2022
DOI: 10.1109/jiot.2022.3163776
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Cache Consistency Management for Transient IoT Data in Content-Centric Networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(10 citation statements)
references
References 26 publications
0
7
0
Order By: Relevance
“…At present, the existing detection methods for DDoS attacks are mainly based on ML or DL. Build an intrusion detection classifier by selecting an appropriate ML or DL model [ 14 , 15 , 16 , 17 ] and analyze the difference in features between normal flow data and abnormal flow of the network, so as to judge the type of attack. Jing et al [ 18 ] investigated the existing DDoS-related data and detection methods of DDoS and worm attacks, divided the datasets into packet level datasets and flow level datasets, and introduced the detection technologies from application layer DDoS, network layer DDoS, LDDoS and botnet DDoS.…”
Section: Related Workmentioning
confidence: 99%
“…At present, the existing detection methods for DDoS attacks are mainly based on ML or DL. Build an intrusion detection classifier by selecting an appropriate ML or DL model [ 14 , 15 , 16 , 17 ] and analyze the difference in features between normal flow data and abnormal flow of the network, so as to judge the type of attack. Jing et al [ 18 ] investigated the existing DDoS-related data and detection methods of DDoS and worm attacks, divided the datasets into packet level datasets and flow level datasets, and introduced the detection technologies from application layer DDoS, network layer DDoS, LDDoS and botnet DDoS.…”
Section: Related Workmentioning
confidence: 99%
“…Anomaly detection has been widely used in various fields, including cyber security [ 13 , 14 ], communications security [ 15 , 16 , 17 ], IoT [ 18 , 19 , 20 ], video surveillance [ 21 , 22 ], etc. In general, anomaly detection refers to finding special instances that differ from given normal instances.…”
Section: Introductionmentioning
confidence: 99%
“…Under these circumstances, it is more appropriate to view the surface defect detection problem as a semi-supervised anomaly detection problem. Anomaly detection has been widely used in various fields, including cyber security [13,14], communications security [15][16][17], IoT [18][19][20], video surveillance [21,22], etc. In general, anomaly detection refers to finding special instances that differ from given normal instances.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, many traditional packetdropping attack detection algorithms have been proposed, but they are not suitable for the emerging resource-constrained IoT networks. For instance, traditional machine learning (ML)-based detection algorithms [6][7][8][9] identify malicious nodes by training detection models. e performance of the detection models depends on the size of the training dataset.…”
Section: Introductionmentioning
confidence: 99%