2022
DOI: 10.1155/2022/9173291
|View full text |Cite
|
Sign up to set email alerts
|

MidSiot: A Multistage Intrusion Detection System for Internet of Things

Abstract: Internet of Things (IoT) has been thriving in recent years, playing an important role in a multitude of various domains, including industry 4.0, smart transportation, home automation, and healthcare. As a result, a massive number of IoT devices are deployed to collect data from our surrounding environment and transfer these data to other systems over the Internet. This may lead to cybersecurity threats, such as denial of service attacks, brute-force attacks, and unauthorized accesses. Unfortunately, many IoT d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(14 citation statements)
references
References 43 publications
(29 reference statements)
0
14
0
Order By: Relevance
“…Table 7 and Fig. 3 compares the classification accuracy of the traditional and proposed AI based detection methodologies used for IoT security by using IoT-IDS20 dataset 40 . Typically, the classification accuracy is one of the most prominent measure used to determine the overall intrusion detection rate of IDS framework.…”
Section: Resultsmentioning
confidence: 99%
“…Table 7 and Fig. 3 compares the classification accuracy of the traditional and proposed AI based detection methodologies used for IoT security by using IoT-IDS20 dataset 40 . Typically, the classification accuracy is one of the most prominent measure used to determine the overall intrusion detection rate of IDS framework.…”
Section: Resultsmentioning
confidence: 99%
“…Convolutional Neural Networks decision regression for an intrusion detection method as a special framework [5] is used, it detects only Man in the Middle Attack and DoS attack but no other threats. Network flow generator technique and deep packet inspection method [6] is used, both are related only to the IP address and MAC address if someone tries to break or block but it will not send an alert to the administration. trust integrated RPL protocol (TRPL) technique in IDS [7] is used, it successes in detecting black whole attack from the network in the IoT but it went with limitation in storage and computing capabilities.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [8], the proposed system called MidSiot is used on the IoT. It consists of several stages, including identifying and classifying attacks and real network traffic, and achieved an average accuracy of 99.68%.…”
Section: Related Workmentioning
confidence: 99%