Tikrit Journal of Pure Science,
Год журнала:
2024,
Номер
29(3), С. 63 - 74
Опубликована: Июнь 25, 2024
Intrusion
Detection
Systems
(IDS)
are
essential
for
identifying
and
mitigating
security
threats
in
Internet
of
Things
(IoT)
networks.
This
paper
explores
the
unique
challenges
IoT
environments
presents
machine
learning
(ML)
algorithms
as
powerful
solutions
IoT-IDS,
encompassing
supervised,
unsupervised,
semi-supervised
learning.
Notable
algorithms,
including
decision
trees,
random
forests,
support
vector
machines,
deep
architectures,
discussed.
Emphasis
is
placed
on
critical
role
feature
selection
developing
efficient
IDS,
addressing
such
heterogeneity,
limited
resources,
real-time
detection,
privacy
concerns,
adversarial
attacks.
Future
research
directions
include
advanced
ML
data,
integration
anomaly
exploration
federated
learning,
combining
with
other
cybersecurity
techniques.
The
advocates
benchmark
datasets
evaluation
frameworks
to
standardize
assessment
ML-based
IoT-IDS
approaches,
ultimately
contributing
heightened
integrity
systems..
Sensors,
Год журнала:
2023,
Номер
23(5), С. 2415 - 2415
Опубликована: Фев. 22, 2023
Industrial
control
systems
(ICSs),
supervisory
and
data
acquisition
(SCADA)
systems,
distributed
(DCSs)
are
fundamental
components
of
critical
infrastructure
(CI).
CI
supports
the
operation
transportation
health
electric
thermal
plants,
water
treatment
facilities,
among
others.
These
infrastructures
not
insulated
anymore,
their
connection
to
fourth
industrial
revolution
technologies
has
expanded
attack
surface.
Thus,
protection
become
a
priority
for
national
security.
Cyber-attacks
have
more
sophisticated
criminals
able
surpass
conventional
security
systems;
therefore,
detection
challenging
area.
Defensive
such
as
intrusion
(IDSs)
part
protect
CI.
IDSs
incorporated
machine
learning
(ML)
techniques
that
can
deal
with
broader
kinds
threats.
Nevertheless,
zero-day
attacks
having
technological
resources
implement
purposed
solutions
in
real
world
concerns
operators.
This
survey
aims
provide
compilation
state
art
used
ML
algorithms
It
also
analyzes
dataset
train
models.
Finally,
it
presents
some
most
relevant
pieces
research
on
these
topics
been
developed
last
five
years.
IEEE Access,
Год журнала:
2023,
Номер
11, С. 9136 - 9148
Опубликована: Янв. 1, 2023
Computer
viruses,
malicious,
and
other
hostile
attacks
can
affect
a
computer
network.
Intrusion
detection
is
key
component
of
network
security
as
an
active
defence
technology.
Traditional
intrusion
systems
struggle
with
issues
like
poor
accuracy,
ineffective
detection,
high
percentage
false
positives,
inability
to
handle
new
types
intrusions.
To
address
these
issues,
we
propose
deep
learning-based
novel
method
detect
cybersecurity
vulnerabilities
breaches
in
cyber-physical
systems.
The
proposed
framework
contrasts
the
unsupervised
discriminative
approaches.
This
paper
presents
generative
adversarial
cyber
threats
IoT-driven
IICs
networks.
results
demonstrate
performance
increase
approximately
95%
97%
terms
reliability,
efficiency
detecting
all
dropout
value
0.2
epoch
25.
output
well-known
state-of-the-art
DL
classifiers
achieved
highest
true
rate
(TNR)
(HDR)
when
following
attacks:
(BruteForceXXS,
BruteForceWEB,
DoS_Hulk_Attack,
DOS_LOIC_HTTP_Attack)
on
NSL-KDD,
KDDCup99,
UNSW-NB15
datasets.
It
also
maintained
confidentiality
integrity
users'
systems'
sensitive
information
during
training
testing
phases.
Systems Science & Control Engineering,
Год журнала:
2024,
Номер
12(1)
Опубликована: Март 2, 2024
Internet
of
Things
(IoT)
technology
has
evolved
significantly,
transitioning
from
personal
devices
to
powering
smart
cities
and
global
deployments
across
diverse
industries.
However,
security
challenges
arise
due
using
various
protocols
having
limited
computational
capabilities,
leading
vulnerabilities
potential
intrusions
in
IoT
networks.
This
paper
addresses
the
challenge
intrusion
detection
by
introducing
a
heterogeneous
machine
learning-based
stack
classifier
model
for
data.
The
employs
feature
selection
ensemble
modelling
investigate
enhance
key
classification
metrics
approach
comprises
two
core
components:
utilization
K-Best
algorithm
selection,
extracting
top
15
critical
features
construction
an
incorporating
traditional
learning
models.
integration
these
components
harnesses
information
selected
leverages
collective
strength
individual
models
performance.
Using
'Ton
dataset,'
our
experiments
compare
with
ones.
research
aims
improve
detection,
focusing
on
accuracy,
precision,
recall
F1
score.
