Sign Up to like & get
recommendations!
1
Published in 2021 at "Journal of Network and Systems Management"
DOI: 10.1007/s10922-021-09589-6
Abstract: The Internet of Things (IoT) is a massively extensive environment that can manage many diverse applications. Security is critical due to potential malicious threats and the diversity of the connectivity. Devices can protect themselves and…
read more here.
Keywords:
traffic;
ids anomaly;
signature based;
based ids ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Electronics Letters"
DOI: 10.1049/el.2019.4158
Abstract: Before using any dataset in the intrusion detection system (IDS), it is crucial to acquire an accurate assessment of its efficiency. Nevertheless, the key complications presently met by the researchers are the deficiency of accessibility…
read more here.
Keywords:
generating realistic;
ids dataset;
realistic iot;
iot based ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2022.3214099
Abstract: Low-power and Lossy Networks (LLNs) comprise nodes characterised by constrained computational power, memory, and energy resources. The LLN nodes empower ubiquitous connections amongst numerous devices (e.g. temperature, humidity, and turbidity sensors, together with motors, valves…
read more here.
Keywords:
data environment;
based ids;
environment;
adversarial based ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Reliability"
DOI: 10.1109/tr.2022.3164877
Abstract: Industrial Internet of Things (IoT) is the most rapidly developing industry in the current IoT industry, and the intrusion detection system (IDS) remains one of the key technologies for industrial IoT security protection. Researchers have…
read more here.
Keywords:
intrusion detection;
based ids;
data augmentation;
intrusion ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Symmetry"
DOI: 10.3390/sym14010105
Abstract: Botnet is an urgent problem that will reduce the security and availability of the network. When the bot master launches attacks to certain victims, the infected users are awakened, and attacks start according to the…
read more here.
Keywords:
centroid based;
based classification;
ids framework;
based ids ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "Symmetry"
DOI: 10.3390/sym14122556
Abstract: Internet Protocol version 6 (IPv6) and its core protocol, Internet Control Message Protocol version 6 (ICMPv6), need to be secured from attacks, such as Denial of Service (DoS) and Distributed DoS (DDoS), in order to…
read more here.
Keywords:
ddos attacks;
based ids;
detection;
flow based ... See more keywords