2019
DOI: 10.1109/jiot.2018.2883344
|View full text |Cite
|
Sign up to set email alerts
|

AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks

Abstract: Software Defined Internet of Things (SD-IoT) Networks profits from centralized management and interactive resource sharing which enhances the efficiency and scalability of IoT applications. But with the rapid growth in services and applications, it is vulnerable to possible attacks and faces severe security challenges. Intrusion detection has been widely used to ensure network security, but classical detection means are usually signature-based or explicit-behavior-based and fail to detect unknown attacks intel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
71
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 189 publications
(71 citation statements)
references
References 29 publications
0
71
0
Order By: Relevance
“…Therefore, artificial intelligence and its breeds are employed in intrusion detection system (IDS). Li et al [126] proposed an Artificial Intelligence-(AI) based mechanism for intrusion detection in SDN-driven IoT. This scheme is based on network traffic flow where the intrusion detection component of the network captures the flow and applies two algorithms for features extraction, i.e.…”
Section: Anomaly/intrusion Detectionmentioning
confidence: 99%
“…Therefore, artificial intelligence and its breeds are employed in intrusion detection system (IDS). Li et al [126] proposed an Artificial Intelligence-(AI) based mechanism for intrusion detection in SDN-driven IoT. This scheme is based on network traffic flow where the intrusion detection component of the network captures the flow and applies two algorithms for features extraction, i.e.…”
Section: Anomaly/intrusion Detectionmentioning
confidence: 99%
“…The MDP is characterized by <S,A,r>, where S is the state space, A is the action space, and r is the immediate reward of the detection system. For evaluating the anomaly detection performance of an action (feature set and AI/ML algorithm), we consider common metrics [14] including precision (P r ), recall (R e ), F-score (F s ), accuracy (A c ), and false alarm rate (F a ). These metrics are calculated from the following observations: TP (True Positive) -number of attacks precisely detected; TN (True Negative) -number of normal patterns precisely classified; FP (False Positive) -number of normal patterns incorrectly classified; and FN (False Negative) -number of attacks unsuccessfully detected.…”
Section: Basic Architecturementioning
confidence: 99%
“….., f m } denotes a group of feasible feature sets composed of all available and suited features, e.g., a feature set f m consists of 4 features (average packets per flow, average packet size per flow, packet change ratio and flow change ratio). L = {l 1 , l 2 , ..., l n } represents a set of possible AI/ML algorithms that can be used for traffic flow classification, e.g., Support Vector Machine [12], Random Forest [14], and Self Organizing Map [15]. Then, a tuple, < f m , l n >, is referred as a combination of a feature set and an AI/ML algorithm.…”
Section: Basic Architecturementioning
confidence: 99%
See 2 more Smart Citations