Research Article

A Novel Hybrid Feature Selection with Cascaded LSTM: Enhancing Security in IoT Networks

Table 1

Review of existing literature.

TechniqueFunctionalityProsCons

CNNAutomates feature extraction and can be adapted for classificationPretrained CNN models save time and resourcesVulnerable to adversial attacks. CNNs can overfit the training data
RNNCaptures temporal dependencies in data and distinguish normal behavior from suspicious patternsAdaptable to different types of network traffic patterns and diverse datasetsRNNs are prone to the vanishing gradient problem during back-propagation through time
GRUGRUs utilize gating units to selectively manage and update informationCapable of understanding network activities by grasping long-term dependenciesGRUs are prone to overfitting while dealing with imbalanced datasets
AutoencodersAutoencoders do not require labeled intrusion data for trainingWell-suited for unsupervised learning, training autoencoders, especially deep ones, is complexThey do not perform as well in supervised learning tasks where labeled data are abundant
DBFUse unsupervised learning to automatically learn hierarchical representations of dataCan adapt to evolving attack patterns, making them effective for detecting new attacksProper tuning of hyperparameters is essential. DBNs require large and diverse datasets
LSTMAnalyzes sequential network data to detect patterns, anomalies, and identify cyber threats effectivelyCaptures long-term dependencies in sequential data to understand network activities’ context effectivelyLSTM is vulnerable to adversial attacks. Response time is high for large-scale networks