2020 IEEE Conference on Communications and Network Security (CNS) 2020
DOI: 10.1109/cns48642.2020.9162278
|View full text |Cite
|
Sign up to set email alerts
|

Rapid: Robust and Adaptive Detection of Distributed Denial-of-Service Traffic from the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 26 publications
0
8
0
Order By: Relevance
“…IoTrelated Objective [19] Identify DDoS attacks as soon as they are launched from IoT devices that were recruited to a botnet [20] Create an IoT anomaly detection service [29] Create an anomaly detection IoT system for smart cities [30] Review machine learning (ML) and deep learning (DL) based intrusion detection systems (IDSs) used in IoT settings [31] Overcome certain limitations of the Density-Based Spatial Clustering of Applications with Noise (DBSCAN) algorithm [32] Compare several ML algorithms for attack and anomaly detection in IoT systems [33] Create an IDS for low-powered and resource-constrained IoT devices, using unsupervised learning [34] Create a real-time, self-training, easily deployed, anomaly-based DDoS detection system for IoT networks [35] Detect compromised IoT devices without sharing data [36] Improve the effectiveness of traditional ML IDSs on low-frequency attacks in high-dimensional networks [37] Propose a federated-based approach for the detection of botnet attacks, using on-device decentralized traffic data [38] Create an anomaly detector for IoT network communication [39] Create a DL-based botnet attack detector for compromised IoT devices [40] Create a software-defined network (SDN) based security mechanism to detect and mitigate DDoS attacks on IoT networks [41] Detect cyber-attacks based on user behavior [42] Create an anomaly-based DDoS attack detector, using autoencoders (AEs)…”
Section: Refmentioning
confidence: 99%
See 2 more Smart Citations
“…IoTrelated Objective [19] Identify DDoS attacks as soon as they are launched from IoT devices that were recruited to a botnet [20] Create an IoT anomaly detection service [29] Create an anomaly detection IoT system for smart cities [30] Review machine learning (ML) and deep learning (DL) based intrusion detection systems (IDSs) used in IoT settings [31] Overcome certain limitations of the Density-Based Spatial Clustering of Applications with Noise (DBSCAN) algorithm [32] Compare several ML algorithms for attack and anomaly detection in IoT systems [33] Create an IDS for low-powered and resource-constrained IoT devices, using unsupervised learning [34] Create a real-time, self-training, easily deployed, anomaly-based DDoS detection system for IoT networks [35] Detect compromised IoT devices without sharing data [36] Improve the effectiveness of traditional ML IDSs on low-frequency attacks in high-dimensional networks [37] Propose a federated-based approach for the detection of botnet attacks, using on-device decentralized traffic data [38] Create an anomaly detector for IoT network communication [39] Create a DL-based botnet attack detector for compromised IoT devices [40] Create a software-defined network (SDN) based security mechanism to detect and mitigate DDoS attacks on IoT networks [41] Detect cyber-attacks based on user behavior [42] Create an anomaly-based DDoS attack detector, using autoencoders (AEs)…”
Section: Refmentioning
confidence: 99%
“…Collaborative Data [32] Random forest [33] OPTICS (Ordering Points to Identify the Clustering Structure) Collaborative Data [34] ARIMA (Autoregressive Integrated Moving Average), MLP (Multilayer Perceptron), LSTM (Long Short-Term Memory)…”
Section: B Algorithmic Complexity and Flowmentioning
confidence: 99%
See 1 more Smart Citation
“…IoTrelated Objective [19] Identify DDoS attacks as soon as they are launched from IoT devices that were recruited to a botnet [20] Create an IoT anomaly detection service [29] Create an anomaly detection IoT system for smart cities [30] Review machine learning (ML) and deep learning (DL) based intrusion detection systems (IDSs) used in IoT settings [31] Overcome certain limitations of the Density-Based Spatial Clustering of Applications with Noise (DBSCAN) algorithm [32] Compare several ML algorithms for attack and anomaly detection in IoT systems [33] Create an IDS for low-powered and resource-constrained IoT devices, using unsupervised learning [34] Create a real-time, self-training, easily deployed, anomaly-based DDoS detection system for IoT networks [35] Detect compromised IoT devices without sharing data [36] Improve the effectiveness of traditional ML IDSs on low-frequency attacks in high-dimensional networks [37] Propose a federated-based approach for the detection of botnet attacks, using on-device decentralized traffic data [38] Create an anomaly detector for IoT network communication [39] Create a DL-based botnet attack detector for compromised IoT devices [40] Create a software-defined network (SDN) based security mechanism to detect and mitigate DDoS attacks on IoT networks [41] Detect cyber-attacks based on user behavior [42] Create an anomaly-based DDoS attack detector, using autoencoders (AEs)…”
Section: Refmentioning
confidence: 99%
“…Firstly, we implemented a Multilayer Perceptron (MLP), which is a feed-forward Neural Network and consists of an input, hidden, and an output layer. It has frequently been used for network anomaly detection [11,[51][52][53][54]. Autoencoders (A.E.)…”
Section: Deep Learning Classifiers For Sequential Datamentioning
confidence: 99%