2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP) 2022
DOI: 10.1109/csndsp54353.2022.9908049
|View full text |Cite
|
Sign up to set email alerts
|

ML-based Detection of Rank and Blackhole Attacks in RPL Networks

Abstract: Although IoT security is a field studied extensively, recent attacks such as BotenaGo show that current security solutions cannot effectively stop the spread of IoT attacks. Machine Learning (ML) techniques are promising in improving protection against such attacks. In this work, three supervised ML algorithms are trained and evaluated for detecting rank and blackhole attacks in RPL-based IoT networks. Extensive simulations of the attacks are implemented to create a dataset and appropriate fields are identifie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 14 publications
(17 reference statements)
0
1
0
Order By: Relevance
“…In general the blackhole node controls every packet on that path [18]. Due to blackhole attack, retransimision rate is increase by child node and lead to DoS attack [40].…”
Section: Blackhole Attackmentioning
confidence: 99%
“…In general the blackhole node controls every packet on that path [18]. Due to blackhole attack, retransimision rate is increase by child node and lead to DoS attack [40].…”
Section: Blackhole Attackmentioning
confidence: 99%
“…As técnicas de AutoML ajudam as soluções a se adaptarem a diferentes tipos de ataques. Ioulianou et al (2022) utilizaram o processo AutoML para combater ataques de roteamento do tipo blackhole. No ataque blackhole, o invasor controla o nó malicioso e determina o descarte de todos os dados que recebe.…”
Section: Trabalhos Relacionadosunclassified
“…No ataque blackhole, o invasor controla o nó malicioso e determina o descarte de todos os dados que recebe. Ou seja, os nós legítimos tentam retransmitir os dados, mas, durante o ataque, o nó malicioso descarta todos os dados que recebe, prejudicando o correto funcionamento da rede [Ioulianou et al 2022]. Os autores verificaram que a solução proposta consegue encontrar diferentes arquiteturas de DL para diferentes conjuntos de dados.…”
Section: Trabalhos Relacionadosunclassified
See 1 more Smart Citation
“…Traditionally, one of the popular methods of securing Internet-connected systems is to set up appropriate security mechanisms, such as intrusion detection systems (IDS), to be able to detect attacks that target systems and networks [11,12]. Some more recent solutions rely on deep learning techniques for IoT data analysis [13], cloud-based security mechanisms [14], cross-layer intrusion detection [15], reinforcement learning (RL) [16], and machine learning (ML)-based attack detection [17].…”
Section: Introductionmentioning
confidence: 99%