2016
DOI: 10.1145/2990499
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent Intrusion Detection in Low-Power IoTs

Abstract: Security and privacy of data are one of the prime concerns in today’s Internet of Things (IoT). Conventional security techniques like signature-based detection of malware and regular updates of a signature database are not feasible solutions as they cannot secure such systems effectively, having limited resources. Programming languages permitting immediate memory accesses through pointers often result in applications having memory-related errors, which may lead to unpredictable failures and security vulnerabil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
58
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
4
1

Relationship

2
8

Authors

Journals

citations
Cited by 82 publications
(58 citation statements)
references
References 44 publications
0
58
0
Order By: Relevance
“…For instance, Recurrent Neural Network (RNN) is used by Kim et al [134] to train the IDS model which is based on Long Short Term Memory (LSTM) architecture. Similarly, Saeed et al [135] used Random Neural Networks (RaNN) for the realization of efficient and fast anomaly-based intrusion detection in lowpower IoT networks. The authors proposed a two-layer model where at the first layer, normal behavior is learnt by the system and at the second layer, different kinds of Illegal Memory Access (IMA) bugs and data integrity attacks on the network are detected.…”
Section: Anomaly/intrusion Detectionmentioning
confidence: 99%
“…For instance, Recurrent Neural Network (RNN) is used by Kim et al [134] to train the IDS model which is based on Long Short Term Memory (LSTM) architecture. Similarly, Saeed et al [135] used Random Neural Networks (RaNN) for the realization of efficient and fast anomaly-based intrusion detection in lowpower IoT networks. The authors proposed a two-layer model where at the first layer, normal behavior is learnt by the system and at the second layer, different kinds of Illegal Memory Access (IMA) bugs and data integrity attacks on the network are detected.…”
Section: Anomaly/intrusion Detectionmentioning
confidence: 99%
“…Subba et al [23] employed an ANN model in order to introduce an intelligent agent for classifying whether the underlying patterns of audit records are normal or abnormal while classifying them into new and unseen records. Saeed et al [24] proposed a two-level anomaly-based IDS using a Random Neural Network (RNN) model in an IoT environment. The RNN model was employed in order to build a behavior profile based on both valid and invalid system input parameters to distinguish 115 normal and abnormal patterns.…”
Section: Related Workmentioning
confidence: 99%
“…A number of machine learning systems have also been proposed for detecting malicious nodes in an IoT network [38,39,40,41]. However, measuring behaviour patterns of device usage and processing it via multistage neural networks could have a high-energy consumption.…”
Section: Intrusion Detection Within Iot Systemsmentioning
confidence: 99%