2018
DOI: 10.1007/978-981-10-8660-1_41
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing Threats of IoT Networks Using SDN Based Intrusion Detection System (SDIoT-IDS)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 8 publications
0
8
0
1
Order By: Relevance
“…In our previous work [7], we have introduced an IDS for IoT based on SDN and machine learning. The backward propagation algorithm has been used in the classifier.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In our previous work [7], we have introduced an IDS for IoT based on SDN and machine learning. The backward propagation algorithm has been used in the classifier.…”
Section: Related Workmentioning
confidence: 99%
“…Such IDS does not need human intervention for operation and does not require the system to be altered [6]. Deploying such an IDS for a system with limited capabilities is quite suitable An software-defined networking (SDN)-based intrusion detection and prevention system for IoT is introduced as an enhancement to our previous work [7]. The mechanism uses the features of SDN to design a proactive system for intrusion detection in the IoT network.…”
Section: Introductionmentioning
confidence: 99%
“…The research [145] shows the pons and cons of different IDS and IPS systems in the context of cloud computing. The author in [126] presents an IDS system SDIoT-IDS based on SDN for the IoT devices such that the maximum load is taken off from the edge devices. The system is tested only with few attacks like flood attack and ICMP based attacks.…”
Section: Wani and Revathi [126] Bpnn Nsl-kdd Dataset Ryu Controllermentioning
confidence: 99%
“…A mitigation system based on rate-limiting model in Contiki Operating System (OS) proves efficient to identify UDP Flood attacks [14] but fails to work well in TCP. Early detection modules of Flooding attacks are developed by using Software Defined Networking (SDN) but the model lacked practical testing in real-time scenarios [15] [16]. Table 2 elucidates other cyber-attacks against this layer along with the security measures.…”
Section: Transport Layermentioning
confidence: 99%
“…SDN based IDS for monitoring activity [16]. Dynamic Anomaly Detection module by learning attack behaviour [15].…”
Section: Attackmentioning
confidence: 99%