2021
DOI: 10.1016/j.matpr.2021.01.751
|View full text |Cite|
|
Sign up to set email alerts
|

WITHDRAWN: A hybrid algorithm design for near real time detection cyber attacks from compromised devices to enhance IoT security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…Instead of alerting the InfoSec community, it was believed that the U.S. National Security Assistance identified this vulnerability and mishandled the knowledge by creating legislation to exploit it, dubbed Eternal Blue. 10 Microsoft published SMB updates two months before the incident, yet the epidemic exposed and severely harmed patch less Computers. The business stated that the equipment only suffered minor damage.…”
Section: The Wannacry Outbreak Incidentmentioning
confidence: 99%
“…Instead of alerting the InfoSec community, it was believed that the U.S. National Security Assistance identified this vulnerability and mishandled the knowledge by creating legislation to exploit it, dubbed Eternal Blue. 10 Microsoft published SMB updates two months before the incident, yet the epidemic exposed and severely harmed patch less Computers. The business stated that the equipment only suffered minor damage.…”
Section: The Wannacry Outbreak Incidentmentioning
confidence: 99%
“…Time-series data [43,44,45,46,47,48,49,50] Smart city [51,52,53,54] Monitoring machinery health [55,5] Robotics and manufacturing [56,57,58] Detection applications for IoT sensors [59,60] Other industrial or manufacturing [61,62,63,64] Surveillance and video [65,66,67] General-purpose frameworks [68,69,70] Network and communication frameworks [71,72,73,74] User security and privacy frameworks [75,76,77] Other frameworks [78,79] Network traffic in IoT [80,81,82] Device and infrastructure security [83,21,84,85,86,87] Data transport security [88,…”
Section: Application Category Referencementioning
confidence: 99%
“…The methods used in this application provide secure and uncompromised transit of application data through the network and identify malleable attacks such as man-in-the-middle and trojans. Niraja et al [88] propose an adaptive hybrid strategy for near-real-time detection of IoT cyberattacks to improve IoT security. It is based on the integration of deep AE and feature extraction.…”
Section: Security Application For Iot Data Transportmentioning
confidence: 99%
“…With this paradigm, the internet becomes the platform of these communications [5]. Due to the development of Internet of Things (IoT) technology, versatile inventor Nikola Tesla's prediction of realizing a "global brain" comes true with interdisciplinary innovations [6]. These devices control and work as planned heavily depending on effective data communication protocols [7].…”
Section: Related Workmentioning
confidence: 99%
“…One of the biggest problems for IoT devices in terms of security is DDoS attacks. On larger systems, Botnets can be used to carry out such cyber attacks [6].…”
Section: Related Workmentioning
confidence: 99%