2022
DOI: 10.3390/s22041582
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Intelligent Framework to Combat Sophisticated Threats in Secure Industries

Abstract: With the new advancements in Internet of Things (IoT) and its applications in different sectors, such as the industrial sector, by connecting billions of devices and instruments, IoT has evolved as a new paradigm known as the Industrial Internet of Things (IIoT). Nonetheless, its benefits and applications have been approved in different areas, but there are possibilities for various cyberattacks because of its extensive connectivity and diverse nature. Such attacks result in financial loss and data breaches, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(16 citation statements)
references
References 42 publications
0
16
0
Order By: Relevance
“…In order to validate the supremacy of the proposed AITDC-IIoT model, a detailed comparative analysis was performed against existing models and the results are shown in Tab. 3 [28]. Based on the results and discussion made above, it is apparent that the proposed AITDC-IIoT model is an excellent performer in terms of threat detection and classification compared to the existing techniques.…”
Section: Experimental Validationmentioning
confidence: 85%
“…In order to validate the supremacy of the proposed AITDC-IIoT model, a detailed comparative analysis was performed against existing models and the results are shown in Tab. 3 [28]. Based on the results and discussion made above, it is apparent that the proposed AITDC-IIoT model is an excellent performer in terms of threat detection and classification compared to the existing techniques.…”
Section: Experimental Validationmentioning
confidence: 85%
“…It was found that the proposed technique reduces false positives by 35% while maintaining an extremely high detection rate. Yet to be identified and described are the ideal prerequisites for a protective solution despite this work's goal of identifying and describing those criteria [34,35]. All HTTP-based DoS and DDoS assaults have been thoroughly examined in this study, which aims to define and describe the ideal criteria for a protective architecture against these attacks in-depth.…”
Section: Related Workmentioning
confidence: 99%
“…The author's proposed algorithms outperform those of other researchers in detecting DDoS attacks when tested on real-world datasets. If the system's security defenses are deceived by someone with valid access to the system, an insider attack is more likely [35]. Anti-DDoS assaults can be prevented by using EDIP (Early Detection and Isolation).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Data sharing between organizations proves to be another vital challenge [ 40 , 41 ] that demands the health and medical dataset created by one healthcare personnel be shared securely with other healthcare-requesting entities such as a doctor or a healthcare research entity. The summary of various applications in the field of healthcare using the blockchain is summarized in Table 1 .…”
Section: Related Workmentioning
confidence: 99%