Filters








416 Hits in 7.8 sec

Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review

Sufian Hameed, Faraz Idris Khan, Bilal Hameed
2019 Journal of Computer Networks and Communications  
On the contrary, IoT has various security and privacy concerns for the end users that limit its proliferation.  ...  As far as DDoS in IoT is concerned, lightweight detection engine suitable for IoT is required to detect and mitigate DDoS in a timely manner.  ...  In [95] , the authors proposed an AI-based approach to counteract DDoS by proposing learning automata-based preventive scheme.  ... 
doi:10.1155/2019/9629381 fatcat:vivpgu4qz5c2to52msl3ydbpaq

Machine Learning-Based Early Detection of IoT Botnets Using Network-Edge Traffic [article]

Ayush Kumar, Mrinalini Shridhar, Sahithya Swaminathan, Teng Joon Lim
2020 arXiv   pre-print
In this work, we present a lightweight IoT botnet detection solution, EDIMA, which is designed to be deployed at the edge gateway installed in home networks and targets early detection of botnets prior  ...  EDIMA includes a novel two-stage Machine Learning (ML)-based detector developed specifically for IoT bot detection at the edge gateway.  ...  ACKNOWLEDGMENT The authors would like to appreciate the National Cybersecurity R&D Lab, Singapore for allowing us to use their testbed to collect important data which has been used in our work.  ... 
arXiv:2010.11453v1 fatcat:cwhahlqibjbjrk5g3gs7pwae4q

Understanding Security Requirements and Challenges in Internet of Things (IoTs): A Review [article]

Faraz Idris Khan, Sufian Hameed
2018 arXiv   pre-print
On the other hand, IoT have various security and privacy concerns for the end users that limit its proliferation.  ...  In addition, authors propose key management architecture for IoT.  ...  The authors in [16] have presented security architecture for IP enabled IoT based on HIP (Host Identity Protocol) and DTLS ((Datagram Transport Layer Security) adapted to resource constrained devices  ... 
arXiv:1808.10529v1 fatcat:pmrn4vimyffo7don2yxlkh3moe

Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets

Georgios Spathoulas, Nikolaos Giachoudis, Georgios-Paraskevas Damiris, Georgios Theodoridis
2019 Future Internet  
In this paper we propose the use of lightweight agents installed at multiple internet of things (IoT) installations (e.g., smart-homes), in order to collaboratively detect distributed denial of service  ...  Existing security models, approaches and solutions are not able to sufficiently protect such systems.  ...  Our Approach This study proposes an alternative approach, with respect to existing work, to detect and prevent DDoS attacks in an IoT network.  ... 
doi:10.3390/fi11110226 fatcat:jfmpbn5ssbdntacmuftyvuv4sa

Security Threats and Artificial Intelligence based Countermeasures for Internet of Things Networks: A Comprehensive Survey

Shakila Zaman, Khaled Alhazmi, Mohammed Aseeri, Muhammad Raisuddin Ahmed, Risala Tasin Khan, M. Shamim Kaiser, Mufti Mahmud
2021 IEEE Access  
The result also showed that home gateway devices and other network middleboxes could be an effective way to detect the attack with less cost automatically. Kozik et al.  ...  [121] generated a reply attack in the smart home system that intercepted the communication between the IoT devices and gateway. C.  ...  For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/  ... 
doi:10.1109/access.2021.3089681 fatcat:fatpywnjzzfilidakyduz6qz44

Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets

Eric Gyamfi, Anca Jurcut
2022 Sensors  
Finally, we propose an NIDS framework for IoT networks leveraging MEC.  ...  This paper presents a comprehensive review of state-of-the-art network intrusion detection systems (NIDS) and security practices for IoT networks.  ...  They designed the NIDS to secure home gateway devices that connect smart home IoT devices to the Internet. Zeeshan et al. [143] designed and evaluated an NIDS system suitable for small IoT devices.  ... 
doi:10.3390/s22103744 pmid:35632153 pmcid:PMC9143513 fatcat:hepnt6zsfnakxlfqhchfvrt4gu

A Multi-Class Neural Network Model for Rapid Detection of IoT Botnet Attacks

Haifaa Alzahrani, Maysoon Abulkhair, Entisar Alkayal
2020 International Journal of Advanced Computer Science and Applications  
At the same time, however, the vulnerability of these innovations means that our day-to-day existence is surrounded by insecure devices, thereby facilitating ways for cybercriminals to launch various attacks  ...  It is less complicated in terms of computations, and it provides real-time detection that outperformed the state-of-theart, achieving a detection time ratio of 1:5 and a ratio of 1:8.  ...  In addition, computation for the work described in this paper was supported by King Abdulaziz University's High Performance Computing Center (Aziz Supercomputer) 1 with NVIDIA Tesla K20 GPU.  ... 
doi:10.14569/ijacsa.2020.0110783 fatcat:2k2njtqu2rb33gebthgthebbtm

Prevention Techniques against Distributed Denial of Service Attacks in Heterogeneous Networks: A Systematic Review

