Machine learning-enabled iot security: Open issues and challenges under advanced persistent threats

Z Chen, J Liu, Y Shen, M Simsek, B Kantarci… - ACM Computing …, 2022 - dl.acm.org
Despite its technological benefits, the Internet of Things (IoT) has cyber weaknesses due to
vulnerabilities in the wireless medium. Machine Larning (ML)-based methods are widely …

Internet of Things backdoors: Resource management issues, security challenges, and detection methods

S Hashemi, M Zarei - Transactions on Emerging …, 2021 - Wiley Online Library
Abstract Internet of Things (IoT) technology is one of the successful and interesting products
of ubiquitous wireless networks that beneficiate human life with the make use of smart …

Intrusion detection system based on fast hierarchical deep convolutional neural network

RV Mendonça, AAM Teodoro, RL Rosa, M Saadi… - IEEE …, 2021 - ieeexplore.ieee.org
Currently, with the increasing number of devices connected to the Internet, search for
network vulnerabilities to attackers has increased, and protection systems have become …

Big data analytics framework for peer-to-peer botnet detection using random forests

K Singh, SC Guntuku, A Thakur, C Hota - Information Sciences, 2014 - Elsevier
Network traffic monitoring and analysis-related research has struggled to scale for massive
amounts of data in real time. Some of the vertical scaling solutions provide good …

IoT security: A layered approach for attacks & defenses

MM Ahemd, MA Shah, A Wahid - 2017 international conference …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) has been a massive advancement in the Information and
Communication Technology (ICT). It is projected that over 50 billion devices will become …

A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions

S Singh, PK Sharma, SY Moon, D Moon… - The Journal of …, 2019 - Springer
Recently in the connected digital world, targeted attack has become one of the most serious
threats to conventional computing systems. Advanced persistent threat (APT) is currently …

Detection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: present and future challenges

S Gupta, BB Gupta - International Journal of Cloud Applications and …, 2017 - igi-global.com
In this paper, we present comprehensive survey of secured web application by identifying
numerous serious threats faced by several-related organizations. Based on this, we have …

Cyber forensics framework for big data analytics in IoT environment using machine learning

GS Chhabra, VP Singh, M Singh - Multimedia Tools and Applications, 2020 - Springer
Forensic analyst skills are at stake for processing of growing data from IoT based
environment platforms. Tangible sources often have the size limits, but that's not the case for …

A closer look at intrusion detection system for web applications

N Agarwal, SZ Hussain - Security and Communication …, 2018 - Wiley Online Library
Intrusion Detection System (IDS) acts as a defensive tool to detect the security attacks on the
web. IDS is a known methodology for detecting network‐based attacks but is still immature …

Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks

W Wang, T Guyet, R Quiniou, MO Cordier… - Knowledge-Based …, 2014 - Elsevier
In this work, we propose a novel framework of autonomic intrusion detection that fulfills
online and adaptive intrusion detection over unlabeled HTTP traffic streams in computer …