2019 15th International Wireless Communications &Amp; Mobile Computing Conference (IWCMC) 2019
DOI: 10.1109/iwcmc.2019.8766574
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical anomaly based intrusion detection and localization in IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 32 publications
(18 citation statements)
references
References 11 publications
0
18
0
Order By: Relevance
“…Although the proposed system was proven to be reliable ensuring a high detection rate and low energy consumption, it focuses only on WSN and does not consider IoT challenges as security attacks where the gateway is connected to cloud servers, and IP protocol is used. In our recent work [54], an anomaly detection system that considers both WSN and IoT anomalies detection using machine learning components depending on nodes capabilities is proposed. However, similar to the other cited works, ADS is used for reliability but the reliability of ADS itself is not addressed.…”
Section: B Anomaly and Event Detection Systems In Iotmentioning
confidence: 99%
See 2 more Smart Citations
“…Although the proposed system was proven to be reliable ensuring a high detection rate and low energy consumption, it focuses only on WSN and does not consider IoT challenges as security attacks where the gateway is connected to cloud servers, and IP protocol is used. In our recent work [54], an anomaly detection system that considers both WSN and IoT anomalies detection using machine learning components depending on nodes capabilities is proposed. However, similar to the other cited works, ADS is used for reliability but the reliability of ADS itself is not addressed.…”
Section: B Anomaly and Event Detection Systems In Iotmentioning
confidence: 99%
“…5 (c), ADS relies on three main components: (1) Rule Based Anomaly Detector (RB-AD): this component has pre-defined rules for detecting communication anomalies (CA) like hello flooding attacks, selective forwarding attacks (SFA) and blackhole attacks (BHA) as used by [31], (2) Machine Learning Anomaly Detector Component (ML-AD): this component detects anomalies and attacks using machine learning techniques e.g. One Class Support Vector Machines (OCSVM) for WSN anomalies, Deep Learning for IoT anomalies as described in [54]. The choice of OCSVM and Deep Learning was motivated by lessons learned from comparative studies and works related to this field.…”
Section: A Cascaded Detection Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…With the development in deep learning techniques, Ezeme et al introduced a hierarchical attention-based anomaly detection (HAbAD) model based on stacked Long Short-Term Memory (LSTM) Networks with Attention [9]. Yahyaoui et al proposed a detection protocol that dynamically executes the on-demand Support Vector Machine (SVM) classifier in a hierarchical way whenever an intrusion is suspected [10]. Nguyen et al proposed an autonomous self-learning distributed system, DIoT, to detect compromised IoT devices, which uses a novel self-learning approach to detect compromised devices [11].…”
Section: Related Workmentioning
confidence: 99%
“…Also, this may lead to extra delay for sending data which depends on bandwidth and processing capability offered. In the particular case of smart hospital infrastructure, resources are available in contradiction with hostile environments surveillance [ 11 ] where other solutions are required especially for energy optimization.…”
Section: Introductionmentioning
confidence: 99%