2023
DOI: 10.1109/jiot.2023.3234530
|View full text |Cite
|
Sign up to set email alerts
|

OPTIMIST: Lightweight and Transparent IDS With Optimum Placement Strategy to Mitigate Mixed-Rate DDoS Attacks in IoT Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 17 publications
(14 citation statements)
references
References 38 publications
0
14
0
Order By: Relevance
“…The results show that ML-based black-box attack detectors are incapable of classifying adversarial data. P. Bhale et al 15 suggested that WGAN be used to make ADAs so that an ML model can be trained efficiently. The outcomes show that the proposed approach is energy-efficient and suitable for the IoT ecosystem.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The results show that ML-based black-box attack detectors are incapable of classifying adversarial data. P. Bhale et al 15 suggested that WGAN be used to make ADAs so that an ML model can be trained efficiently. The outcomes show that the proposed approach is energy-efficient and suitable for the IoT ecosystem.…”
Section: Related Workmentioning
confidence: 99%
“…The size command and powertrac tools extract MU and EU from Contiki Cooja simulations. 15 The FIT IoT-LAB testbed 15 uses Sysstat to get system-level data like EU and MU.…”
Section: Ta B L Ementioning
confidence: 99%
“…IDS can be placed at the host side called host-based IDS and IDS placed at the network side is NIDS many researchers have come up with an idea of optimal IDS placement as proposed. 2 To safeguard IoT networks Intrusion Detection Systems (NIDS) play an important role by continuously monitoring the network traffic and reducing the security risk. Attacks are classified into binary and multiclass, in binary class classification is done as an anomaly or normal whereas, in multiclass classification, attack instances may be classified into four types based on the nature of the attack: User-to-Root (U2R) attacks, Remote-to-Local (R2L) attacks, Denial-of-Service (DoS) attacks, and Probes.…”
Section: Introductionmentioning
confidence: 99%
“…So effective detection and securing the network from attacks has become a difficult and increasingly significant area of research. IDS can be placed at the host side called host‐based IDS and IDS placed at the network side is NIDS many researchers have come up with an idea of optimal IDS placement as proposed 2 . To safeguard IoT networks Intrusion Detection Systems (NIDS) play an important role by continuously monitoring the network traffic and reducing the security risk.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, the present work addresses the version number attack (VNA), where the malicious behavior appears when an intruder tries to falsify the present version number to generate an extra control overhead aiming to exhausting the network resources and thereby to shorten its lifetime [24]. Various recent researches have focused on proposing solutions against this critical threat; however they are mainly based on artificial intelligence algorithms exploiting cloud platforms [25][26][27][28], since the edge part is composed by constrained devices with limited resources in terms of computation, storage, and energy. This makes complex algorithms heavy to be supported by IoT devices [29].…”
mentioning
confidence: 99%