A comprehensive survey on DDoS defense systems: New trends and challenges
In the past ten years, the source of DDoS has migrated to botnets composed of IoT devices.
The scale of DDoS attacks increases dramatically with the number of IoT devices. New …
The scale of DDoS attacks increases dramatically with the number of IoT devices. New …
SeIoT: Detecting Anomalous Semantics in Smart Homes via Knowledge Graph
Existing IoT Network Anomaly Detection Systems (NADSes) typically treat IoT devices as
independent entities and model them by Euclidean space features. These approaches suffer …
independent entities and model them by Euclidean space features. These approaches suffer …
Metis: understanding and enhancing in-network regular expressions
Regular expressions (REs) offer one-shot solutions for many networking tasks, eg, network
intrusion detection. However, REs purely rely on expert knowledge and cannot utilize …
intrusion detection. However, REs purely rely on expert knowledge and cannot utilize …
I Know Your Intent: Graph-enhanced Intent-aware User Device Interaction Prediction via Contrastive Learning
With the booming of smart home market, intelligent Internet of Things (IoT) devices have
been increasingly involved in home life. To improve the user experience of smart homes …
been increasingly involved in home life. To improve the user experience of smart homes …
Interpreting unsupervised anomaly detection in security via rule extraction
Many security applications require unsupervised anomaly detection, as malicious data are
extremely rare and often only unlabeled normal data are available for training (ie, zero …
extremely rare and often only unlabeled normal data are available for training (ie, zero …
IoTGemini: Modeling IoT Network Behaviors for Synthetic Traffic Generation
Synthetic traffic generation can produce sufficient data for model training of various traffic
analysis tasks for IoT networks with few costs and ethical concerns. However, with the …
analysis tasks for IoT networks with few costs and ethical concerns. However, with the …
Genos: General In-Network Unsupervised Intrusion Detection by Rule Extraction
Anomaly-based network intrusion detection systems (A-NIDS) use unsupervised models to
detect unforeseen attacks. However, existing A-NIDS solutions suffer from low throughput …
detect unforeseen attacks. However, existing A-NIDS solutions suffer from low throughput …
Exploring Shifting Patterns in Recent IoT Malware
J Carrillo-Mondejar… - European …, 2024 - papers.academic-conferences.org
The rise of malware targeting interconnected infrastructures has surged in recent years,
driven largely by the widespread presence of vulnerable legacy IoT devices and …
driven largely by the widespread presence of vulnerable legacy IoT devices and …
Distributed Denial-Of-Service (DDoS) in Software-Defined Network Based on Artificial Neural Network and Binary Multi-Neighborhood Artificial Bee Colony (BMNABC …
E Ateeyah, C Şeker - 2023 IEEE 3rd Mysore Sub Section …, 2023 - ieeexplore.ieee.org
In this paper, an intelligent intrusion detection system in a software-based network with
metaheuristic algorithm is presented. In the proposed system, the controllers use the binary …
metaheuristic algorithm is presented. In the proposed system, the controllers use the binary …
[PDF][PDF] PERFORMING INTRUSION DETECTION IN INTERNET OF THINGS (IOT) BY FEATURE SELECTION WITH MAJORITY VOTING APPROACH
HSA AHMED - 2023 - avesis.gazi.edu.tr
ABSTRACT The Internet of Things (IoT) is a large and intelligent communication network.
The volume of traffic in the IoT network is very high and an intelligent switching network is …
The volume of traffic in the IoT network is very high and an intelligent switching network is …