4,611 Hits in 4.7 sec

Active Learning for Wireless IoT Intrusion Detection

Kai Yang, Jie Ren, Yanqiao Zhu, Weiyi Zhang
2018 IEEE wireless communications  
Intrusion detection is critical for the security and safety of a wireless IoT network. This paper discusses the human-in-the-loop active learning approach for wireless intrusion detection.  ...  We first present the fundamental challenges against the design of a successful Intrusion Detection System (IDS) for wireless IoT network.  ...  Active Learning for Wireless IoT Intrusion Detection Although many machine learning techniques have been used in building IDSs, there exist limited amount of literatures related to active learning for  ... 
doi:10.1109/mwc.2017.1800079 fatcat:lv2vhwsfnnbovg5cn2h2ncaxtu

Assorted Attack Detection for IoT

Mareeswari Govindaraj
2020 International Journal of Research in Engineering, Science and Management  
For this, we initially create the wireless network and then implement mobility and energy in every node of the network.  ...  In this project, we propose the solution to detect all types of attacks in an IoT environment.  ...  An intrusion detection system (IDS) is a system that monitors network traffic for malicious activity and give alert when such activity is discovered.  ... 
doi:10.47607/ijresm.2020.285 fatcat:cbcbv632v5gaxdrer4e2n2hkfm

Toward an Intrusion Detection Approach for IoT Based on Radio Communications Profiling

Jonathan Roux, Eric Alata, Guillaume Auriol, Vincent Nicomette, Mohamed Kaaniche
2017 2017 13th European Dependable Computing Conference (EDCC)  
Nowadays, more and more Internet-of-Things (IoT) smart products, interconnected through various wireless communication technologies (Wifi, Bluetooth, Zigbee, Z-wave, etc.) are integrated in daily life,  ...  In this paper, we propose a novel approach to detect potential attacks in smart places (e.g. smart homes) by detecting deviations from legitimate communication behavior, in particular at the physical layer  ...  This approach has been investigated in some research works aimed at developing intrusion detection systems for the IoT.  ... 
doi:10.1109/edcc.2017.11 dblp:conf/edcc/RouxAANK17 fatcat:s7i2ywoukzgvjeaxuhzbmzpwhe

Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks

Vasaki Ponnusamy, Mamoona Humayun, N. Z. Jhanjhi, Aun Yichiet, Maram Fahhad Almufareh
2022 Computer systems science and engineering  
Internet of Things (IoT) devices work mainly in wireless mediums; requiring different Intrusion Detection System (IDS) kind of solutions to leverage 802.11 header information for intrusion detection.  ...  This paper's main finding highlights the lack of available network traces for training modern machine-learning models against IoT specific intrusions.  ...  Machine learning based is more automatic in the sense that the system is able to learn the network profile and use it to detect any intrusive activities in the network.  ... 
doi:10.32604/csse.2022.018518 fatcat:5jxfusg7mzg2jjwkw4upuzpl24

Machine Learning Based Intelligent Intrusion Classification System for IoT Gateway Communication

2021 International journal for innovative engineering and management research  
In this paper providing a detailed study of Intrusion detection system (IDS) classification system for IoT gateway communication to protect IoT gateway by machine learning algorithms ina intelligent fashion  ...  IoT enhances comfortable for human being even security is one of the challenging tasks. Intrusion detection system (IDS) will protect IoT devices from intruders.  ...  Implement of machine learning algorithms for in Intrusion Detection Systems detect anomalies for classification of traffic.  ... 
doi:10.48047/ijiemr/v10/i11/01 fatcat:qmyip77njvbsrkvmrukwxreby4

Solar Powered Wireless Intrusion Detection System in Agricultural Farms

Rohan Paranjpe, Hiralal Purohit, Rohan Joshi
2019 International Journal of Computer Applications  
Guarduino is an intelligent animal farm intrusion detection system which is based on IoT using basic components like Arduino Mega, Proximity Sensor, LED, Buzzer, WiFi Module, LCD.  ...  To prevent such mishaps, farmers need to be on their guard when crops are almost ready to be harvested.If such an intrusion is detected quickly by the use of IOT, the farmer need not have his physical  ...  This work proposes the use of an IoT based intrusion detection system that uses active sensors to detect the presence of intruders and logs such intrusions for monitoring purposes [1] .  ... 
doi:10.5120/ijca2019918918 fatcat:isoe6qlrerdenfwvox4f536gui

A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges

Ansam Khraisat, Ammar Alazab
2021 Cybersecurity  
We also review how existing IoT IDS detect intrusive attacks and secure communications on the IoT.  ...  To this end, Numerous IoT intrusion detection Systems (IDS) have been proposed in the literature to tackle attacks on the IoT ecosystem, which can be broadly classified based on detection technique, validation  ...  The authors are grateful to the Centre for. Informatics and Applied Optimization (CIAO) for their support.  ... 
doi:10.1186/s42400-021-00077-7 fatcat:32nrdpgvkjg4ljjxc44rewc55y

A comparative analysis on traditional wired datasets and the need for wireless datasets for IoT wireless intrusion detection

