2018
DOI: 10.1109/mc.2018.3011046
|View full text |Cite
|
Sign up to set email alerts
|

IoT as a Land of Opportunity for DDoS Hackers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
43
0
2

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 92 publications
(45 citation statements)
references
References 4 publications
0
43
0
2
Order By: Relevance
“…e Smart Detection system has reached high accuracy and low false-positive rate. Experiments were conducted using two Virtual Linux boxes, Define all the descriptor database variables as the current variables; (5) while True do (6) Split dataset in training and test partitions; (7) Create and train the model using training data partition; (8) Select the most important variables from the trained model; (9) Calculate the cumulative importance of variables from the trained model; (10) if max (cumulative importance of variables) < Variable importance threshold then (11) Exit loop; (12) end (13) Train the model using only the most important variables; (14) Test the trained model and calculate the accuracy; (15) if Calculated accuracy < Accuracy threshold then (16) Exit loop; (17) end (18) Add current model to optimized model set; (19) Define the most important variables from the trained model as the current variables; (20) end (21) end (22) Group the models by number of variables; (23) Remove outliers from the grouped model set; (24) Select the group of models with the highest frequency and their number of variables "N"; (25) Rank the variables by the mean of the importance calculated in step 7; (26) Return the "N" most important variables; [2004][2005] have been used by the researchers to evaluate the performance of their proposed intrusion detection and prevention approaches. However, many such datasets are out of date and unreliable to use [25].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…e Smart Detection system has reached high accuracy and low false-positive rate. Experiments were conducted using two Virtual Linux boxes, Define all the descriptor database variables as the current variables; (5) while True do (6) Split dataset in training and test partitions; (7) Create and train the model using training data partition; (8) Select the most important variables from the trained model; (9) Calculate the cumulative importance of variables from the trained model; (10) if max (cumulative importance of variables) < Variable importance threshold then (11) Exit loop; (12) end (13) Train the model using only the most important variables; (14) Test the trained model and calculate the accuracy; (15) if Calculated accuracy < Accuracy threshold then (16) Exit loop; (17) end (18) Add current model to optimized model set; (19) Define the most important variables from the trained model as the current variables; (20) end (21) end (22) Group the models by number of variables; (23) Remove outliers from the grouped model set; (24) Select the group of models with the highest frequency and their number of variables "N"; (25) Rank the variables by the mean of the importance calculated in step 7; (26) Return the "N" most important variables; [2004][2005] have been used by the researchers to evaluate the performance of their proposed intrusion detection and prevention approaches. However, many such datasets are out of date and unreliable to use [25].…”
Section: Resultsmentioning
confidence: 99%
“…As a consequence, legitimate tra c is also obstructed [6]. On the other hand, the attackers are using more advanced techniques to potentiate attacks and ood the victim such as DDoS-for-hire, IoT-based DDoS attacks, and reflection DDoS attacks [7][8][9], profiting from the computational capability and geographical distribution promoted by the wide variety of devices and its diverse mobility patterns, typically founded in IoT and mobile IoT scenarios.…”
Section: Introductionmentioning
confidence: 99%
“…For example, vulnerable webcams, routing devices and firewalls were analyzed by Albataineh et al [64] after detecting them with Shodan. Web cameras were also studied by Bugeja et al [65], who found that a significant number of them were weakly protected or not protected at all, which may allow attackers to use them for cyberattacks [66].…”
Section: Iiot and Industry 40 Cybersecurity Toolsmentioning
confidence: 99%
“…Another significant problem in IoT security is the common threat of Distributed Denial-of-Services [5]. As the IoT nodes are connected via cloud services; therefore, it is eventual that the adversarial affecting cloud ecosystem could also easily affect the devices networks without much effort.…”
Section: Introductionmentioning
confidence: 99%