2022
DOI: 10.3934/mbe.2022493
|View full text |Cite
|
Sign up to set email alerts
|

Ensemble learning-based IDS for sensors telemetry data in IoT networks

Abstract: <abstract><p>The Internet of Things (IoT) is a paradigm that connects a range of physical smart devices to provide ubiquitous services to individuals and automate their daily tasks. IoT devices collect data from the surrounding environment and communicate with other devices using different communication protocols such as CoAP, MQTT, DDS, etc. Study shows that these protocols are vulnerable to attack and prove a significant threat to IoT telemetry data. Within a network, IoT devices are interdepende… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(16 citation statements)
references
References 68 publications
0
16
0
Order By: Relevance
“…While IDS deals with the network’s behavior in terms of attacks, it is established to learn from this behavior pattern using several techniques. Thus, the system will recognize any violated network traffic that can lead to an attack from this pattern [ 42 , 43 ].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…While IDS deals with the network’s behavior in terms of attacks, it is established to learn from this behavior pattern using several techniques. Thus, the system will recognize any violated network traffic that can lead to an attack from this pattern [ 42 , 43 ].…”
Section: Related Workmentioning
confidence: 99%
“…An IDS is an acronym for an intrusion detection system, which is focused on behavior detection to handle anomalies or attacks [ 42 ]. While IDS deals with the network’s behavior in terms of attacks, it is established to learn from this behavior pattern using several techniques.…”
Section: Background Studiesmentioning
confidence: 99%
“…The tool of choice for learning binary-type algorithms is logistic regression. With a binomial reaction variable, it really goes much further than linear regression [19]. The ability to use explanatory variables continuously and the simplicity of addressing many explanatory variables at once are also advantages.…”
Section: Logistic Regression (Lr)mentioning
confidence: 99%
“…To detect malicious DoH traffic, the system may need to implement specialized tools and techniques, such as deep packet inspection [ 18 , 19 ], behavioral analysis [ 20 , 21 ], or machine learning algorithms [ 13 , 22 ]. Additionally, it is important to stay up-to-date with the latest threats and vulnerabilities related to DoH and to follow best practices for securing your network and endpoints [ 23 ].…”
Section: Introductionmentioning
confidence: 99%
“…Malicious DNS over HTTPS (DoH) is a type of cyberattack that involves using encrypted DNS over HTTPS to bypass traditional network security measures and send DNS queries to a malicious server controlled by an attacker. Machine learning can improve the effectiveness of malicious DoH attacks by creating more sophisticated and evasive attacks [ 20 ].…”
Section: Introductionmentioning
confidence: 99%