2018
DOI: 10.1007/978-3-030-04771-9_11
|View full text |Cite
|
Sign up to set email alerts
|

Generating Synthetic Data for Real World Detection of DoS Attacks in the IoT

Abstract: Denial of service attacks are especially pertinent to the internet of things as devices have less computing power, memory and security mechanisms to defend against them. The task of mitigating these attacks must therefore be redirected from the device onto a network monitor. Network intrusion detection systems can be used as an effective and efficient technique in internet of things systems to offload computation from the devices and detect denial of service attacks before they can cause harm. However the solu… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(14 citation statements)
references
References 17 publications
(22 reference statements)
0
14
0
Order By: Relevance
“…For modeling attacks, Arnaboldi et al [29] proposed an IoT system model for generating a synthetic denial of service (DoS). Erlacher et al [30] proposed an automated system for generating attack traffic for network intrusion detection systems.…”
Section: Anomaly Detectionmentioning
confidence: 99%
“…For modeling attacks, Arnaboldi et al [29] proposed an IoT system model for generating a synthetic denial of service (DoS). Erlacher et al [30] proposed an automated system for generating attack traffic for network intrusion detection systems.…”
Section: Anomaly Detectionmentioning
confidence: 99%
“…This increased vulnerability is due in part to the low computational power and battery power characteristic of IoT devices. This has lead to a raise in popularity of battery drain denial of service attacks [4,5], these attacks target a device to perform power drain intensive operation to drain the battery. If they are successful it requires human intervention to change the battery something that is to be avoided in large unsupervised systems.…”
Section: Host Intrusion Detection For Iotmentioning
confidence: 99%
“…This is an additional feature of interest that traditional IDS techniques do not consider. However, as devices often do not have the ability to self monitor their battery drain [5],…”
Section: Host Intrusion Detection For Iotmentioning
confidence: 99%
See 1 more Smart Citation
“…Other methods are based on re-sampling data samples and then taking a majority vote of the resulting weak learners [27]. Several other approaches [28,29] aimed to collect datasets to improve the accuracy of IDS.…”
Section: Machine Learning For Intrusion Detectionmentioning
confidence: 99%