2022
DOI: 10.32604/csse.2022.018518
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks

Abstract: Internet of Things (IoT) devices work mainly in wireless mediums; requiring different Intrusion Detection System (IDS) kind of solutions to leverage 802.11 header information for intrusion detection. Wireless-specific traffic features with high information gain are primarily found in data link layers rather than application layers in wired networks. This survey investigates some of the complexities and challenges in deploying wireless IDS in terms of data collection methods, IDS techniques, IDS placement strat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(13 citation statements)
references
References 57 publications
0
12
0
Order By: Relevance
“…The KDDCup 99 dataset is one of the popular datasets in IoT with cybersecurity [33], [34], [35], [36], [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47]. This dataset provides labelled and unlabeled training and testing data, and it originated from the evaluation program DARPA98 IDS with corresponds to seven and two weeks [33], [41], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60], [61], [62], [63], [64], [65], [66], [67], [68], [69], [70], [71], [72], [73], [74]. The UNSW-NB15 dataset was created by perfectStorm (IXIA) in collaboration with the UNSW Cyber Range Lab to generate moderately aggressive activities and attacks.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…The KDDCup 99 dataset is one of the popular datasets in IoT with cybersecurity [33], [34], [35], [36], [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47]. This dataset provides labelled and unlabeled training and testing data, and it originated from the evaluation program DARPA98 IDS with corresponds to seven and two weeks [33], [41], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60], [61], [62], [63], [64], [65], [66], [67], [68], [69], [70], [71], [72], [73], [74]. The UNSW-NB15 dataset was created by perfectStorm (IXIA) in collaboration with the UNSW Cyber Range Lab to generate moderately aggressive activities and attacks.…”
Section: Methodsmentioning
confidence: 99%
“…The studies focused on the issues, challenges, and shortcomings of ML and DL techniques for detecting ICS anomalies and the current ICS-to-cloud infrastructure. ML methods secure ICT on the network and physical levels by managing the information through packets and controlling anomalies [66]. The research on ML-AIDS identifies and efficiently implements the effective and efficient anomalies of networks and computers [70].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The algorithms: image block-matching (Abdullah, 2013) and IoT and Mobile Ad hoc (Vasaki et al, 2022) were applied to NSL-KDD data sets for computer network intrusion detection. However, the ndings are poor in performance and more speci c. It means that intrusion detection for dynamic systems needs combined or integrated techniques to gain better results.…”
Section: Related Workmentioning
confidence: 99%
“…An intrusion detection system based on artificial intelligence [1][2][3] is needed to detect new and malicious network attacks that traditional firewalls cannot detect. is system protects against network attacks on vulnerable services, data-driven attacks in applications, and privilege escalation and intruder login/access to major files by intruders/malicious software (computer viruses, Trojan horses, and worms) and hostbased attacks.…”
Section: Introductionmentioning
confidence: 99%