Robust detection of unknown DoS/DDoS attacks in IoT networks using a hybrid learning model
Tài liệu tham khảo
Zeeshan, 2021, Protocol-based deep intrusion detection for DoS and DDoS attacks using UNSW-NB15 and bot-IoT data-sets, IEEE Access, 10, 2269, 10.1109/ACCESS.2021.3137201
Al-Qaseemi, 2016, IoT architecture challenges and issues: Lack of standardization, 731
Nguyen, 2019, Search: A collaborative and intelligent nids architecture for sdn-based cloud iot networks, IEEE Access, 7, 107678, 10.1109/ACCESS.2019.2932438
Thakkar, 2021, A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges, Arch. Comput. Methods Eng., 28, 3211, 10.1007/s11831-020-09496-0
Benkhelifa, 2018, A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems, IEEE Commun. Surv. Tutor., 20, 3496, 10.1109/COMST.2018.2844742
Thakkar, 2020, A review of the advancement in intrusion detection datasets, Procedia Comput. Sci., 167, 636, 10.1016/j.procs.2020.03.330
Gopalan, 2021, Balancing approaches towards ML for IDS: a survey for the CSE-CIC IDS dataset, 1
Nguyen, 2022, Realguard: A lightweight network intrusion detection system for IoT gateways, Sensors, 22, 432, 10.3390/s22020432
Singh Samom, 2021, Distributed denial of service (DDoS) attacks detection: A machine learning approach, 75
Jia, 2020, Flowguard: an intelligent edge defense mechanism against IoT DDoS attacks, IEEE Internet Things J., 7, 9552, 10.1109/JIOT.2020.2993782
Binbusayyis, 2021, Unsupervised deep learning approach for network intrusion detection combining convolutional autoencoder and one-class SVM, Appl. Intell., 51, 7094, 10.1007/s10489-021-02205-9
Alvarez, 2022
Zhang, 2020, Unknown attack detection based on zero-shot learning, IEEE Access, 8, 193981, 10.1109/ACCESS.2020.3033494
Zoppi, 2023, Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection, Comput. Secur., 10.1016/j.cose.2023.103107
Apruzzese, 2022, Modeling realistic adversarial attacks against network intrusion detection systems, Digital Threats Res. Pract. (DTRAP), 3, 1, 10.1145/3469659
Huang, 2018, Adversarial attacks on SDN-based deep learning IDS system, 181
Qiu, 2020, Adversarial attacks against network intrusion detection in iot systems, IEEE Internet Things J., 8, 10327, 10.1109/JIOT.2020.3048038
Wei, 2021, Ae-mlp: A hybrid deep learning approach for DDoS detection and classification, IEEE Access, 9, 146810, 10.1109/ACCESS.2021.3123791
Alamri, 2020, Bandwidth control mechanism and extreme gradient boosting algorithm for protecting software-defined networks against DDoS attacks, IEEE Access, 8, 194269, 10.1109/ACCESS.2020.3033942
Cil, 2021, Detection of DDoS attacks with feed forward based deep neural network model, Expert Syst. Appl., 169, 10.1016/j.eswa.2020.114520
Yu, 2020, An intrusion detection method using few-shot learning, IEEE Access, 8, 49730, 10.1109/ACCESS.2020.2980136
Chen, 2021, Multi-scale self-organizing map assisted deep autoencoding Gaussian mixture model for unsupervised intrusion detection, Knowl.-Based Syst., 224, 10.1016/j.knosys.2021.107086
Pontes, 2021, A new method for flow-based network intrusion detection using the inverse potts model, IEEE Trans. Netw. Serv. Manag., 18, 1125, 10.1109/TNSM.2021.3075503
Can, 2021, Detection of distributed denial of service attacks using automatic feature selection with enhancement for imbalance dataset, 386
Hindy, 2022, Leveraging siamese networks for one-shot intrusion detection model, J. Intell. Inf. Syst., 1
Xu, 2020, A method of few-shot network intrusion detection based on meta-learning framework, IEEE Trans. Inf. Forensics Secur., 15, 3540, 10.1109/TIFS.2020.2991876
Soltani, 2021
Shwartz-Ziv, 2022, Tabular data: Deep learning is not all you need, Inf. Fusion, 81, 84, 10.1016/j.inffus.2021.11.011
Nisioti, 2018, From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods, IEEE Commun. Surv. Tutor., 20, 3369, 10.1109/COMST.2018.2854724
Thakkar, 2021, A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions, Artif. Intell. Rev., 1
Lansky, 2021, Deep learning-based intrusion detection systems: a systematic review, IEEE Access, 9, 101574, 10.1109/ACCESS.2021.3097247
Laghari, 2021, A review and state of art of Internet of Things (IoT), Arch. Comput. Methods Eng., 1
Nazir, 2021, Survey on wireless network security, Arch. Comput. Methods Eng., 1
A.A. Khan, A.A. Laghari, A.A. Shaikh, Z.A. Shaikh, A.K. Jumani, Innovation in Multimedia Using IoT Systems, Multimed. Comput. Syst. Virtual Real. 171–187.
