[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Kim et al., 2020 - Google Patents

Intelligent detection of iot botnets using machine learning and deep learning

Kim et al., 2020

View HTML
Document ID
15072441683824771407
Author
Kim J
Shim M
Hong S
Shin Y
Choi E
Publication year
Publication venue
Applied Sciences

External Links

Snippet

As the number of Internet of Things (IoT) devices connected to the network rapidly increases, network attacks such as flooding and Denial of Service (DoS) are also increasing. These attacks cause network disruption and denial of service to IoT devices. However, a large …
Continue reading at www.mdpi.com (HTML) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls

Similar Documents

Publication Publication Date Title
Kim et al. Intelligent detection of iot botnets using machine learning and deep learning
Mazhar et al. Analysis of IoT security challenges and its solutions using artificial intelligence
Khraisat et al. A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks
Ali et al. Threat analysis and distributed denial of service (DDoS) attack recognition in the internet of things (IoT)
Javeed et al. SDN-enabled hybrid DL-driven framework for the detection of emerging cyber threats in IoT
Rashid et al. Cyberattacks detection in iot-based smart city applications using machine learning techniques
Toldinas et al. A novel approach for network intrusion detection using multistage deep learning image recognition
Rashid et al. A federated learning-based approach for improving intrusion detection in industrial internet of things networks
Fernandez Maimo et al. Intelligent and dynamic ransomware spread detection and mitigation in integrated clinical environments
Abbas et al. Safety, security and privacy in machine learning based internet of things
Alashhab et al. A survey of low rate ddos detection techniques based on machine learning in software-defined networks
Demertzis et al. The next generation cognitive security operations center: adaptive analytic lambda architecture for efficient defense against adversarial attacks
Adefemi Alimi et al. Refined LSTM based intrusion detection for denial-of-service attack in Internet of Things
Javed et al. An intelligent system to detect advanced persistent threats in industrial internet of things (I-IoT)
Aldhyani et al. Artificial intelligence algorithm-based economic denial of sustainability attack detection systems: Cloud computing environments
Bahaa et al. Monitoring real time security attacks for IoT systems using DevSecOps: a systematic literature review
Abu Khurma et al. IoT botnet detection using salp swarm and ant lion hybrid optimization model
Taheri et al. Leveraging image representation of network traffic data and transfer learning in botnet detection
Nikoloudakis et al. Towards a machine learning based situational awareness framework for cybersecurity: an SDN implementation
Abu Bakar et al. An intelligent agent-based detection system for DDoS attacks using automatic feature extraction and selection
Pivarníková et al. Early-stage detection of cyber attacks
de Caldas Filho et al. Botnet detection and mitigation model for IoT networks using federated learning
Khan et al. An efficient multilevel probabilistic model for abnormal traffic detection in wireless sensor networks
Roldán-Gómez et al. Security Analysis of the MQTT-SN Protocol for the Internet of Things
Yaser et al. Improved DDoS detection utilizing deep neural networks and feedforward neural networks as autoencoder