<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE ArticleSet PUBLIC "-//NLM//DTD PubMed 2.7//EN" "https://dtd.nlm.nih.gov/ncbi/pubmed/in/PubMed.dtd">
<ArticleSet>
<Article>
<Journal>
				<PublisherName>Amirkabir University of Technology</PublisherName>
				<JournalTitle>AUT Journal of Modeling and Simulation</JournalTitle>
				<Issn>2588-2953</Issn>
				<Volume>51</Volume>
				<Issue>2</Issue>
				<PubDate PubStatus="epublish">
					<Year>2019</Year>
					<Month>12</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Intrusion Detection in IOT based Networks Using Double Discriminant Analysis</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>211</FirstPage>
			<LastPage>220</LastPage>
			<ELocationID EIdType="pii">3593</ELocationID>
			
<ELocationID EIdType="doi">10.22060/miscj.2019.16555.5161</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Maryam</FirstName>
					<LastName>Imani</LastName>
<Affiliation>Department of Electrical Engineering (Communication), Tarbiat Modares University</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2019</Year>
					<Month>06</Month>
					<Day>14</Day>
				</PubDate>
			</History>
		<Abstract>Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to the known attacks and malicious behaviors, there are various unknown attacks which some of them have similar behaviors with respect to each other or mimic the normal behavior. So, classification of connections in IOT based networks is a hard and challenging task. In this paper, an intrusion detection framework is proposed for classification of various attacks and separation of them from the normal connections. The double discriminant embedding (DDE) method is used to transform the original feature space of data. This transform is implemented in two steps. In the first step, the difference between the features is maximized; and in the second one, the difference between classes is increased. The extracted features not only have less overlapping with respect to each other and contain less redundant information but also they provide more separation between different classes. The extracted features are fed to the support vector machine (SVM) with polynomial kernel for classification. The experiments on NSL-KDD dataset have shown improvement of the SVM classifier when the DDE features are used.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Intrusion detection</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Support Vector Regression</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">double discriminant embedding</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Internet of Things</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://miscj.aut.ac.ir/article_3593_587b51f0da65dc24737200274b3ab788.pdf</ArchiveCopySource>
</Article>
</ArticleSet>
