2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) 2017
DOI: 10.1109/icdcs.2017.104
|View full text |Cite
|
Sign up to set email alerts
|

Kalis — A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
57
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 127 publications
(58 citation statements)
references
References 23 publications
0
57
1
Order By: Relevance
“…Even in the larger domain of network traffic analysis, autoencoders have not been used as fully automated standalone malware detectors, but rather as preliminary tools for either feature learning [15] or dimensionality reduction [16], or at most as semimanual outlier detectors which substantially depend on human labeling for subsequent classification [17] or further inspection by security analysts [13]. 2) Unlike previous experimental studies on the detection of IoT botnets or IoT traffic anomalies which relied on emulated or simulated data ( [4], [7], [8], [10]), we perform empirical evaluation with real traffic data, gathered from nine commercial IoT devices infected by authentic botnets from two families. We examine Mirai and BASHLITE, two of the most common IoTbased botnets, which have already demonstrated [1] their harmful capabilities.…”
Section: Introductionmentioning
confidence: 99%
“…Even in the larger domain of network traffic analysis, autoencoders have not been used as fully automated standalone malware detectors, but rather as preliminary tools for either feature learning [15] or dimensionality reduction [16], or at most as semimanual outlier detectors which substantially depend on human labeling for subsequent classification [17] or further inspection by security analysts [13]. 2) Unlike previous experimental studies on the detection of IoT botnets or IoT traffic anomalies which relied on emulated or simulated data ( [4], [7], [8], [10]), we perform empirical evaluation with real traffic data, gathered from nine commercial IoT devices infected by authentic botnets from two families. We examine Mirai and BASHLITE, two of the most common IoTbased botnets, which have already demonstrated [1] their harmful capabilities.…”
Section: Introductionmentioning
confidence: 99%
“…Midi et al [15] proposed a self-adapting, knowledge-driven expert Intrusion Detection System (KALIS) is introduced which can change its performance after evaluating its efficiency. It is focused on network features and its protocols to improve detection efficiency.…”
Section: Hybrid Approaches To Intrusion Detectionmentioning
confidence: 99%
“…However, this comes at a cost of increased computational overhead due to the use of a symmetric key. (Midi et al 2017) proposed an intrusion detection system for IoT named Kalis. Kalis is placed at the border router to collect features of the network and use these to dynamically configure appropriate detection techniques.…”
Section: Related Workmentioning
confidence: 99%