2018 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR) 2018
DOI: 10.1109/cqr.2018.8445985
|View full text |Cite
|
Sign up to set email alerts
|

An Intrusion Detection System for Detecting Compromised Gateways in Clustered IoT Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 28 publications
(10 citation statements)
references
References 17 publications
0
10
0
Order By: Relevance
“…They propose a clustering-based anonymity method to preserve privacy of data gathered from wearable IoT devices and guarantee the usability of the collected data. In [268], the authors propose a centralized detection system based on the data gathered from clusters to detect the malicious gateways of clusters in IoT networks using packet drop probability as a means to monitor the gateways.…”
Section: H Securitymentioning
confidence: 99%
“…They propose a clustering-based anonymity method to preserve privacy of data gathered from wearable IoT devices and guarantee the usability of the collected data. In [268], the authors propose a centralized detection system based on the data gathered from clusters to detect the malicious gateways of clusters in IoT networks using packet drop probability as a means to monitor the gateways.…”
Section: H Securitymentioning
confidence: 99%
“…In [ 60 ], the researchers proposed PCA to create an anomaly-based statistical and data-mining IDS that depends on the division of the principal components into the most and least significant principal components. PCA used for intrusion detection is based on payload modeling in [ 61 ], statistical modeling in [ 62 ], machine learning in [ 63 ], and data mining in [ 64 ]. Table 3 shows the advantages and disadvantages of anomaly-based IDS approaches employed in IoT as related to the detection modeling techniques [ 7 , 65 ].…”
Section: Intrusion Detection System (Ids) In Iotmentioning
confidence: 99%
“…These detection systems are similar in having an agent for collecting data and a processing unit in the attack detection and reporting the intrusions. However, they are different in: i) Source of data: host-based (Asfaw et al 2010), network-based (Maleh et al 2015), hybrid (Ahmad et al 2019), ii) Method of detection (Abhishek et al 2018): signature-based (Wang et al 2018), anomaly-based, and iii) Architecture: centralized, and distributed (Anthi et al 2018;da Costa et al 2019). Signature based approaches can easily detect the known attacks but unable to detect new attacks.…”
Section: Intrusion and Malware Detectionmentioning
confidence: 99%