1,736 Hits in 3.7 sec

Emerging Trends of Recently Published Datasets for Intrusion Detection Systems (IDS): A Survey [article]

Rishabh Jindal, Adnan Anwar
2021 arXiv   pre-print
From classic network-based Denial of Service (DoS) attacks to the more recent concerns of privacy compromises, Intrusion Detection Systems (IDS) are becoming an urgent need to safeguard the modern information  ...  In doing so, the discussion emphasizes the need for the publication of even more modern datasets, especially for emerging technologies such as the Internet of Things (IoT) and smartphone devices, to ensure  ...  Overview of Intrusion Detection Intrusion detection refers to the process of monitoring a network or system to identify malicious activity.  ... 
arXiv:2110.00773v1 fatcat:wsuaxigofvbphmmvai4k4235tm

A Survey of Intrusion Detection Using Deep Learning in Internet of Things

baraa I. Farhan, Ammar D.Jasim
2022 Iraqi Journal for Computer Science and Mathematics  
The use of deep learning in various models is a powerful tool in detecting IoT attacks, identifying new types of intrusion to access a better secure network.  ...  To evaluate the performance we show accuracy measurement for detect intrusion in different systems.  ...  CONFLICTS OF INTEREST The authors declare no conflict of interest.  ... 
doi:10.52866/ijcsm.2022.01.01.009 fatcat:ttdhhdmqr5gzvo32j66ofiouua

Deep Learning Approaches for Intrusion Detection in IIoT Networks – Opportunities and Future Directions

Thavavel Vaiyapuri, Zohra Sbai, Haya Alaskar, Nourah Ali
2021 International Journal of Advanced Computer Science and Applications  
The intrusion detection system (IDS) that monitors the network traffic and detects the behaviour of the network is considered as one of the key security solution for securing IIoT application from attacks  ...  In this paper, we present a survey of deep learning-based IDS technique for IIoT.  ...  ACKNOWLEDGMENT The authors are very grateful to thank their Deanship of Scientific Research for technical and financial support in publishing this work successfully.  ... 
doi:10.14569/ijacsa.2021.0120411 fatcat:vhguxgz3x5fxvde65ljlvmhanq

Reinforcement Learning Rebirth, Techniques, Challenges, and Resolutions

Wasswa Shafik, Mojtaba Matinkhah, Parisa Etemadinejad, Mammann Nur Sanda
2020 JOIV: International Journal on Informatics Visualization  
In this paper, we comprehensively survey an in-depth assessment of RL techniques in IoT systems focusing on the main known RL techniques like artificial neural network (ANN), Q-learning, Markov Decision  ...  The results obtained can be used as a foundation for designing, a model implementation based on the bottlenecks currently assessed with an evaluation of the most fashionable hands-on utility of current  ...  ACKNOWLEDGMENT We would like to extend appreciation and express our gratitude to the Department members of the Computer Engineering faculty for their remarks and assistance for us to accomplish the superiority  ... 
doi:10.30630/joiv.4.3.376 fatcat:tnfziwkvkfcm5irfdmninssm44

A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT

Junaid Arshad, Muhammad Ajmal Azad, Roohi Amad, Khaled Salah, Mamoun Alazab, Razi Iqbal
2020 Electronics  
Specifically, this paper presents a comprehensive study of existing intrusion detection systems for IoT systems in three aspects: computational overhead, energy consumption and privacy implications.  ...  However, due to unique characteristics of such systems i.e., battery power, bandwidth and processor overheads and network dynamics, intrusion detection for IoT is a challenge, which requires taking into  ...  Section 3 introduces a comprehensive attack model for IoT systems.  ... 
doi:10.3390/electronics9040629 fatcat:6yqxhlzpp5fzxb7ornwz3iy5aq

Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications

Nasr Abosata, Saba Al-Rubaye, Gokhan Inalhan, Christos Emmanouilidis
2021 Sensors  
It further provides a critical analysis of the existing IoT/IIoT solutions based on different security mechanisms, including communications protocols, networking, cryptography and intrusion detection systems  ...  To provide a roadmap for researchers, this survey discusses the integrity of industrial IoT systems and highlights the existing security approaches for the most significant industrial applications.  ...  The authors provide a comprehensive analysis of the applied intrusion detection systems on SCADA.  ... 
doi:10.3390/s21113654 pmid:34073975 fatcat:xkrxpjwiuza6jjyvpps74pdpgm

A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges

Ansam Khraisat, Ammar Alazab
2021 Cybersecurity  
This survey paper presents a comprehensive review of contemporary IoT IDS and an overview of techniques, deployment Strategy, validation strategy and datasets that are commonly applied for building IDS  ...  To this end, Numerous IoT intrusion detection Systems (IDS) have been proposed in the literature to tackle attacks on the IoT ecosystem, which can be broadly classified based on detection technique, validation  ...  The authors are grateful to the Centre for. Informatics and Applied Optimization (CIAO) for their support.  ... 
doi:10.1186/s42400-021-00077-7 fatcat:32nrdpgvkjg4ljjxc44rewc55y

