2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS) 2019
DOI: 10.1109/icsess47205.2019.9040855
|View full text |Cite
|
Sign up to set email alerts
|

Research on DDoS Attack Detection Based on ELM in IoT Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 4 publications
0
8
0
Order By: Relevance
“…It can lead to serious consequences such as distributed denial of service attacks (DDoS). The other types of attacks may be similar attacks, i.e., trojan attacks [32]- [34], worm attacks [17], [35], [36], Denial-of-Service attacks (DoS) [3], [19], [34], [37], or data can be spoofed by Man-in-the-middle attacks (MITM) [3], [4], Meet-in-the-middle attacks (MeetITM) [38], and repudiation attacks [39] while one-way encryption schemes are best suited to hinder the attack vector [30], [40]- [42].…”
Section: A Transmission Layer Adversariesmentioning
confidence: 99%
“…It can lead to serious consequences such as distributed denial of service attacks (DDoS). The other types of attacks may be similar attacks, i.e., trojan attacks [32]- [34], worm attacks [17], [35], [36], Denial-of-Service attacks (DoS) [3], [19], [34], [37], or data can be spoofed by Man-in-the-middle attacks (MITM) [3], [4], Meet-in-the-middle attacks (MeetITM) [38], and repudiation attacks [39] while one-way encryption schemes are best suited to hinder the attack vector [30], [40]- [42].…”
Section: A Transmission Layer Adversariesmentioning
confidence: 99%
“…They combined diversified feature selection with extreme learning machine to build classifier and claimed to achieve promising results. In 2019, Li and Wei [89] analyzed DDoS attack to propose joint entropy features. combining with extreme learning machine for detection of DDoS attack.…”
Section: Iot Applicationmentioning
confidence: 99%
“…As discussed in Section 5.3 , the manufacturers’ low concentration of security features in the IoT-enabled smart assets has uprooted the attack vector to target the devices according to the need. The flaws in security features such as easy-to-guess default login credentials, open ports, unencrypted and weak versions of SSL (v2, v3, and CBC mode) services, etc., give the attack vector an edge to turn these devices vulnerabilities to botnet attacks such as Ramnit (2015), Mootbot (2020), etc., causing the cost of IoT hacks for small US firms amounts to 13% of their annual revenue [ 27 , 28 , 29 , 30 ].…”
Section: Smart City Layered Adversariesmentioning
confidence: 99%
“…In these attacks, the service delivery is compromised to the resources such as network devices, applications, and even specific functions within applications. It may also exist in different forms such as ping-of-death, Smurf, and Black Energy series (BE-1, BE-2) [ 30 , 37 , 38 , 39 ].…”
Section: Smart City Layered Adversariesmentioning
confidence: 99%