Towards intrusion detection in fog environments using generative adversarial network and long short-term memory network DOI

Aiyan Qu,

Qiuhui Shen,

Gholamreza Ahmadi

et al.

Computers & Security, Journal Year: 2024, Volume and Issue: 145, P. 104004 - 104004

Published: July 27, 2024

Language: Английский

Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions DOI Creative Commons
Tamara Zhukabayeva, Lazzat Zholshiyeva, Nurdaulet Karabayev

et al.

Sensors, Journal Year: 2025, Volume and Issue: 25(1), P. 213 - 213

Published: Jan. 2, 2025

This paper provides the complete details of current challenges and solutions in cybersecurity cyber-physical systems (CPS) within context IIoT its integration with edge computing (IIoT–edge computing). We systematically collected analyzed relevant literature from past five years, applying a rigorous methodology to identify key sources. Our study highlights prevalent layer attacks, common intrusion methods, critical threats facing IIoT–edge environments. Additionally, we examine various types cyberattacks targeting CPS, outlining their significant impact on industrial operations. A detailed taxonomy primary security mechanisms for CPS is developed, followed by comparative analysis our approach against existing research. The findings underscore widespread vulnerabilities across architecture, particularly relation DoS, ransomware, malware, MITM attacks. review emphasizes advanced technologies, including machine learning (ML), federated (FL), blockchain, blockchain–ML, deep (DL), encryption, cryptography, IT/OT convergence, digital twins, as essential enhancing real-time data protection computing. Finally, outlines potential future research directions aimed at advancing this rapidly evolving domain.

Language: Английский

Citations

5

A novel deep learning-based intrusion detection system for IoT DDoS security DOI
Selman Hızal, Ünal Çavuşoğlu, Devrim Akgün

et al.

Internet of Things, Journal Year: 2024, Volume and Issue: 28, P. 101336 - 101336

Published: Aug. 29, 2024

Language: Английский

Citations

15

Securing Industry 5.0: An explainable deep learning model for intrusion detection in cyber-physical systems DOI
Himanshu Nandanwar, Rahul Katarya

Computers & Electrical Engineering, Journal Year: 2025, Volume and Issue: 123, P. 110161 - 110161

Published: Feb. 21, 2025

Language: Английский

Citations

2

FP-growth-based signature extraction and unknown variants of DoS/DDoS attack detection on real-time data stream DOI
Arpita Srivastava, Ditipriya Sinha

Journal of Information Security and Applications, Journal Year: 2025, Volume and Issue: 89, P. 103996 - 103996

Published: Feb. 7, 2025

Language: Английский

Citations

1

SPARK and SAD: Leading-Edge Deep Learning Frameworks for Robust and Effective Intrusion Detection in SCADA Systems DOI
Raghuram Bhukya,

Syed Abdul Moeed,

Anusha Medavaka

et al.

International Journal of Critical Infrastructure Protection, Journal Year: 2025, Volume and Issue: unknown, P. 100759 - 100759

Published: March 1, 2025

Language: Английский

Citations

1

Multi-attention DeepCRNN: an efficient and explainable intrusion detection framework for Internet of Medical Things environments DOI

Nikhil Sharma,

Prashant Giridhar Shambharkar

Knowledge and Information Systems, Journal Year: 2025, Volume and Issue: unknown

Published: April 5, 2025

Language: Английский

Citations

1

MULTI-BLOCK: A novel ML-based intrusion detection framework for SDN-enabled IoT networks using new pyramidal structure DOI

Ahmed A. Toony,

Fayez Alqahtani, Yasser M. Alginahi

et al.

Internet of Things, Journal Year: 2024, Volume and Issue: 26, P. 101231 - 101231

Published: May 19, 2024

Language: Английский

Citations

6

Deep learning-empowered intrusion detection framework for the Internet of Medical Things environment DOI
Prashant Giridhar Shambharkar,

Nikhil Sharma

Knowledge and Information Systems, Journal Year: 2024, Volume and Issue: 66(10), P. 6001 - 6050

Published: June 10, 2024

Language: Английский

Citations

5

DDoS Attacks Detection based on Machine Learning Algorithms in IoT Environments DOI Creative Commons
Mehdi Ebady Manaa, Saba Mohammed Hussain,

Suad A. Alasadi

et al.

INTELIGENCIA ARTIFICIAL, Journal Year: 2024, Volume and Issue: 27(74), P. 152 - 165

Published: July 11, 2024

In today’s digital era, most electrical gadgets have become smart, and the great majority of them can connect to internet. The Internet Things (IoT) refers a network comprised interconnected items. Cloud-based IoT infrastructures are vulnerable Distributed Denial Service (DDoS) attacks. Despite fact that these devices may be accessed from anywhere, they assault compromise. DDoS attacks pose significant threat security operational integrity. in which infected botnets networks hit victim’s PC several systems across internet, is one popular. this paper, three prominent datasets: UNSW-NB 15, UNSW-2018 Botnet recent Edge IIoT using an Anomaly-based Intrusion Detection system(AIDS) detect mitigate AIDS employ machine learning methods Deep Learning (DL) for attack mitigation. suggested work employed different types (DL): Random Forest (RF), Support Vector Machine (SVM), Logistic Regression, Multi-layer perceptron (MLP), deep Artificial Neural Network (ANN), Long Term Short Memory (LSTM) identify Both contrasted by database stores trained signatures. As results, RF shows promising performance with 100% accuracy minimum false positive on testing both datasets 15 Botnet. addition, results realistic dataset show good 98.79% LSTM 99.36% time compared other multi-class detection.

Language: Английский

Citations

5

CO-STOP: A Robust P4-Powered Adaptive Framework for Comprehensive Detection and Mitigation of Coordinated and Multi-Faceted Attacks in SD-IoT Networks DOI

Ameer El-Sayed,

Ahmed A. Toony,

Fayez Alqahtani

et al.

Computers & Security, Journal Year: 2025, Volume and Issue: unknown, P. 104349 - 104349

Published: Jan. 1, 2025

Language: Английский

Citations

0