Toward Enhanced Attack Detection and Explanation in Intrusion Detection System-Based IoT Environment Data
RW Wardhani, DSC Putranto, U Jo, H Kim - IEEE Access, 2023 - ieeexplore.ieee.org
Securing the Internet of Things (IoT) against cyber threats is a formidable challenge, and
Intrusion Detection Systems (IDS) play a critical role in this effort. However, the lack of …
Intrusion Detection Systems (IDS) play a critical role in this effort. However, the lack of …
[HTML][HTML] Intelligent intrusion detection using arithmetic optimization enabled density based clustering with deep learning
Rapid advancements in the internet and communication domains have led to a massive rise
in the network size and the equivalent data. Consequently, several new attacks have been …
in the network size and the equivalent data. Consequently, several new attacks have been …
Hierarchical multistep approach for intrusion detection and identification in IoT and Fog computing-based environments
CA de Souza, CB Westphall, JDG Valencio… - Ad Hoc Networks, 2024 - Elsevier
Special security techniques, such as intrusion detection mechanisms, are indispensable in
modern computer systems. With the emergence of the Internet of Things they have become …
modern computer systems. With the emergence of the Internet of Things they have become …
Securing IoT networks: A robust intrusion detection system leveraging feature selection and LGBM
M Ramesh Kumar, P Sudhakaran - Peer-to-Peer Networking and …, 2024 - Springer
Abstract Intrusion Detection System (IDS) is designed being help and safeguard IoT
networks from potential threats. Distributed Denial of Service (DDoS) assaults are a …
networks from potential threats. Distributed Denial of Service (DDoS) assaults are a …
Cross-layer Federated Heterogeneous Ensemble Learning for Lightweight IoT Intrusion Detection System
This paper presents a heterogeneous federated ensemble model for intrusion detection
system, employing a semisupervised novelty detection technique-the baseline K-means …
system, employing a semisupervised novelty detection technique-the baseline K-means …
Intrusion detection system using metaheuristic fireworks optimization based feature selection with deep learning on Internet of Things environment
T Jayasankar, R Kiruba Buri… - Journal of …, 2024 - Wiley Online Library
Abstract Internet of Things (IoT), cloud computing, and other significant advancements in
communication have created new security challenges. Due to these advancements and the …
communication have created new security challenges. Due to these advancements and the …
[PDF][PDF] One Dimensional Conv-BiLSTMNetwork with AttentionMechanism for IoT Intrusion Detection.
B Omarov, Z Sailaukyzy, A Bigaliyeva… - … Materials & Continua, 2023 - cdn.techscience.cn
In the face of escalating intricacy and heterogeneity within Internet of Things (IoT) network
landscapes, the imperative for adept intrusion detection techniques has never been more …
landscapes, the imperative for adept intrusion detection techniques has never been more …
DNNET-Ensemble approach to detecting and identifying attacks in IoT environments
CA de Souza, CB Westphall, JDG Valencio… - Anais do XLI Simpósio …, 2023 - sol.sbc.org.br
Special security techniques like intrusion detection mechanisms are indispensable in
modern computer systems. It is important to detect and identify the attack in a category so …
modern computer systems. It is important to detect and identify the attack in a category so …
[PDF][PDF] Intrusion Detection in IoT Using Ensemble Approach.
Protection of the Internet of Things (IoT) devices is an area of concern, even with the success
that has been achieved in this area. IoT involves configuring and deploying smart devices to …
that has been achieved in this area. IoT involves configuring and deploying smart devices to …
Collaborative Anomaly-based Intrusion Detection Systems in Lightweight IoT
S Hajj - 2023 - theses.hal.science
Lightweight Internet-of-Things (IoT) devices are susceptible to network attacks due to their
operation in hostile environments and limited resources, which pose challenges for hosting …
operation in hostile environments and limited resources, which pose challenges for hosting …