Meng, 2018 - Google Patents
Intrusion detection in the era of IoT: Building trust via traffic filtering and samplingMeng, 2018
- Document ID
- 6860404099870042931
- Author
- Meng W
- Publication year
- Publication venue
- Computer
External Links
Snippet
In the Internet of Things (IoT) era, the number of connected devices and subnets of devices is rapidly increasing. Yet, it remains a challenge for intrusion detection mechanisms to build a trust map among various IoT devices because of the devices' large quantity and dynamic …
- 238000005070 sampling 0 title abstract description 48
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Meng | Intrusion detection in the era of IoT: Building trust via traffic filtering and sampling | |
Wani et al. | SDN‐based intrusion detection system for IoT using deep learning classifier (IDSIoT‐SDL) | |
Anthi et al. | A supervised intrusion detection system for smart home IoT devices | |
Shurman et al. | DoS and DDoS attack detection using deep learning and IDS | |
Borkar et al. | A survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and protection system (IIDPS) | |
Mohapatra et al. | Handling of man-in-the-middle attack in wsn through intrusion detection system | |
Kirubavathi Venkatesh et al. | HTTP botnet detection using adaptive learning rate multilayer feed-forward neural network | |
Imdad et al. | Internet of things (IoT); security requirements, attacks and counter measures | |
Zagrouba et al. | Machine learning based attacks detection and countermeasures in IoT | |
Savenko et al. | Detection DNS tunneling botnets | |
Chen et al. | FCM technique for efficient intrusion detection system for wireless networks in cloud environment | |
Savenko et al. | Botnet detection technique for corporate area network | |
Chandre et al. | Intrusion prevention framework for WSN using deep CNN | |
Noor et al. | An intelligent context-aware threat detection and response model for smart cyber-physical systems | |
Kumari et al. | Performance evaluation of sybil attack in cyber physical system | |
Ali et al. | Securing IoT based maritime transportation system through entropy-based dual-stack machine learning framework | |
Xie et al. | Machine learning-based security active defence model-security active defence technology in the communication network | |
Rahman et al. | Wifi miner: An online apriori-infrequent based wireless intrusion system | |
Kumar et al. | An effective DDoS attack mitigation strategy for IoT using an optimization-based adaptive security model | |
Sharma et al. | Bot-iot: Detection of ddos attacks in internet of things for smart cities | |
Awad et al. | A network-based framework for rat-bots detection | |
Thompson et al. | Controlling risk of data exfiltration in cyber networks due to stealthy propagating malware | |
Yong et al. | Understanding botnet: From mathematical modelling to integrated detection and mitigation framework | |
Abou Haidar et al. | High perception intrusion detection system using neural networks | |
Shaikh et al. | Effective network security monitoring: from attribution to target-centric monitoring |