2022
DOI: 10.1007/978-981-19-2535-1_60
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Intrusion Detection System in IoT Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…The black hole attack is classified among the most dangerous threats in MANET networks, indeed in this attack, a malicious node redirect all communications to it self in order to drop or to modify them, witch hijack the purpose that the network is deployed for. Hence, the necessity to implement Many researchers are interested by this field of research and several solutions were proposed in the literature to detect and isolate the black holes, for example by examining the sequence number of the replays [16,27,32,38] or by modifying the structure of the AODV control messages [25,39] or by sending a RREQ without destination address [40], since the malicious node responds to all REEQ without checking if the destination address is mentioned in the RREQ or not ... etc. Unfortunately, most of the proposed IDS are, now, inefficient against the new generation of black holes, known also by smart black holes [40].…”
Section: Smart Black Hole Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…The black hole attack is classified among the most dangerous threats in MANET networks, indeed in this attack, a malicious node redirect all communications to it self in order to drop or to modify them, witch hijack the purpose that the network is deployed for. Hence, the necessity to implement Many researchers are interested by this field of research and several solutions were proposed in the literature to detect and isolate the black holes, for example by examining the sequence number of the replays [16,27,32,38] or by modifying the structure of the AODV control messages [25,39] or by sending a RREQ without destination address [40], since the malicious node responds to all REEQ without checking if the destination address is mentioned in the RREQ or not ... etc. Unfortunately, most of the proposed IDS are, now, inefficient against the new generation of black holes, known also by smart black holes [40].…”
Section: Smart Black Hole Attackmentioning
confidence: 99%
“…In black hole attacks, an attacking node re-directs data packets to itself, by announcing itself the node how has the newest and shortest path to the destination, and eavesdrops or discards them, thus, affecting network performances, hence the need to implement Intrusion Detection Systems (IDS) [27].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The incorporation of an IDS into SDN architecture is among the ideal methods to develop a secure SDN environment [20], [21]. In this case, IDS is a system made for the detection and notification of unpermitted attempts at access, adjustments, and/or restrictions of computer system Generally, two categories of IDS are the most commonly used [22], [23]: host IDS (HIDS) and network IDS (NIDS).…”
Section: ) Security Challenges In Sdnmentioning
confidence: 99%
“…Extensive research has been conducted in this field, leading to numerous proposed solutions for the detection and isolation of black hole attacks. These approaches encompass various techniques, such as examining the sequence numbers of RREPs [16,27,33,39], modifying the structure of AODV control messages [25,40], or even sending RREQs without a destination address [41], exploiting the fact that malicious nodes respond to all RREQs without verifying the presence of a destination address. Unfortunately, most of the existing IDS solutions prove ineffective against the new generation of black holes, commonly referred to as smart black holes [28,41].…”
Section: Smart Black Hole Attackmentioning
confidence: 99%