2022
DOI: 10.3390/a15070239
|View full text |Cite
|
Sign up to set email alerts
|

IoT Multi-Vector Cyberattack Detection Based on Machine Learning Algorithms: Traffic Features Analysis, Experiments, and Efficiency

Abstract: Cybersecurity is a common Internet of Things security challenge. The lack of security in IoT devices has led to a great number of devices being compromised, with threats from both inside and outside the IoT infrastructure. Attacks on the IoT infrastructure result in device hacking, data theft, financial loss, instability, or even physical damage to devices. This requires the development of new approaches to ensure high-security levels in IoT infrastructure. To solve this problem, we propose a new approach for … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 37 publications
0
6
0
Order By: Relevance
“…In this case (Figure 13), Y involves the aggregation of weighted inputs (Zi) to generate a prediction. The perceptron, a foundational element within neural networks [21], employs weights ( f ) applied to input features (W) and computes their sum, e.g., as in Figures 2-4 and Tables 2 and 3, oriented with behavioral data [19,63] that are multivector factors of cyberattacks. In addition to precision of calculation assigned to these perceptron analyses, many more inputs are required to facilitate the orientation through the sum of TTPs and attack patterns.…”
Section: Perceptron Relationsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this case (Figure 13), Y involves the aggregation of weighted inputs (Zi) to generate a prediction. The perceptron, a foundational element within neural networks [21], employs weights ( f ) applied to input features (W) and computes their sum, e.g., as in Figures 2-4 and Tables 2 and 3, oriented with behavioral data [19,63] that are multivector factors of cyberattacks. In addition to precision of calculation assigned to these perceptron analyses, many more inputs are required to facilitate the orientation through the sum of TTPs and attack patterns.…”
Section: Perceptron Relationsmentioning
confidence: 99%
“…According to Ref. [63], with a differential schema-oriented perspective model, the purpose is related to analyze the traffic obtained from internal sources (CPS or CSB) about anomaly behavior (feature extraction); this separation has bad or good traffic-related, e.g., DDoS, attacks, in general, MIRAI Botnet. This is achieved (Table 2) through the application of sophisticated techniques, such as those outlined in the MITRE ATT&CK framework [16].…”
mentioning
confidence: 99%
“…The assumption that every device has independent placement has the various other devices placed independently with a combined network representation as PPP within intensity λm classified by the Φm with a consequent˄= ∑_(m=1)^M▒λm. The traditional communication infrastructure lacks within this advanced network, limiting the base communications to D2D [20]. Therefore, device Tm of the m type has the capability of communicating with device yn of the n-type on the condition ‖X_m-y_n ‖≤r_m.…”
Section: Network Geometrymentioning
confidence: 99%
“…Owing to the pervasive nature of such gadgets and due to the simplicity of observing and controlling gadgets from distant places, there occurs a fast advancement in framing various new applications in numerous fields like connected industrial and manufacturing sensors and equipment, smart home devices, health monitoring gadgets, energy management gadgets, wearable devices, etc. [2,3]. The main concern in the IoT network was managing the device's security and data protection from assaults.…”
Section: Introductionmentioning
confidence: 99%