2020 IEEE International Conference on Computing, Power and Communication Technologies (GUCON) 2020
DOI: 10.1109/gucon48875.2020.9231139
|View full text |Cite
|
Sign up to set email alerts
|

Real Time DDoS Intrusion Detection and Monitoring Framework in 6LoWPAN for Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…Mehta and Parma [31] This work determined a gap that conceivable attacks in OF should be perceptible IDS procedures along with FS Sheikhan and Bostani [63] This work declined to detect obscure attacks utilizing preferred characteristics for misuse-based detections Mayzaud et al [65,66] Even though authors believe their research is an appropriate mechanism for IoT-based anomaly detection, they have no compelling reason to detect attacks beyond DODAG Lee et al [36] This study does not evaluate the two objective functions OF0 and MRHOF according to EC and network flow metrics to detecting malicious actions Sousa et al [67] This research explained the various routing metrics and CAOF and OF-FL objective functions but did not consider them in the simulations Napiah et al [64] This work has eliminated the EC metric to ensure the effectiveness of the ML algorithms used and reduced the features to 5 features of 77 Datasets and classifiers related to ML Haq [68] This research surveys 49 relevant works and focuses discussions when creating ML-based IDS. The author also considers ML-based techniques, classifier mechanisms, efficient algorithms, datasets, also FS Nannan et al [69] In this paper, classification mechanisms, datasets, FS, ML-based solution, and efficient algorithms are [75], are used in IoT networks [76]. On the other hand, the papers are based on intrusion detection systems for IoT-related components.…”
Section: Iot Methodologiesmentioning
confidence: 99%
“…Mehta and Parma [31] This work determined a gap that conceivable attacks in OF should be perceptible IDS procedures along with FS Sheikhan and Bostani [63] This work declined to detect obscure attacks utilizing preferred characteristics for misuse-based detections Mayzaud et al [65,66] Even though authors believe their research is an appropriate mechanism for IoT-based anomaly detection, they have no compelling reason to detect attacks beyond DODAG Lee et al [36] This study does not evaluate the two objective functions OF0 and MRHOF according to EC and network flow metrics to detecting malicious actions Sousa et al [67] This research explained the various routing metrics and CAOF and OF-FL objective functions but did not consider them in the simulations Napiah et al [64] This work has eliminated the EC metric to ensure the effectiveness of the ML algorithms used and reduced the features to 5 features of 77 Datasets and classifiers related to ML Haq [68] This research surveys 49 relevant works and focuses discussions when creating ML-based IDS. The author also considers ML-based techniques, classifier mechanisms, efficient algorithms, datasets, also FS Nannan et al [69] In this paper, classification mechanisms, datasets, FS, ML-based solution, and efficient algorithms are [75], are used in IoT networks [76]. On the other hand, the papers are based on intrusion detection systems for IoT-related components.…”
Section: Iot Methodologiesmentioning
confidence: 99%
“…These attacks cause massive data theft and system susceptibility [8]. Moreover, an increase in connected IoT devices and their insecure nature gives adversaries more options to gain access to the devices and use them to launch further large-scale catastrophic attacks like DDoS [9]. The popularity of RPL in IoT applications renders the security of this protocol of paramount importance.…”
Section: Figure 1 Applications Of the Internet Of Thingsmentioning
confidence: 99%
“…[30] extracted indicators from IEEE 802.15.4, 6LoWPAN, IPv6 and COAP protocols parameters for detecting invalid CoAP request DoS attacks. Similarly, Granjal et al [35] investigated DDoS against CoAP and other protocols in the 6LoWPAN network.…”
Section: Related Workmentioning
confidence: 99%