Kim et al., 2020 - Google Patents
Intelligent detection of iot botnets using machine learning and deep learningKim et al., 2020
View HTML- Document ID
- 15072441683824771407
- Author
- Kim J
- Shim M
- Hong S
- Shin Y
- Choi E
- Publication year
- Publication venue
- Applied Sciences
External Links
Snippet
As the number of Internet of Things (IoT) devices connected to the network rapidly increases, network attacks such as flooding and Denial of Service (DoS) are also increasing. These attacks cause network disruption and denial of service to IoT devices. However, a large …
- 238000001514 detection method 0 title abstract description 71
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kim et al. | Intelligent detection of iot botnets using machine learning and deep learning | |
Mazhar et al. | Analysis of IoT security challenges and its solutions using artificial intelligence | |
Khraisat et al. | A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks | |
Ali et al. | Threat analysis and distributed denial of service (DDoS) attack recognition in the internet of things (IoT) | |
Javeed et al. | SDN-enabled hybrid DL-driven framework for the detection of emerging cyber threats in IoT | |
Rashid et al. | Cyberattacks detection in iot-based smart city applications using machine learning techniques | |
Toldinas et al. | A novel approach for network intrusion detection using multistage deep learning image recognition | |
Rashid et al. | A federated learning-based approach for improving intrusion detection in industrial internet of things networks | |
Fernandez Maimo et al. | Intelligent and dynamic ransomware spread detection and mitigation in integrated clinical environments | |
Abbas et al. | Safety, security and privacy in machine learning based internet of things | |
Alashhab et al. | A survey of low rate ddos detection techniques based on machine learning in software-defined networks | |
Demertzis et al. | The next generation cognitive security operations center: adaptive analytic lambda architecture for efficient defense against adversarial attacks | |
Adefemi Alimi et al. | Refined LSTM based intrusion detection for denial-of-service attack in Internet of Things | |
Javed et al. | An intelligent system to detect advanced persistent threats in industrial internet of things (I-IoT) | |
Aldhyani et al. | Artificial intelligence algorithm-based economic denial of sustainability attack detection systems: Cloud computing environments | |
Bahaa et al. | Monitoring real time security attacks for IoT systems using DevSecOps: a systematic literature review | |
Abu Khurma et al. | IoT botnet detection using salp swarm and ant lion hybrid optimization model | |
Taheri et al. | Leveraging image representation of network traffic data and transfer learning in botnet detection | |
Nikoloudakis et al. | Towards a machine learning based situational awareness framework for cybersecurity: an SDN implementation | |
Abu Bakar et al. | An intelligent agent-based detection system for DDoS attacks using automatic feature extraction and selection | |
Pivarníková et al. | Early-stage detection of cyber attacks | |
de Caldas Filho et al. | Botnet detection and mitigation model for IoT networks using federated learning | |
Khan et al. | An efficient multilevel probabilistic model for abnormal traffic detection in wireless sensor networks | |
Roldán-Gómez et al. | Security Analysis of the MQTT-SN Protocol for the Internet of Things | |
Yaser et al. | Improved DDoS detection utilizing deep neural networks and feedforward neural networks as autoencoder |