[go: up one dir, main page]

Meng, 2018 - Google Patents

Intrusion detection in the era of IoT: Building trust via traffic filtering and sampling

Meng, 2018

Document ID
6860404099870042931
Author
Meng W
Publication year
Publication venue
Computer

External Links

Snippet

In the Internet of Things (IoT) era, the number of connected devices and subnets of devices is rapidly increasing. Yet, it remains a challenge for intrusion detection mechanisms to build a trust map among various IoT devices because of the devices' large quantity and dynamic …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Similar Documents

Publication Publication Date Title
Meng Intrusion detection in the era of IoT: Building trust via traffic filtering and sampling
Wani et al. SDN‐based intrusion detection system for IoT using deep learning classifier (IDSIoT‐SDL)
Anthi et al. A supervised intrusion detection system for smart home IoT devices
Shurman et al. DoS and DDoS attack detection using deep learning and IDS
Borkar et al. A survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and protection system (IIDPS)
Mohapatra et al. Handling of man-in-the-middle attack in wsn through intrusion detection system
Kirubavathi Venkatesh et al. HTTP botnet detection using adaptive learning rate multilayer feed-forward neural network
Imdad et al. Internet of things (IoT); security requirements, attacks and counter measures
Zagrouba et al. Machine learning based attacks detection and countermeasures in IoT
Savenko et al. Detection DNS tunneling botnets
Chen et al. FCM technique for efficient intrusion detection system for wireless networks in cloud environment
Savenko et al. Botnet detection technique for corporate area network
Chandre et al. Intrusion prevention framework for WSN using deep CNN
Noor et al. An intelligent context-aware threat detection and response model for smart cyber-physical systems
Kumari et al. Performance evaluation of sybil attack in cyber physical system
Ali et al. Securing IoT based maritime transportation system through entropy-based dual-stack machine learning framework
Xie et al. Machine learning-based security active defence model-security active defence technology in the communication network
Rahman et al. Wifi miner: An online apriori-infrequent based wireless intrusion system
Kumar et al. An effective DDoS attack mitigation strategy for IoT using an optimization-based adaptive security model
Sharma et al. Bot-iot: Detection of ddos attacks in internet of things for smart cities
Awad et al. A network-based framework for rat-bots detection
Thompson et al. Controlling risk of data exfiltration in cyber networks due to stealthy propagating malware
Yong et al. Understanding botnet: From mathematical modelling to integrated detection and mitigation framework
Abou Haidar et al. High perception intrusion detection system using neural networks
Shaikh et al. Effective network security monitoring: from attribution to target-centric monitoring