2021 IEEE 7th International Conference on Network Softwarization (NetSoft) 2021
DOI: 10.1109/netsoft51509.2021.9492685
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT

Abstract: The rapid increase in the use of IoT devices brings many benefits to the digital society, ranging from improved efficiency to higher productivity. However, the limited resources and the open nature of these devices make them vulnerable to various cyber threats. A single compromised device can have an impact on the whole network and lead to major security and physical damages. This paper explores the potential of using network profiling and machine learning to secure IoT against cyber-attacks. The proposed anom… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 24 publications
(10 citation statements)
references
References 9 publications
(18 reference statements)
0
10
0
Order By: Relevance
“…Figure 2 shows how to make a tree shape. This tree shape was created with the help of experts' opinions [34]. The triangular fuzzy number (TFN) is then constructed from the hierarchical structure.…”
Section: Fuzzy Ahp-topsis Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…Figure 2 shows how to make a tree shape. This tree shape was created with the help of experts' opinions [34]. The triangular fuzzy number (TFN) is then constructed from the hierarchical structure.…”
Section: Fuzzy Ahp-topsis Methodologymentioning
confidence: 99%
“…It should be necessary to evaluate the effectiveness of different intrusion-detection systems [33,34]. A condition that is hard to ascertain is unsuitable for the job.…”
Section: Statistical Findingsmentioning
confidence: 99%
“…The experiments conducted on KDDCup99, NSL-KDD, and UNSW-NB15 yielded results of 98.85%, 97.55%, and 84.33%, respectively. The authors in [58] exploited incremental machine learning to build an effective network intrusion prevention system for IoT. The proposed system includes an online-cluster algorithm powered by the self-organizing incremental neural network and multiple support vector machines to classify the attacks.…”
Section: Related Workmentioning
confidence: 99%
“…The superiority of anomaly-based techniques in detecting unknown attacks and their ability to adopt to the operational environment makes them ideal for the IoMT ecosystem. Several intelligent intrusion detection systems have been proposed relying on different ML or deep learning (DL) algorithms [1,3,19,25]. Recent studies have also considered using FL approaches to improve IDS performance for the IoMT -see e.g.…”
Section: Related Workmentioning
confidence: 99%