2020
DOI: 10.1007/s11277-020-07137-0
|View full text |Cite
|
Sign up to set email alerts
|

SH-IDS: Specification Heuristics Based Intrusion Detection System for IoT Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(13 citation statements)
references
References 27 publications
0
13
0
Order By: Relevance
“…Another blockchain based secure data sharing mechanism was proposed by Veeramakali et al, 17 but here again the overall computational complexity of the system has to be reduced. A Specification based Intrusion Detection was proposed by Jagadeesh Babu et al, 18 which relies on a supervised learning approach to discover various transaction specifications for normal and abnormal behavior. The discovered specifications are then further optimized using the proposed heuristics approach, which results in a system capable of identifying normal and abnormal (malicious) behavior depending on the specifications of the network transactions performed by various IoT devices.…”
Section: Related Workmentioning
confidence: 99%
“…Another blockchain based secure data sharing mechanism was proposed by Veeramakali et al, 17 but here again the overall computational complexity of the system has to be reduced. A Specification based Intrusion Detection was proposed by Jagadeesh Babu et al, 18 which relies on a supervised learning approach to discover various transaction specifications for normal and abnormal behavior. The discovered specifications are then further optimized using the proposed heuristics approach, which results in a system capable of identifying normal and abnormal (malicious) behavior depending on the specifications of the network transactions performed by various IoT devices.…”
Section: Related Workmentioning
confidence: 99%
“…A specification heuristic intrusion detection system for the IoT environment is proposed in [33]. The proposed system is based on discovering a unique n-gram pattern for sequential attributes values.…”
Section: Related Workmentioning
confidence: 99%
“…Whereas, if the movement is much quicker, there is a sudden spurt or drop in the performance, based on the assessed metrics. As a result, the process of authentic decisions on detections, as well as prevention approaches as needed, shall be introduced to the system, which can aid in the overall process improvement [17].…”
Section: Attack Modelmentioning
confidence: 99%
“…Based on the pivot levels drawn for the model, the initial, final, max, and min movement for the respective metric are estimated as per the timeframe considered. If the movement for the metric is within the range of min R to min S , the request load seems to be normal in function, and if there is any significant variations wherein the metric touches max R or max S , then the flow of requests said to be prone to denial of service attack, which tends to alert the administration team for further decisive actions [17].…”
Section: Detection and Defense Modelmentioning
confidence: 99%
See 1 more Smart Citation