossref","first-page":"2555","DOI":"10.32604\/cmc.2021.012941","article-title":"Deep learning based optimal multimodal fusion framework for intrusion detection systems for healthcare data","volume":"66","author":"Nguyen","year":"2021","journal-title":"CMC-Computers Materials & Continua"},{"issue":"3","key":"10.3233\/JIFS-221351_ref13","doi-asserted-by":"crossref","first-page":"e3803","DOI":"10.1002\/ett.3803","article-title":"DL-IDS: a deep learning\u2013based intrusion detection framework for securing IoT","volume":"33","author":"Otoum","year":"2022","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"3","key":"10.3233\/JIFS-221351_ref14","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/s10207-020-00508-5","article-title":"A novel scalable intrusion detection system based on deep learning","volume":"20","author":"Mighan","year":"2021","journal-title":"International Journal of Information Security"},{"key":"10.3233\/JIFS-221351_ref17","doi-asserted-by":"crossref","first-page":"1527","DOI":"10.1162\/neco.2006.18.7.1527","article-title":"A fast-learning algorithm for deep belief nets","volume":"18","author":"Hinton","year":"2006","journal-title":"Neural Comput"},{"issue":"5","key":"10.3233\/JIFS-221351_ref19","first-page":"687","article-title":"Research on intrusion detection based on deep confidence network","volume":"08","author":"Lin","year":"2018","journal-title":"Comput. Sci. Appl"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-221351","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:43:24Z","timestamp":1777455804000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-221351"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,14]]},"references-count":14,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.3233\/jifs-221351","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,14]]}}}