2020
DOI: 10.20944/preprints202011.0508.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

An Efficient Deep Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks

Abstract: With the rapid expansion of intelligent resource-constrained devices and high-speed communication technologies, Internet of Things (IoT) has earned a wide recognition as the primary standard for low-power lossy networks (LLNs). Nevertheless, IoT infrastructures are vulnerable to cyber-attacks due to the constraints in computation, storage, and communication capacity of the endpoint devices. From one side, the majority of newly developed cyber-attacks are formed by slightly mutating formerly established cyber-a… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…DDoS flood packets were sent by taking advantage of a vulnerability in the virtual machine. DDoS assaults and cryptocurrency mining were shown in a botnet built by Bishop Fox at the black hat conference [14] and [20]. UDP/ICMP and HTTPS DDoS assaults were used to infiltrate banking websites [15].…”
Section: Cloud-based Ddos Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…DDoS flood packets were sent by taking advantage of a vulnerability in the virtual machine. DDoS assaults and cryptocurrency mining were shown in a botnet built by Bishop Fox at the black hat conference [14] and [20]. UDP/ICMP and HTTPS DDoS assaults were used to infiltrate banking websites [15].…”
Section: Cloud-based Ddos Attackmentioning
confidence: 99%
“…At the gateway router, the attack packets are discarded with minimal computational overhead. An attack analyzer is part of the networkbased detection [20], which includes the network controller and a profile server. The analyzer determines the most effective defenses, and the network controller implements them.…”
Section: Cloud-based Ddos Solutionsmentioning
confidence: 99%
“…They developed a state-of-the-art method known as correlated-set thresh-holding on the voltage increase (CST-GR), which only employs the attributes mandatory for separate hacks. [33] Created an IoT-based intrusion detection and classification platform using deep learning as well as a neural network model (IoT-IDCS-CNN). Feature extraction, segmentation techniques, and system identification compose the methods.…”
Section: Ids For Smart Homes Precision Fmeasure Recallmentioning
confidence: 99%