An ensemble learning framework for the detection of RPL attacks in IoT networks based on the genetic feature selection approach

M Osman, J He, N Zhu, FMM Mokbal - Ad Hoc Networks, 2024 - Elsevier
The rapid proliferation of Internet of Things (IoT) devices has raised critical concerns
regarding the security of corresponding IoT networks. The Routing Protocol for Low-Power …

An enhanced intrusion detection system using particle swarm optimization feature extraction technique

RO Ogundokun, JB Awotunde, P Sadiku… - Procedia Computer …, 2021 - Elsevier
As the alarming growth of computer connectivity and the significant number of computer-
related applications increased lately, the challenge of achieving cyber-security has become …

[PDF][PDF] Improving intrusion detection system based on KNN and KNN-DS with detection of U2R, R2L attack for network probe attack detection

JA Khan, N Jain - International journal of scientific research in …, 2016 - academia.edu
This paper describes a hybrid design for intrusion detection that combines anomaly
detection with misuse detection. The proposed method includes an ensemble feature …

Trust based mechanism for securing iot routing protocol rpl against wormhole &grayhole attacks

R Mehta, MM Parmar - 2018 3rd International Conference for …, 2018 - ieeexplore.ieee.org
Internet of Things is attracting a lot of interest in the modern world and has become a part of
daily life leading to a large scale of distribution of Low power and Lossy Networks (LLN). For …

Machine learning-based intrusion detection system: an experimental comparison

I Hidayat, MZ Ali, A Arshad - Journal of Computational and …, 2023 - ojs.bonviewpress.com
Recently, networks are moving toward automation and getting more and more intelligent.
With the advent of big data and cloud computing technologies, lots and lots of data are being …

RPL routing protocol performance under sinkhole and selective forwarding attack: experimental and simulated evaluation

BH Patel, P Shah - … Telecommunication Computing Electronics …, 2020 - telkomnika.uad.ac.id
To make possible dream of connecting 30 billion smart devices assessable from anywhere,
anytime and to fuel the engine growth of Internet of things (IoT) both in terms of physical and …

Detection of malicious packet dropping attacks in RPL-based internet of things

S Shin, K Kim, T Kwon - International Journal of Ad Hoc and …, 2019 - inderscienceonline.com
The routing protocol for low-power and lossy networks (RPL) is an IPv6-based routing
protocol optimised for internet of things (IoT) environments. However, it is susceptible to …

Cyber security system based on machine learning using logistic decision support vector

D Hemanand, RR Vallem - Mesopotamian …, 2023 - journals.mesopotamian.press
Nowadays, we are moving towards cybersecurity against digital attacks to protect systems,
networks, and data in developing areas. A collection of technologies and processes is at the …

Building an intrusion detection system using supervised machine learning classifiers with feature selection

AS Ahanger, SM Khan, F Masoodi - Inventive Systems and Control …, 2022 - Springer
In today's digital age, security concerns emerge as a major roadblock, as it compromise
privacy of users. With the appearance of latest technologies, there is colossal data available …

A novel adaptive network intrusion detection system for internet of things

P Aravamudhan - Plos one, 2023 - journals.plos.org
Cyber-attack is one of the most challenging aspects of information technology. After the
emergence of the Internet of Things, which is a vast network of sensors, technology started …