Evaluating Standard Feature Sets Towards Increased Generalisability and Explainability of ML-based Network Intrusion Detection [article]

Mohanad Sarhan, Siamak Layeghy, Marius Portmann
2021 arXiv   pre-print
Machine Learning (ML)-based network intrusion detection systems bring many benefits for enhancing the cybersecurity posture of an organisation.  ...  Many systems have been designed and developed in the research community, often achieving a close to perfect detection rate when evaluated using synthetic datasets.  ...  Introduction Network Intrusion Detection Systems (NIDSs) aim to protect and preserve digital networks from cyber threats [1] .  ... 
arXiv:2104.07183v2 fatcat:7gj7obaigzhzzmip5vsizkimfu

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [article]

Mohammed Ali Al-Garadi, Amr Mohamed, Abdulla Al-Ali, Xiaojiang Du, Mohsen Guizani
2018 arXiv   pre-print
The goal of this work is to provide a comprehensive survey of ML /DL methods that can be used to develop enhanced security methods for IoT systems.  ...  On the other hand, the crosscutting nature of IoT systems and the multidisciplinary components involved in the deployment of such systems introduced new security challenges.  ...  [21] conducted a survey on intrusion detection for IoT systems.  ... 
arXiv:1807.11023v1 fatcat:a3onbmcf65acpkrtlywcv42tm4

A Review of Intrusion Detection Systems and Their Evaluation in the IoT [article]

Luca Arnaboldi, Charles Morisset
2021 arXiv   pre-print
Intrusion Detection Systems (IDS) are key components for securing critical infrastructures, capable of detecting malicious activities on networks or hosts.  ...  The procedure of implementing a IDS for Internet of Things (IoT) networks is not without challenges due to the variability of these systems and specifically the difficulty in accessing data.  ...  Collaborative Intrusion Detection for IoT A collaborative IDS makes use of different IDSs together in a single system.  ... 
arXiv:2105.08096v1 fatcat:5gzpin2jxnajnema34pn744gry

An Ontology-Based Cybersecurity Framework for the Internet of Things

Bruno Mozzaquatro, Carlos Agostinho, Diogo Goncalves, João Martins, Ricardo Jardim-Goncalves
2018 Sensors  
The use of sensors and actuators as a form of controlling cyber-physical systems in resource networks has been integrated and referred to as the Internet of Things (IoT).  ...  The authors propose an ontology-based cybersecurity framework using knowledge reasoning for IoT, composed of two approaches: (1) design time, which provides a dynamic method to build security services  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s18093053 pmid:30213085 pmcid:PMC6163186 fatcat:wyfhwsthb5bp5eirx5apmuwirq

Towards a Secure Internet of Things: A Comprehensive Study of Second Line Defense Mechanisms

Kamaldeep, Maitreyee Dutta, Jorge Granjal
2020 IEEE Access  
This paper presents a comprehensive study of existing second line of defense mechanisms for standardized protocols in IoT networks.  ...  The paper analyzes existing mechanisms in three aspects: Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) and Intrusion Response Systems (IRS).  ...  Therefore, the usage of a second line of defense, particularly Intrusion Detection Systems (IDSs), is deemed important for detecting malicious intrusions.  ... 
doi:10.1109/access.2020.3005643 fatcat:wdh62xhb6vh7tpeap44mmftigi

A survey of IoT security threats and defenses

Hassan I. Ahmed, Abdurrahman A. Nasr, Salah Abdel-Mageid, Heba K. Aslan
2019 International Journal of Advanced Computer Research  
IoT environment can connect billions of devices or objects, each one has an ID for identification proof.  ...  Internet of Things (IoT) plays a well-known role in the interconnection of the physical and virtual objects for the purpose of exchanging information.  ...  Conflicts of interest The authors have no conflicts of interest to declare.  ... 
doi:10.19101/ijacr.2019.940088 fatcat:wt3yxyezpvd2vcoictluggdei4

İkili Gri Kurt Optimizasyonu (BGWO) ve Naive Bayes (NB) Kullanılarak Yeni Bir Hibrit IoT Tabanlı IDS

Erkan ÜLKER, Ismail Mohamed NUR
2020 European Journal of Science and Technology  
Thus, IoT based Intrusion Detection System (IDS) is required to detect the attacks.  ...  The Internet of Things (IoT) model has newly evolved into the technology for establishing smart environments.  ...  BoT-IoT is one of the most up-to-date data set for intrusion detection.  ... 
doi:10.31590/ejosat.804113 fatcat:qtlew3w7j5ggnlytz2t7vsh47i

IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses

Khalid Albulayhi, Abdallah A. Smadi, Frederick T. Sheldon, Robert K. Abercrombie
2021 Sensors  
This paper surveys the deep learning (DL) approaches for intrusion-detection systems (IDSs) in Internet of Things (IoT) and the associated datasets toward identifying gaps, weaknesses, and a neutral reference  ...  All techniques in these three categories have essentially been used in IoT environments. To date, only a few have been used in the anomaly-based IDS for IoT.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s21196432 pmid:34640752 fatcat:i2oz5t2nwzc6llexqayyaoezrq
« Previous Showing results 1 — 15 out of 1,736 results