2019 5th International Conference on Computing, Communication, Control and Automation (ICCUBEA) 2019
DOI: 10.1109/iccubea47591.2019.9128786
|View full text |Cite
|
Sign up to set email alerts
|

An Intuitive Study: Intrusion Detection Systems and Anomalies, How AI can be used as a tool to enable the majority, in 5G era

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…Other general recommendations include hiding the user identities during service authentication, assuring robust access point/BS identity [Bouras et al, 2017b], detecting malicious signaling [Soldani, 2019], securing virtual infrastructure and NS [Panwar and Sharma, 2020], securing authentication chip [Xingzhong et al, 2019], preserving privacy [Nguyen et al, 2020b], providing intrusion detection system [Shah and Pramod Bendale, 2019], providing PLS [Singh et al, 2018], and providing service-oriented authentication protocols [Ni et al, 2018]. Figure 4 relates the papers and purpose (e.g., mitigate DDoS attacks).…”
Section: Smart Agriculturementioning
confidence: 99%
“…Other general recommendations include hiding the user identities during service authentication, assuring robust access point/BS identity [Bouras et al, 2017b], detecting malicious signaling [Soldani, 2019], securing virtual infrastructure and NS [Panwar and Sharma, 2020], securing authentication chip [Xingzhong et al, 2019], preserving privacy [Nguyen et al, 2020b], providing intrusion detection system [Shah and Pramod Bendale, 2019], providing PLS [Singh et al, 2018], and providing service-oriented authentication protocols [Ni et al, 2018]. Figure 4 relates the papers and purpose (e.g., mitigate DDoS attacks).…”
Section: Smart Agriculturementioning
confidence: 99%
“…In the Smurf attack, Internet Control Message Protocol (ICMP) can be used to broadcast a request from a target node, transmit network traffic, and slow down its transmission speed [3].…”
Section: Network Attacksmentioning
confidence: 99%
“…If DDoS attacks occur against the SDN server, the server's operation and contact capability would be overwhelmed and detected DDoS attacks in SDN using an ML-based model through feature selection methods. To simplify these models, feature selection methods were selected whose training time is comparatively shorter [3].…”
Section: Objectivesmentioning
confidence: 99%
“…The same kind of solutions can be extended in the IoT environment for interoperability. The authors of the paper [28] give insights into the SDN and NFV implementation aspects for providing security. The same kind of security aspects need to be considered while combining the solution for IoT interoperability.…”
Section: Semantic Iot Interoperability Terminologiesmentioning
confidence: 99%