2018 Fifth International Conference on Software Defined Systems (SDS) 2018
DOI: 10.1109/sds.2018.8370427
|View full text |Cite
|
Sign up to set email alerts
|

Pushing intelligence to the network edge

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…AI-based IDS and traffic classification schemes have been presented in the literature. Recently, a non-cryptographic device authentication scheme was presented in [368,369] and it is based on the network generated traffic. The presented solution uses an intelligent authentication factor ("you are"), that can help in reducing the false positive detection rate (illegal access probability), if combined with another factor(s) ("you know" and "you have").…”
Section: Future Research Directionsmentioning
confidence: 99%
“…AI-based IDS and traffic classification schemes have been presented in the literature. Recently, a non-cryptographic device authentication scheme was presented in [368,369] and it is based on the network generated traffic. The presented solution uses an intelligent authentication factor ("you are"), that can help in reducing the false positive detection rate (illegal access probability), if combined with another factor(s) ("you know" and "you have").…”
Section: Future Research Directionsmentioning
confidence: 99%
“…In our previous work, 2 we present a framework for traffic identification and abnormal traffic detection. This framework consists of three components, a classifier, a security orchestrator, and an intrusion detection module.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, practically, deploying new traffic control functionalities on top of the traditional network is not a straightforward task, and given the large scale within IoT networks, there is a need for a scalable management solution 1 . To this end, the framework that we propose, which is an extension of our previous work, 2 will extract only simple features per packet for any 16 consecutive packets of a flow to identify the IoT device type and detect attack traffic. The extracted features are the packets' direction, size, timestamp, and transport protocol.…”
Section: Introductionmentioning
confidence: 99%