2022
DOI: 10.3390/s22166164
|View full text |Cite
|
Sign up to set email alerts
|

Examining the Suitability of NetFlow Features in Detecting IoT Network Intrusions

Abstract: The past few years have witnessed a substantial increase in cyberattacks on Internet of Things (IoT) devices and their networks. Such attacks pose a significant threat to organizational security and user privacy. Utilizing Machine Learning (ML) in Intrusion Detection Systems (NIDS) has proven advantageous in countering novel zero-day attacks. However, the performance of such systems relies on several factors, one of which is prediction time. Processing speed in anomaly-based NIDS depends on a few elements, inc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 24 publications
0
6
0
Order By: Relevance
“…Table 9 and Fig. 5 compares the precision conventional 41 and proposed security methodologies by using Netflow-BoT-IoT-v2 dataset. Typically, precision is the metric that assesses a performance of the model by determining how frequently the model's forecast is accurate when it correctly foresees an occurrence.…”
Section: Resultsmentioning
confidence: 99%
“…Table 9 and Fig. 5 compares the precision conventional 41 and proposed security methodologies by using Netflow-BoT-IoT-v2 dataset. Typically, precision is the metric that assesses a performance of the model by determining how frequently the model's forecast is accurate when it correctly foresees an occurrence.…”
Section: Resultsmentioning
confidence: 99%
“…Flow-based detection (ref. [11,15]) has numerous advantages. It focuses explicitly on analyzing IP stream records, which provide aggregated information about packet headers and summarize network traffic as IP streams.…”
Section: Related Workmentioning
confidence: 99%
“…These methods mainly consist of traffic-based detection (ref. [11][12][13][14][15]) and graph-based detection (ref. [16][17][18][19][20]).…”
Section: Introductionmentioning
confidence: 99%
“…Anomaly detection is a crucial procedure in protecting networked systems as it allows for the identification of unusual or abnormal behavior within a network of connected devices. This is particularly important in the context of the IoT, where the sheer volume of data generated by vulnerable devices can make it difficult to identify and respond to potential security threats [8,9].…”
Section: Introductionmentioning
confidence: 99%