ABSTRACT: Intrusion detection systems are used to find the best possible ways to protect IoT networks and the need for
defense methods that detect attackers. Intrusion detection systems help the network to resist external attacks.However, it is difficult to use traditional IDS techniques in IoT due to its specific characteristics such as resource-
intensive devices, limited specific protocol stacks, and standards. In fact, the new features and mechanisms of IoTcannot be provided by conventional security protocols used in the Internet. In the study deep learning algorithm,
classification is done...
Keywords: IOT, Feature Selection, Recurrent Neural Networks, GRU
[1]. Ng, C. B., Tay, Y. H., & Goi, B. M. (2015). A Review Of Facial Gender Recognition. Pattern Analysis And Applications, 18(4), 739-
755.
[2]. Ahmad, H., & Halim, H. (2017). Determining Sample Size For Research Activities: The Case Of Organizational Research. Selangor
Business Review, 20-34.
[3]. Aje, O. I., Odusami, K. T., & Ogunsemi, D. R. (2009). The Impact Of Contractors' Management Capability On Cost And Time
Performance Of Construction Projects In Nigeria. Journal Of Financial Management Of Property And Construction, 14(2), 171-187.
[4]. Imagej. (2018). Available: Https://Imagej.Nih.Gov
[5]. Ng, C. B., Tay, Y. H., & Goi, B. M. (2012). Vision-Based Human Gender Recognition: A Survey. Arxiv Preprint Arxiv:1204.1611.