2023
DOI: 10.1016/j.eswa.2022.119330
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of intrusion detection model for DDoS attacks in Lightweight IoT Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 51 publications
(12 citation statements)
references
References 36 publications
0
8
0
Order By: Relevance
“…To prove the effectiveness of our proposal in binary classification, we compared our results with two recent studies on IoT intrusion detection using the same dataset [24] and [30], focusing on two cases: Normal vs. All Attacks and Normal vs. DDoS Attacks. Table 5 shows the performance results of binary classification on the Bot-IoT dataset for the two specific cases.…”
Section: Resultsmentioning
confidence: 99%
“…To prove the effectiveness of our proposal in binary classification, we compared our results with two recent studies on IoT intrusion detection using the same dataset [24] and [30], focusing on two cases: Normal vs. All Attacks and Normal vs. DDoS Attacks. Table 5 shows the performance results of binary classification on the Bot-IoT dataset for the two specific cases.…”
Section: Resultsmentioning
confidence: 99%
“…Where, k t is the t th cumulants, μ represented as mean, and 3 m is the third central moment. Where E represents the expectation operator, σ indicates the standard deviation, μ represents the mean, 3 m is the third central moment, and k t is the t th cumulants. The final equality indicates skewness regarding the correlation between the third cumulant k 3 and the second cumulant's k 2 1.5th power.…”
Section: Feature Extraction 321 Statistical Featuresmentioning
confidence: 99%
“…Security in IoT is one of the major issues these days due to various attacks in the real-time environment from hackers and virus programmers [2]. Early detection can limit these issues' significant effects on IoT networks [3]. The fast improvement of technological advancements leads to a chance where worms, viruses, and attacks threaten computers and networks [4].…”
Section: Introductionmentioning
confidence: 99%
“…The former identifies attacks by manually maintaining a list of detection rules, which is commonly used in industrial security products. The latter [2][3][4][5][6][7][8][9][10][11] involves training a machine learning model for detection. The drawback of the former lies in the expensive manual maintenance of detection rules, while the latter requires security experts to perform feature engineering.…”
Section: Introductionmentioning
confidence: 99%
“…However, due to limitations in expert knowledge, the defined feature engineering approaches have their own flaws. For instance, the flow header features and Hrust features proposed in [2][3] cannot detect all types of DDoS attacks, and the methods presented in [4][5][6][7][8][9][10][11] can only detect DDoS attacks initiated by IoT botnets.…”
Section: Introductionmentioning
confidence: 99%