Thamilarasu et al., 2019 - Google Patents
Towards deep-learning-driven intrusion detection for the internet of thingsThamilarasu et al., 2019
View HTML- Document ID
- 5133817722460295510
- Author
- Thamilarasu G
- Chawla S
- Publication year
- Publication venue
- Sensors
External Links
Snippet
Cyber-attacks on the Internet of Things (IoT) are growing at an alarming rate as devices, applications, and communication networks are becoming increasingly connected and integrated. When attacks on IoT networks go undetected for longer periods, it affects …
- 238000001514 detection method 0 title abstract description 97
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Thamilarasu et al. | Towards deep-learning-driven intrusion detection for the internet of things | |
Awajan | A novel deep learning-based intrusion detection system for IOT networks | |
Majid et al. | Applications of wireless sensor networks and internet of things frameworks in the industry revolution 4.0: A systematic literature review | |
Mazhar et al. | Analysis of IoT security challenges and its solutions using artificial intelligence | |
Lawal et al. | An anomaly mitigation framework for iot using fog computing | |
Inayat et al. | Learning-based methods for cyber attacks detection in IoT systems: A survey on methods, analysis, and future prospects | |
Ali et al. | Threat analysis and distributed denial of service (DDoS) attack recognition in the internet of things (IoT) | |
Vaccari et al. | MQTTset, a new dataset for machine learning techniques on MQTT | |
Chaganti et al. | Deep learning approach for SDN-enabled intrusion detection system in IoT networks | |
Rashid et al. | A federated learning-based approach for improving intrusion detection in industrial internet of things networks | |
Zachos et al. | An anomaly-based intrusion detection system for internet of medical things networks | |
Said et al. | Efficient anomaly detection for smart hospital IoT systems | |
Al-Amiedy et al. | A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of internet of things | |
Apostol et al. | IoT botnet anomaly detection using unsupervised deep learning | |
Alashhab et al. | A survey of low rate ddos detection techniques based on machine learning in software-defined networks | |
Nikoloudakis et al. | Towards a machine learning based situational awareness framework for cybersecurity: an SDN implementation | |
Taheri et al. | Leveraging image representation of network traffic data and transfer learning in botnet detection | |
Essop et al. | Generating datasets for anomaly-based intrusion detection systems in iot and industrial iot networks | |
Ali et al. | Low rate DDoS detection using weighted federated learning in SDN control plane in IoT network | |
Garcia-Font et al. | Attack classification schema for smart city WSNs | |
Ahmed et al. | Effective and efficient DDoS attack detection using deep learning algorithm, multi-layer perceptron | |
Fedorchenko et al. | Comparative review of the intrusion detection systems based on federated learning: Advantages and open challenges | |
Kalutharage et al. | Explainable AI-based DDOS attack identification method for IoT networks | |
Bahaa et al. | Monitoring real time security attacks for IoT systems using DevSecOps: a systematic literature review | |
Alahmadi et al. | DDoS attack detection in IoT-based networks using machine learning models: a survey and research directions |