2020 International Wireless Communications and Mobile Computing (IWCMC) 2020
DOI: 10.1109/iwcmc48107.2020.9148549
|View full text |Cite
|
Sign up to set email alerts
|

A Study of Network Security Situational Awareness in Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Abdulqadder et al [86] proposed an attack-aware security provisioning approach for DDoS attack mitigation in the context of the SDN/NFV combination with a 5G network. The proposed approach has the following features: (1) an access point (AP), (2) trusted authority (TA), (3) an open virtual switch (OVS), (4) an SDN controller, (5) a user, and (6) virtual network functions (VNF). The proposed approach uses a genetic algorithm to perform the best feature selection for the classifications.…”
Section: Ddos Defense Systems Based On ML Techniques In Nfv Enviromentioning
confidence: 99%
See 1 more Smart Citation
“…Abdulqadder et al [86] proposed an attack-aware security provisioning approach for DDoS attack mitigation in the context of the SDN/NFV combination with a 5G network. The proposed approach has the following features: (1) an access point (AP), (2) trusted authority (TA), (3) an open virtual switch (OVS), (4) an SDN controller, (5) a user, and (6) virtual network functions (VNF). The proposed approach uses a genetic algorithm to perform the best feature selection for the classifications.…”
Section: Ddos Defense Systems Based On ML Techniques In Nfv Enviromentioning
confidence: 99%
“…The attackers use these zombies as an army, remotely instructing them to simultaneously attack the victim, thereby rendering the service unavailable to valid users. A related new concept, namely DDoS as a service (DDoSaaS) [3], reduces the technical challenges associated with implementing an attack through the use of booters or stressers. A DDoSaaS attack utilizes a number of powerful servers to transmit a massive amount of attack traffic to a specific target [4].…”
Section: Introductionmentioning
confidence: 99%
“…In the case of IoT, J. Li et al [27] believed that it is necessary to construct IoT security situational awareness system and enable security defense from the terminal, network, server, or cloud. And L. Hu et al [28] pointed out that there are essential differences between traditional cyberspace and industrial IoT, and there are lots of research results on cyberspace security [29]- [31], while the framework on IoT security and protection is still on the way.…”
Section: Introductionmentioning
confidence: 99%
“…By learning past behavioral patterns, future states of the network can be predicted such as bandwidth utilization patterns to detect anomalies. These functional requirements for situational awareness are critical for identifying incidents and threats, investigating anomalies and making decisions [1][2][3][4]. A flexible platform that can provide a framework for researchers to read and manipulate flow data and augment them with contextual information such as geolocation and known threat labels can improve and streamline analytics development.…”
Section: Introductionmentioning
confidence: 99%