Rabhi et al., 2023 - Google Patents
IoT routing attacks detection using machine learning algorithmsRabhi et al., 2023
- Document ID
- 2023513945282922522
- Author
- Rabhi S
- Abbes T
- Zarai F
- Publication year
- Publication venue
- Wireless Personal Communications
External Links
Snippet
Abstract Internet of Things (IoT) is a concept that aims to make the real world more intelligent but susceptible to various attacks. In this paper, we focus on wireless sensor networks (WSNs), as a founding block in the IoT presenting the vulnerability of routing attacks against …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/22—Tracking the activity of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Heidari et al. | Internet of Things intrusion detection systems: a comprehensive review and future directions | |
Hajiheidari et al. | Intrusion detection systems in the Internet of things: A comprehensive investigation | |
Rahman et al. | Scalable machine learning-based intrusion detection system for IoT-enabled smart cities | |
Baraneetharan | Role of machine learning algorithms intrusion detection in WSNs: a survey | |
Alsaedi et al. | TON_IoT telemetry dataset: A new generation dataset of IoT and IIoT for data-driven intrusion detection systems | |
Loo et al. | Intrusion detection for routing attacks in sensor networks | |
Rabhi et al. | IoT routing attacks detection using machine learning algorithms | |
Zeng et al. | Senior2local: A machine learning based intrusion detection method for vanets | |
Habib et al. | A modified multi-objective particle swarm optimizer-based Lévy flight: An approach toward intrusion detection in Internet of Things | |
Medjek et al. | Fault-tolerant AI-driven intrusion detection system for the internet of things | |
Cui et al. | Collaborative intrusion detection system for sdvn: A fairness federated deep learning approach | |
Pajila et al. | FBDR-Fuzzy based DDoS attack Detection and Recovery mechanism for wireless sensor networks | |
Gebremariam et al. | Localization and detection of multiple attacks in wireless sensor networks using artificial neural network | |
Qu et al. | A lightweight intrusion detection method based on fuzzy clustering algorithm for wireless sensor networks | |
Quincozes et al. | An extended evaluation on machine learning techniques for Denial-of-Service detection in Wireless Sensor Networks | |
Raghavendra et al. | An intelligent RPL attack detection using machine learning-based intrusion detection system for Internet of Things | |
Mirshahjafari et al. | Sinkhole+ CloneID: A hybrid attack on RPL performance and detection method | |
Premkumar et al. | Defense countermeasures for DoS attacks in WSNs using deep radial basis networks | |
Srividya et al. | An optimal cluster & trusted path for routing formation and classification of intrusion using the machine learning classification approach in WSN | |
Premkumar et al. | Scalable and energy efficient cluster based anomaly detection against denial of service attacks in wireless sensor networks | |
Prasad et al. | An enhanced detection system against routing attacks in mobile ad-hoc network | |
Otoum et al. | On securing IoT from deep learning perspective | |
Pasikhani et al. | Reinforcement-Learning-based IDS for 6LoWPAN | |
Hadi et al. | Real-time fusion multi-tier DNN-based collaborative IDPS with complementary features for secure UAV-enabled 6G networks | |
Kadri et al. | Survey and classification of Dos and DDos attack detection and validation approaches for IoT environments |