Huang, 2021, A generative adversarial network model based on intelligent data analytics for music emotion recognition under IoT, Mob. Inf. Syst., 2021, 1
Laghari, 2023, Lightweight-BIoV: blockchain distributed ledger technology (BDLT) for internet of vehicles (IoVs), Electronics, 12, 677, 10.3390/electronics12030677
Waqas, 2022, Botnet attack detection in Internet of Things devices over cloud environment via machine learning, Concurr. Comput.: Pract. Exper., 34, 10.1002/cpe.6662
Mummadi, 2022, An appraisal of cyber-attacks and countermeasures using machine learning algorithms, 27
Selvarajan, 2023, An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems, J. Cloud Comput., 12, 38, 10.1186/s13677-023-00412-y
Aluvalu, 2023, Efficient data transmission on wireless communication through a privacy-enhanced blockchain process, PeerJ Comput. Sci., 9, 10.7717/peerj-cs.1308
Selvarajan, 2023, A quantum trust and consultative transaction-based blockchain cybersecurity model for healthcare systems, Sci. Rep., 13, 7107, 10.1038/s41598-023-34354-x
Ahmad, 2022, A deep learning ensemble approach to detecting unknown network attacks, J. Inform. Secur. Appl., 67
Yang, 2021
P. Perera, V.M. Patel, Deep transfer learning for multiple class novelty detection, in: Proceedings of the Ieee/Cvf Conference on Computer Vision and Pattern Recognition, 2019, pp. 11544–11552.
Pimentel, 2014, A review of novelty detection, Signal Process., 99, 215, 10.1016/j.sigpro.2013.12.026
Sanders, 2017
Merino, 2013
Lashkari, 2017
M.M. Breunig, H.-P. Kriegel, R.T. Ng, J. Sander, LOF: identifying density-based local outliers, in: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, 2000, pp. 93–104.
Bezerra, 2019, IoTDS: A one-class classification approach to detect botnets in internet of things devices, Sensors, 19, 3188, 10.3390/s19143188
Eskandari, 2020, Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices, IEEE Internet Things J., 7, 6882, 10.1109/JIOT.2020.2970501
Ring, 2019, A survey of network-based intrusion detection data sets, Comput. Secur., 86, 147, 10.1016/j.cose.2019.06.005
openargus, 2023
Papernot, 2018
Nimbalkar, 2021, Feature selection for intrusion detection system in internet-of-things (IoT), ICT Express, 7, 177, 10.1016/j.icte.2021.04.012
Shareena, 2021, Intrusion detection system for iot botnet attacks using deep learning, SN Comput. Sci., 2, 205, 10.1007/s42979-021-00516-9
Khanday, 2023, Implementation of intrusion detection model for DDoS attacks in lightweight IoT networks, Expert Syst. Appl., 215, 10.1016/j.eswa.2022.119330
Krishnan, 2019, VARMAN: Multi-plane security framework for software defined networks, Comput. Commun., 148, 215, 10.1016/j.comcom.2019.09.014
Haider, 2020, A deep CNN ensemble framework for efficient DDoS attack detection in software defined networks, Ieee Access, 8, 53972, 10.1109/ACCESS.2020.2976908
Kim, 2020, CNN-based network intrusion detection against denial-of-service attacks, Electronics, 9, 916, 10.3390/electronics9060916
Doriguzzi-Corin, 2020, LUCID: A practical, lightweight deep learning solution for DDoS attack detection, IEEE Trans. Netw. Serv. Manag., 17, 876, 10.1109/TNSM.2020.2971776
Nguyen, 2022, Preventing adversarial attacks against deep learning-based intrusion detection system, 382
Goodfellow, 2014
Carlini, 2017, Towards evaluating the robustness of neural networks, 39
