2023
DOI: 10.1002/ett.4758
|View full text |Cite
|
Sign up to set email alerts
|

SDN and application layer DDoS attacks detection in IoT devices by attention‐based Bi‐LSTM‐CNN

Abstract: The Internet of Things (IoT) is connecting more devices every day. Security is critical to ensure that the devices operate in a trusted environment. The lack of proper IoT security encourages cybercriminals to target many smart devices across the network and gain sensitive information. Distributed Denial of Service (DDoS) attacks are common in the IoT infrastructure and involve hijacking IoT devices to consume resources and interrupt services. This may specifically vandalize the application running the service… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 21 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…The results of the proposed ASB-IB and LW-PWECC methods are implemented. Several existing classifiers like Dual CNN [44], LSTM, Spiking Neural Network (SNN), Binarized Spiking Neural Network (BSNN) [46][59] and encryption methods like Identity-Based Encryption (IBE) [60], Advanced Encryption Standard (AES) [63], Rivest-Shamir-Adleman (RSA) [64] and ECC [63] are taken to compare the performance of the introduced approach.…”
Section: Resultsmentioning
confidence: 99%
“…The results of the proposed ASB-IB and LW-PWECC methods are implemented. Several existing classifiers like Dual CNN [44], LSTM, Spiking Neural Network (SNN), Binarized Spiking Neural Network (BSNN) [46][59] and encryption methods like Identity-Based Encryption (IBE) [60], Advanced Encryption Standard (AES) [63], Rivest-Shamir-Adleman (RSA) [64] and ECC [63] are taken to compare the performance of the introduced approach.…”
Section: Resultsmentioning
confidence: 99%
“…Traditional machine learning SVM [31][32][33][34][35] Decision Tree [36][37][38] KNN [38][39][40][41] Naive Bayes [38,[42][43][44] Random Forest [36][37][38] Deep learning SOM [41,45,46] ANN [47][48][49] LSTM [48][49][50] DNN [51][52][53] RNN [50,53] The SVM algorithm is a binary classification model utilized for distinguishing between normal and abnormal data in the context of DDoS attack detection based on traffic characteristics. Based on the traffic characteristics observed in the SDN network environment, the SVM detection algorithm is employed to gather input feature vectors in order to develop an algorithm for detecting malicious behavior within the network.…”
Section: Algorithm Classification Algorithm Referencesmentioning
confidence: 99%
“…A smart city's security breach can have far-reaching consequences, impacting public services, citizen trust, and economic stability. Common cyber threats in smart cities include data breaches, denial of service (DoS) attacks, ransomware, phishing, and manipulation of IoT devices [3]. Given the magnitude of these threats, research and development efforts have been directed toward enhancing the cybersecurity posture of smart cities.…”
Section: Introductionmentioning
confidence: 99%