2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI) 2018
DOI: 10.1109/iotdi.2018.00036
|View full text |Cite
|
Sign up to set email alerts
|

Poster Abstract: Real-Time DDoS Detection Based on Complex Event Processing for IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(23 citation statements)
references
References 4 publications
0
23
0
Order By: Relevance
“…The IDS studies [5,[19][20][21][22][23][24][25][26][27] also have proposed attack detection based on Raspberry Pi. In the work of [18], the anomaly-based detection method was proposed by capturing the previous traffic patterns asbenign data for attack detection system construction.…”
Section: Raspberry Pi-based Idsmentioning
confidence: 99%
See 1 more Smart Citation
“…The IDS studies [5,[19][20][21][22][23][24][25][26][27] also have proposed attack detection based on Raspberry Pi. In the work of [18], the anomaly-based detection method was proposed by capturing the previous traffic patterns asbenign data for attack detection system construction.…”
Section: Raspberry Pi-based Idsmentioning
confidence: 99%
“…In the work of [18], the anomaly-based detection method was proposed by capturing the previous traffic patterns asbenign data for attack detection system construction. The work of [21] has implemented a real-time DDoS detection architecture using the complex event processing (CEP) algorithm, and it allowed for real-time analysis of continuous data-streams. Some other studies [14,20,23] have used public IDSs, such as Snort and Bro, to implement the detection system on Raspberry Pi.…”
Section: Raspberry Pi-based Idsmentioning
confidence: 99%
“…The authors in [13] proposed a Distributed Denial of Service (DDoS) detection system and evaluated its performance on the Raspberry Pi platform. Their results show that the system detects DDoS attacks in IoT environments, but the scenario they use does not represent a real scenario.…”
Section: Related Workmentioning
confidence: 99%
“…From a carefully analysis of these works, we observe critical issues on them when applied to IoT networks, such as either they are so generic or so specific. For instance, the work [13] presents a solution to the big class of DDoS attacks, resulting in high false positive and false negative rates. Another example is the work [8], where a solution is presented specifically to a WSN medical IoT.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation