2020
DOI: 10.1016/j.compeleceng.2020.106738
|View full text |Cite
|
Sign up to set email alerts
|

Near real-time security system applied to SDN environments in IoT networks using convolutional neural network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
40
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 87 publications
(42 citation statements)
references
References 28 publications
0
40
0
2
Order By: Relevance
“…ere is increasing interest in research to improve security by introducing ML or deep learning to detect DDoS (distributed denial-of-service) attacks, malicious code, abnormal behavior, and abnormal energy consumption for IoT devices [60][61][62][63][64][65][66].…”
Section: Keyword Clustering and Evolution Of Research On Iotmentioning
confidence: 99%
See 1 more Smart Citation
“…ere is increasing interest in research to improve security by introducing ML or deep learning to detect DDoS (distributed denial-of-service) attacks, malicious code, abnormal behavior, and abnormal energy consumption for IoT devices [60][61][62][63][64][65][66].…”
Section: Keyword Clustering and Evolution Of Research On Iotmentioning
confidence: 99%
“…When a network attack occurs in an SDN, ML can be introduced as a detection technology to dynamically control and route the communication flow. Recently, studies using ML to detect and automatically respond to DDoS attacks, abnormal patterns, and data leaks against IoT networks and devices have increased [60,[189][190][191][192][193][194][195][196][197][198][199].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…An increase in cyber-crimes has made the detection of intrusions in the network a vital research area [1]. Traditionally, personal computers (PC) and computer networks have been the subject of cyber-attack, but recently, cyber-physical systems [2], Internet of Things (IoT) [3], internet of medical things (IoMT) [4], Internet of Connected Vehicles [5], smart factories [6], and 5G communication infrastructures [7] have become targets of numerous attacks as well. Several studies have been carried out to suggest remarkable strategies to fight against cyber actions [8,9].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the IoT network faces many issues, which capture the interest of researchers to improve its efficiency. The last few decades have been quite active in IoT research, which resulted in a huge amount of proposals for various routing protocols [5], [6], security models [7], [8] and clustering techniques [9] that provide secure and trustful communication in the IoT networks. However, IoT networks are always threatened to be compromised by the external nodes, which mislead the networks by sending false data for their benefit.…”
Section: Introductionmentioning
confidence: 99%