Ammarah Cheema, Moeenuddin Tariq, Adnan Hafiz, Muhammad Murad Khan, Fahad Ahmad, Muhammad Anwar, Muhammad Arif
2022 Security and Communication Networks  
We fairly evaluated the existing defense techniques for DDoS attacks and presented key findings in comparison tables.  ...  An in-depth analysis of each mechanism has been carried out to find the optimal solutions.  ...  [47] presented a lightweight Distributed Denial of Service mitigation system on the network side that makes use of the restricted assets of low-cost devices like home gateways. e suggested scheme's  ... 
doi:10.1155/2022/8379532 fatcat:ykpd5ge5fzfhxfhvdv3csaqnqu

Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications

Nasr Abosata, Saba Al-Rubaye, Gokhan Inalhan, Christos Emmanouilidis
2021 Sensors  
To provide a roadmap for researchers, this survey discusses the integrity of industrial IoT systems and highlights the existing security approaches for the most significant industrial applications.  ...  Furthermore, the wider implementation of IIoT causes an even greater security risk than its benefits.  ...  For smart grid application, it is important to provide an effective authentication and security scheme in a lightweight manner.  ... 
doi:10.3390/s21113654 pmid:34073975 fatcat:xkrxpjwiuza6jjyvpps74pdpgm

SDN Based Collaborative Scheme for Mitigation of DDoS Attacks

2018 Future Internet  
In this paper, we propose a lightweight, efficient and easy to deploy collaborative DDoS mitigation scheme leveraging SDN.  ...  We have designed a secure C-to-C communication protocol for SDN-controllers lying in different autonomous systems (AS).  ...  The precise results are then fed to an entropy-based algorithm for attack detection at the controller. This work in its current form is very basic without any extensive evaluations.  ... 
doi:10.3390/fi10030023 fatcat:6qcjlpcktzfgndci6u3ygceje4

Malware Squid: A Novel IoT Malware Traffic Analysis Framework Using Convolutional Neural Network and Binary Visualisation [chapter]

Robert Shire, Stavros Shiaeles, Keltoum Bendiab, Bogdan Ghita, Nicholas Kolokotronis
2019 Lecture Notes in Computer Science  
Facebook represents the current de-facto choice for social media, changing the nature of social relationships.  ...  In this paper, we propose a new method to detect and diagnose variations in overall Facebook user psychology through Open Source Intelligence (OSINT) and machine learning techniques.  ...  black (Null Bytes) or white areas (Spaces) in their samples, however, the DDOS is an exception with its extremely high frequency of Control characters.  ... 
doi:10.1007/978-3-030-30859-9_6 fatcat:rbxwau3acrenfofvhh53srauqy

Mitigating DDoS Attacks in SDN-Based IoT Networks Leveraging Secure Control and Data Plane Algorithm

Song Wang, Karina Gomez, Kandeepan Sithamparanathan, Muhammad Rizwan Asghar, Giovanni Russello, Paul Zanna
2021 Applied Sciences  
Our results demonstrate that DDoS attacks in the SDN-based IoT network are easier to detect than in the traditional network due to IoT traffic predictability.  ...  (DDoS).  ...  [22] present an approach to detect DDoS attacks by the coordination of Monitor, Correlator and Controller.  ... 
doi:10.3390/app11030929 fatcat:xofgiq4yvvewjpgpsdrgfsvu6q

A distributed IDS architecture model for Smart Home systems

Mariusz Gajewski, Jordi Mongay Batalla, George Mastorakis, Constandinos X. Mavromoustakis
2017 Cluster Computing  
In this article we propose an Intrusion Detection System (IDS) distributed between devices residing at user's and ISP's premises.  ...  One of the solutions for gaining users' confidence is to assign responsibility for detecting attacks to the service provider, particularly Internet Service Provider (ISP).  ...  Acknowledgements This work was undertaken under the PolLux IDSECOM project and the PolTur FUSE project supported by the National Centre for Research and Development (NCBiR) in Poland.  ... 
doi:10.1007/s10586-017-1105-z fatcat:iochloplrval5ji2oml26zqf5m

Internet of Things (IoT) of Smart Home: Privacy and Security

Zaied Shouran, Ahmad Ashari, Tri Kuntoro
2019 International Journal of Computer Applications  
The smart home is an environment, where heterogeneous electronic devices and appliances are networked together to provide smart services in a ubiquitous manner to the individuals. organization and people  ...  As IoT home devices become increasingly ubiquitous, study's findings and recommendations contribute to the broader understanding of users' evolving attitudes towards privacy in smart homes.  ...  An attack against the home gateway can immediately lead to an attack against the whole household network, as it is the point at which an outside connection can be made [28] . Figure 2.  ... 
doi:10.5120/ijca2019918450 fatcat:gbaya6pfejeibh3bqxn57z4j4y

Comparative Review of the Intrusion Detection Systems Based on Federated Learning: Advantages and Open Challenges

Elena Fedorchenko, Evgenia Novikova, Anton Shulepov
2022 Algorithms  
In order to provide an accurate and timely response to different types of the attacks, intrusion and anomaly detection systems collect and analyze a lot of data that may include personal and other sensitive  ...  The paper analyzes the architecture of the proposed intrusion detection systems and the approaches used to model data partition across the clients.  ...  The cores of the approach are the smart "filters" for attack detection and prevention on IoT gateways. Federated learning architecture.  ... 
doi:10.3390/a15070247 fatcat:fr7wbjns2fhllprc534q2s46pi
« Previous Showing results 1 — 15 out of 416 results