2022
DOI: 10.1007/s10586-022-03621-3
|View full text |Cite
|
Sign up to set email alerts
|

DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 32 publications
(8 citation statements)
references
References 40 publications
0
8
0
Order By: Relevance
“…Specificity: it is the probability of negative test results, conditioned on the proportion of truly being negative. It is calculated using in (10).…”
Section: Evaluation Parametersmentioning
confidence: 99%
See 1 more Smart Citation
“…Specificity: it is the probability of negative test results, conditioned on the proportion of truly being negative. It is calculated using in (10).…”
Section: Evaluation Parametersmentioning
confidence: 99%
“…It is understood that intrusion detection is crucial for safeguarding any system against malicious activities, and maintaining the system's security so that it may function as intended [9]. IDS is a security tool that tracks the entire network's activity and identifies any malicious activity that is taking place [10]. The most common function of an IDS is to monitor risks and capture intruders before they cause serious damage to the network.…”
Section: Introductionmentioning
confidence: 99%
“…In recent times, deep learning (DL) is becoming a hopeful analytic pattern because of its excellent function in examining huge volumes of data [7]. Dissimilar to the conventional ML method, DL supported effective feature engineering by handling automatic and reliable feature representation and extraction [8,9]. Since a strong analytic device, DL delivered existing latency and accuracy than the conventional ML method, and it is positioned for examining huge amounts of data in the 5G-based Internet of Things (IoT) [10].…”
Section: Introductionmentioning
confidence: 99%
“…DDoS attacks are sophisticated and deleterious cyber threats that are categorized as powerful large-scale distributed attacks. They are becoming bigger and more common for extortion and malicious activities [2]. Hence, there is an essential need to perform security countermeasures against DDoS attacks.…”
Section: Introductionmentioning
confidence: 99%
“…by shuffling network addresses) and aims to invalidate the information gathered during network reconnaissance [3]. The advantages of MTD compared to other security mechanisms are (1) their scalability, (2) almost removing the need threat detection, and (3) frustrating the adversary. Developing a network that can change its configuration and implement MTD methods is challenging.…”
Section: Introductionmentioning
confidence: 99%