Teh Boon Seong, Vasaki Ponnusamy, Noor Zaman Jhanjhi, Robithoh Annur, M N Talib
2021 Indonesian Journal of Electrical Engineering and Computer Science  
<span>IoT networks mostly rely on wireless mediums for communication, and due to that, they are very susceptible to intrusions.  ...  This can reduce the detection time mainly for machine learning and creating the models.  ...  His research interest is mainly on Intrusion Detection Systems in Wireless and IoT networks. He is self-motivated in research domains and has high passion in cybersecurity fields.  ... 
doi:10.11591/ijeecs.v22.i2.pp1165-1176 fatcat:dablujrnijh6zp6wn6rbo5esjy

IoT Wireless Intrusion Detection and Network Traffic Analysis

Vasaki Ponnusamy, Aun Yichiet, NZ Jhanjhi, Mamoona humayun, Maram Fahhad Almufareh
2022 Computer systems science and engineering  
One feasible countermeasure is to deploy intrusion detection systems at the edge of these ad hoc networks (Network-based IDS) or at the node level (Host-based IDS).  ...  The challenge here is that there is no readily available benchmark data available for IoT network traffic.  ...  Wireless Intrusion Detection System Compared with wired IDS, wireless IDS is more suitable for monitoring IoT networks.  ... 
doi:10.32604/csse.2022.018801 fatcat:7uqaixyts5hcdbg2tenpjg522i

Investigation on Intrusion Detection Systems (IDSs) in IoT

2022 International Journal of Emerging Trends in Engineering Research  
A deep learning-based intrusion detection system for the Internet of Things requires consideration of key design principles presented in this paper.  ...  In order to prevent IoT-related security attacks which take advantage of some of these security vulnerabilities, intrusion detection systems (IDSs) designed for IoT environments are crucial.  ...  An effective and efficient intrusion detection system for the IoT is identified in this paper using design principles for deep learning.  ... 
doi:10.30534/ijeter/2022/041032022 fatcat:7vkrrf74vvbi7h326fwkezkvba

A Comprehensive Survey on Intrusion Detection based Machine Learning for IoT Networks

Hela Mliki, Abir Kaceam, Lamia Chaari
2021 EAI Endorsed Transactions on Security and Safety  
It mainly focused on intrusion detection based on the machine learning schema and built a taxonomy of different IoT attacks and threats.  ...  This paper also compared between the different intrusion detection techniques and established a taxonomy of machine leaning methods for intrusion detection solutions. system and the cloud exchange data  ...  We focused on intrusion detection for IoT network using machine learning algorithms in this paper.  ... 
doi:10.4108/eai.6-10-2021.171246 fatcat:jlunx7derzdezfdiso4xftsocq


2022 Computer Systems and Information Technologies  
The growing demand for IoT devices is accelerating the pace of their production.  ...  The paper presents an overview of modern methods aimed at detecting cyberattacks and anomalies in the Internet of Things using machine learning methods.  ...  abnormal activity in wireless sensor networks IoT (Wireless sensor networks, WSN).  ... 
doi:10.31891/csit-2021-5-15 fatcat:xdunccobhveqxbuz4soyj6qdvm

Table of Contents

2020 2020 IEEE 45th Conference on Local Computer Networks (LCN)  
Detection System for the Internet of Energy Increasing Throughput of Intrusion Detection Systems by Hash-Based Short String Pre-Filter  ...  Wireless Networks 325 IQoR: An Intelligent QoS-Aware Routing Mechanism with Deep Reinforcement Learning 329 Secure and Reliable Data Transmission in SDN-Based Backend Networks of Industrial IoT Detecting  ... 
doi:10.1109/lcn48667.2020.9314824 fatcat:ijv6a3vurbd2zjmdmkt7bxle4q

Data Fusion-Based Machine Learning Architecture for Intrusion Detection

Muhammad Adnan Khan, Taher M. Ghazal, Sang-Woong Lee, Abdur Rehman
2022 Computers Materials & Continua  
This study investigates the methodology of Real Time Sequential Deep Extreme Learning Machine (RTS-DELM) implemented to wireless Internet of Things (IoT) enabled sensor networks for the detection of any  ...  intrusion activity.  ...  Funding Statement: The author(s) received no specific funding for this study.  ... 
doi:10.32604/cmc.2022.020173 fatcat:frdsysaffjeflh2gxwcl6tdcvi

Energy-Aware Intrusion Detection Model for Internet of Vehicles Using Machine Learning Methods

Lu Lihua, Nima Jafari Navimipour
2022 Wireless Communications and Mobile Computing  
In this paper, a new Energy-aware Intrusion Detection System (EIDS) based on intelligent two-phase contract management model is presented for vehicle-to-vehicle (V2V) strategy in the IoV environments.  ...  With increasing development of Internet of Things (IoT) technology, wireless communications, big data, and smart applications, vehicular communications have become ubiquitous in smart cities, smart transportation  ...  When an optimized energy-efficient link is selected, the proposed intrusion detection method (EIDS) is activated [42, 43] .  ... 
doi:10.1155/2022/9865549 fatcat:wo2s6wtsurhdjpd5cvqw4vfis4
« Previous Showing results 1 — 15 out of 4,611 results