2020
DOI: 10.1109/access.2020.2976624
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of Network Anomalies Mitigation Schemes in IoT Networks

Abstract: The Internet of Things (IoT) is on the rise and it is giving a new shape to several fields such as smart cities, smart homes, smart health, etc. as it facilitates the connection of physical objects to the internet. However, this advancement comes along with new challenges in terms of security of the devices in the IoT networks. Some of these challenges come as network anomalies. Hence, this has prompted the use of network anomaly mitigation schemes as an integral part of the defense mechanisms of IoT networks … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(20 citation statements)
references
References 60 publications
0
20
0
Order By: Relevance
“…Furthermore, data integration and correlation are other important challenges from the NSM perspective [8,153]. Recently, some authors have pointed the need of designing and implementing high-level SIEMs and effective IDSs that can be adapted to IoT protocols [137,152,[154][155][156]. Most of research papers in recent years have been focused in the proposal of new IDSs and/or enhancing the detection methods [133,135,[137][138][139]157].…”
Section: Iot and Iiotmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, data integration and correlation are other important challenges from the NSM perspective [8,153]. Recently, some authors have pointed the need of designing and implementing high-level SIEMs and effective IDSs that can be adapted to IoT protocols [137,152,[154][155][156]. Most of research papers in recent years have been focused in the proposal of new IDSs and/or enhancing the detection methods [133,135,[137][138][139]157].…”
Section: Iot and Iiotmentioning
confidence: 99%
“…Additionally, some authors take explicitly into account the constraints in IoT resources in their IDS proposal [137]. Other authors highlight the necessity of anomaly detection and mitigation in IoT networks [156,158], as well as the lack of IoT datasets for training and testing detection algorithms [13,141].…”
Section: Iot and Iiotmentioning
confidence: 99%
“…The anomaly-based IDS can detect unknown attacks, even though it can be suitable for IoT. It suffers from false alarms when normal traffic is classified as abnormal traffic [26]. Consequently, the fog computing paradigm can be employed in the IoT to effectively host anomaly mitigation frameworks.…”
Section: Intrusion Detection System (Ids)mentioning
confidence: 99%
“…The anomaly-based IDS can detect unknown attacks, even though it can be suitable for IoT. It suffers from false alarms when normal traffic is classified as abnormal traffic [26].…”
Section: Intrusion Detection System (Ids)mentioning
confidence: 99%
“…These facts make it difficult to deploy robust security mechanisms and allow attackers to disable or compromise IoT devices, and often to disable or compromise the entire environment using these IoT devices. The main principles of security, which are confidentiality, integrity, and availability (CIA), are also important when implementing IoT devices [ 1 ]. IoT manufacturers place little emphasis on the safety of IoT devices due to financial savings.…”
Section: Introductionmentioning
confidence: 99%