2022 18th International Computer Engineering Conference (ICENCO) 2022
DOI: 10.1109/icenco55801.2022.10032515
|View full text |Cite
|
Sign up to set email alerts
|

DDoS Attack Detection in IoT Using Machine Learning Based Intrusion Detection System (IDS)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…. These atributtes can store [19] each of the related features in IoT and IIoT cyberattack scenarios according to industry functions based on these aspects [53], as opposed to the early detection [11,54] of an IDS when faced with an imminent cyberattack against the infrastructure. The following are the methodologies' paths:…”
Section: Ooda-diamond-ckc and Ttps Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…. These atributtes can store [19] each of the related features in IoT and IIoT cyberattack scenarios according to industry functions based on these aspects [53], as opposed to the early detection [11,54] of an IDS when faced with an imminent cyberattack against the infrastructure. The following are the methodologies' paths:…”
Section: Ooda-diamond-ckc and Ttps Methodologymentioning
confidence: 99%
“…First, the attackers use networks to perform denial of service (DoS) attacks and distributed denial of service (DDoS) attacks as a way to attack network availability. DoS and DDoS attacks [17,53] include ping of death and others, synchronize (SYN) flooding, and Hypertext Transfer Protocol (HTTP). In this case, by obtaining detection information, e.g., APT alert output from different attack detection sensors in APTALCM [26]: timestamp, alert type, Src Ip, Dest_Ip, Src_Port, Dest Port, and Victim_HostIp, they make a vector dimensional A(I(alert)m) = (a1, a2, a3, a4, a5, a6, a7).…”
Section: Ooda-diamond-ckc and Ttps Methodologymentioning
confidence: 99%
“…The study uses a DL approach, like multi-layer perceptron (MLP), for efficient and effective identification of DDoS attacks. Conventional intrusion detection systems (IDS) cannot identify complicated attacks with abnormal patterns [9]. Attackers acquire detected signatures by imitating normal users.…”
Section: Introductionmentioning
confidence: 99%