2023
DOI: 10.1109/access.2023.3238664
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures

Abstract: Computer viruses, malicious, and other hostile attacks can affect a computer network. Intrusion detection is a key component of network security as an active defence technology. Traditional intrusion detection systems struggle with issues like poor accuracy, ineffective detection, a high percentage of false positives, and an inability to handle new types of intrusions. To address these issues, we propose a deep learning-based novel method to detect cybersecurity vulnerabilities and breaches in cyber-physical s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 28 publications
(13 citation statements)
references
References 70 publications
0
8
0
Order By: Relevance
“…Encryption is unavoidable in all layers of IoT. The network layer is responsible for denial of service (DoS) attacks, ransomware attacks, botnets, sniers, and unauthorized access [10]. According to recent research, more than 98% of trac sent by IoT devices is unencrypted, exposing vast amounts of personal and condential data to potential attackers [10].…”
Section: A Other Recent Real-time Iot Attacks Caused By Lack Of Robus...mentioning
confidence: 99%
See 4 more Smart Citations
“…Encryption is unavoidable in all layers of IoT. The network layer is responsible for denial of service (DoS) attacks, ransomware attacks, botnets, sniers, and unauthorized access [10]. According to recent research, more than 98% of trac sent by IoT devices is unencrypted, exposing vast amounts of personal and condential data to potential attackers [10].…”
Section: A Other Recent Real-time Iot Attacks Caused By Lack Of Robus...mentioning
confidence: 99%
“…The DoS attack is an intrusion that consumes various resources and service oerings of the company by spreading unusable trac and preventing dependable users from using the services [10]. DoS attackers generally maintain their independence by working with multiple victim machines and monitoring legitimate network trafc, making detection more dicult [10]. Network trac should be encrypted with a robust algorithm to prevent DoS, and access control should be implemented with a robust hash authentication algorithm [10].…”
Section: ) Denial Of Service (Dos) Attacksmentioning
confidence: 99%
See 3 more Smart Citations