Through
rigorous
experimentation
comparisons,
proposed
showcases
exceptional
performance,
providing
robust
solution
fortify
network
security.
Computers & Security,
Год журнала:
2024,
Номер
146, С. 104034 - 104034
Опубликована: Авг. 5, 2024
The
Internet
of
Things
(IoT)
devices
have
been
integrated
into
almost
all
everyday
applications
human
life
such
as
healthcare,
transportation
and
agriculture.
This
widespread
adoption
IoT
has
opened
a
large
threat
landscape
to
computer
networks,
leaving
security
gaps
in
IoT-enabled
networks.
These
resource-constrained
lack
sufficient
mechanisms
become
the
weakest
link
our
networks
jeopardize
systems
data.
To
address
this
issue,
Intrusion
Detection
Systems
(IDS)
proposed
one
many
tools
mitigate
related
intrusions.
While
IDS
proven
be
crucial
for
detection,
their
dependence
on
labeled
data
high
computational
costs
obstacles
real
adoption.
In
work,
we
present
IoT-PRIDS,
new
framework
equipped
with
host-based
anomaly-based
intrusion
detection
system
that
leverages
"packet
representations"
understand
typical
behavior
devices,
focusing
communications,
services,
packet
header
values.
It
is
lightweight
non-ML
model
relies
solely
benign
network
traffic
offers
practical
way
securing
environments.
Our
results
show
can
detect
majority
abnormal
flows
while
keeping
false
alarms
at
minimum
promising
used
real-world
applications.
IEEE Internet of Things Journal,
Год журнала:
2023,
Номер
10(24), С. 21143 - 21153
Опубликована: Март 7, 2023
With
the
development
of
blockchain,
artificial
intelligence,
and
data
mining
technology,
abnormal
network
traffic
has
become
easy
to
obtain.
The
detection
model
detects
patterns
in
find
that
does
not
conform
normal
law,
which
great
security
significance
for
Industrial
Internet
Things
(IIoT)
networks
devices
real
scenarios.
However,
previous
models
rely
on
expert
experience
cannot
cope
with
real-time
changes
IIoT
manual
features
be
sufficiently
representative
adaptive.
Moreover,
there
are
few
scenarios,
makes
unable
fully
learn
potential
distribution
data.
Therefore,
this
work,
we
propose
a
deep
(DANTD)
using
high-order
novel
augmentation
strategies.
DANTD
first
adopts
convolutional
autoencoder
extract
effective
make
it
more
representative.
Then,
uses
generative
adversarial
as
strategies
enrich
data,
so
can
consider
information
distribution.
Comprehensive
experiments
sets
validate
effectiveness
model.
Advances in logistics, operations, and management science book series,
Год журнала:
2023,
Номер
unknown, С. 36 - 74
Опубликована: Дек. 29, 2023
This
chapter
explores
the
topic
of
a
novel
network-based
intrusion
detection
system
(NIDPS)
that
utilises
concept
graph
theory
to
detect
and
prevent
incoming
threats.
With
technology
progressing
at
rapid
rate,
number
cyber
threats
will
also
increase
accordingly.
Thus,
demand
for
better
network
security
through
NIDPS
is
needed
protect
data
contained
in
networks.
The
primary
objective
this
explore
based
four
different
aspects:
collection,
analysis
engine,
preventive
action,
reporting.
Besides
analysing
existing
NIDS
technologies
market,
various
research
papers
journals
were
explored.
authors'
solution
covers
basic
structure
an
system,
from
collecting
processing
generating
alerts
reports.
Data
collection
methods
like
packet-based,
flow-based,
log-based
collections
terms
scale
viability.
Internet of Things,
Год журнала:
2024,
Номер
25, С. 101128 - 101128
Опубликована: Фев. 17, 2024
Indoor
particulate
matter
(PM)
are
small
solid
and
liquid
particles
present
in
the
air,
its
monitoring
is
one
of
key
challenges
regarding
workplace
safety
because
impact
on
human
health.
To
address
this
issue,
Internet
Things
(IoT)
paradigm
allows
implementation
hyperlocal
systems,
typically
using
traditional
cloud
architectures,
which
can
be
enhanced
edge
computing
architectures.
For
reason,
we
propose
an
IoT-Edge-Cloud
architecture
for
a
platform
promotes
early
detection
unsafe
environments
through
machine
learning,
composed
sensing
layer
that
collects
all
data,
performs
artificial
intelligence
tasks
orchestrating.
This
based
FogFlow
framework
FIWARE
components.
Our
solution
proposes
embedded
model
predict
occurrence
PM
values
higher
than
recommended
ones
-
according
to
Occupational
Safety
Health
Administration
(OSHA)
indicators
with
87
%
accuracy
reduction
latency
26
%.
innovative
it
supported
by
Smart
Spot
device
validated
field
test.
step
missing
from
similar
state-of-the-art
platforms.
Thus,
believe
work
contributes
demonstrating
usefulness
AIoT
monitor
make
trustable
predictions,
avoiding
risky
environments.