2018
DOI: 10.1109/access.2018.2798626
|View full text |Cite
|
Sign up to set email alerts
|

Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
54
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 88 publications
(55 citation statements)
references
References 40 publications
0
54
0
1
Order By: Relevance
“…Napiah et al [14] e paper discussed reducing features from 77 to 5 removing power consumption to ensure ML algorithms were efficient. Power consumption metrics along with feature reduction strategy will be in the scope of our work.…”
Section: Mrhof and Of0 Attacksmentioning
confidence: 99%
“…Napiah et al [14] e paper discussed reducing features from 77 to 5 removing power consumption to ensure ML algorithms were efficient. Power consumption metrics along with feature reduction strategy will be in the scope of our work.…”
Section: Mrhof and Of0 Attacksmentioning
confidence: 99%
“…Our framework provides an effective solution to zero-day attacks previously unseen in the training data. Furthermore, unlike traditional intrusion detection methods that compare a network traffic record against an established baseline traffic (i.e., normal), our framework provides an effective solution to more challenging situations when the normal activity has a short history as well, and is hard to learn offline or due to a blur boundary between the observation of normal and abnormal behavior [1], [2]. Two changes in the modules of DeROL algorithm were made to analyze the UNSW-NB15 dataset as compared to the analysis of the OMNIGLOT dataset.…”
Section: Network Traffic Analysis Using the Unsw-nb15 Intrusion Dementioning
confidence: 99%
“…Once the system experiences a zero-day (i.e., previously unseen) attack, the IDS often sends the session summary records to a cybersecurity analyst for deeper event inspection, who in turn labels the records as malicious activity (or normal activity in the case of a false positive). A more challenging scenario occurs when normal activity changes rapidly and is hard to learn offline or due to a blur boundary between the observation of normal and abnormal behavior [1], [2]. Finally, computer vision tasks involving the deployment of camera sensor networks in the field require classifying events for civilian or military video surveillance [3]- [5].…”
Section: Introductionmentioning
confidence: 99%
“…In [20] a compression header analyzer based IDS named CHA-IDS is proposed. It uses signature-based detection mechanism which is embedded in the border router.…”
Section: Related Workmentioning
confidence: 99%