Articles with "based ids" as a keyword



Photo from wikipedia

AS-IDS: Anomaly and Signature Based IDS for the Internet of Things

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of Network and Systems Management"

DOI: 10.1007/s10922-021-09589-6

Abstract: The Internet of Things (IoT) is a massively extensive environment that can manage many diverse applications. Security is critical due to potential malicious threats and the diversity of the connectivity. Devices can protect themselves and… read more here.

Keywords: traffic; ids anomaly; signature based; based ids ... See more keywords
Photo by betteratf8 from unsplash

Generating realistic IoT‐based IDS dataset centred on fuzzy qualitative modelling for cyber‐physical systems

Sign Up to like & get
recommendations!
Published in 2020 at "Electronics Letters"

DOI: 10.1049/el.2019.4158

Abstract: Before using any dataset in the intrusion detection system (IDS), it is crucial to acquire an accurate assessment of its efficiency. Nevertheless, the key complications presently met by the researchers are the deficiency of accessibility… read more here.

Keywords: generating realistic; ids dataset; realistic iot; iot based ... See more keywords
Photo from wikipedia

Adversarial RL-Based IDS for Evolving Data Environment in 6LoWPAN

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3214099

Abstract: Low-power and Lossy Networks (LLNs) comprise nodes characterised by constrained computational power, memory, and energy resources. The LLN nodes empower ubiquitous connections amongst numerous devices (e.g. temperature, humidity, and turbidity sensors, together with motors, valves… read more here.

Keywords: data environment; based ids; environment; adversarial based ... See more keywords
Photo by campaign_creators from unsplash

Intrusion Detection System After Data Augmentation Schemes Based on the VAE and CVAE

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Reliability"

DOI: 10.1109/tr.2022.3164877

Abstract: Industrial Internet of Things (IoT) is the most rapidly developing industry in the current IoT industry, and the intrusion detection system (IDS) remains one of the key technologies for industrial IoT security protection. Researchers have… read more here.

Keywords: intrusion detection; based ids; data augmentation; intrusion ... See more keywords
Photo by mariusoprea from unsplash

An Anomaly-Based IDS Framework Using Centroid-Based Classification

Sign Up to like & get
recommendations!
Published in 2022 at "Symmetry"

DOI: 10.3390/sym14010105

Abstract: Botnet is an urgent problem that will reduce the security and availability of the network. When the bot master launches attacks to certain victims, the infected users are awakened, and attacks start according to the… read more here.

Keywords: centroid based; based classification; ids framework; based ids ... See more keywords
Photo by betteratf8 from unsplash

Flow-Based IDS Features Enrichment for ICMPv6-DDoS Attacks Detection

Sign Up to like & get
recommendations!
Published in 2022 at "Symmetry"

DOI: 10.3390/sym14122556

Abstract: Internet Protocol version 6 (IPv6) and its core protocol, Internet Control Message Protocol version 6 (ICMPv6), need to be secured from attacks, such as Denial of Service (DoS) and Distributed DoS (DDoS), in order to… read more here.

Keywords: ddos attacks; based ids; detection; flow based ... See more keywords