Host-based network intrusion detection via feature flattening and two-stage collaborative classifier

Z Chen, M Simsek, B Kantarci, M Bagheri… - arXiv preprint arXiv …, 2023 - arxiv.org
Network Intrusion Detection Systems (NIDS) have been extensively investigated by
monitoring real network traffic and analyzing suspicious activities. However, there are …

[PDF][PDF] Direct Neighbour Sink Reputed Trust Based Intrusion Detection System to Mitigate Sinkhole Attack in RPL for IoT Networks.

B Patel, P Shah - Journal of Engineering Science & Technology …, 2021 - academia.edu
In terms of heterogeneous devices and sensors, man and machine collaborate seamlessly,
giving birth to the Internet of People, Internet of Things, and Internet of the Future. IoT …

DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN

VR Rajasekar, S Rajkumar - Cluster Computing, 2024 - Springer
The RPL routing protocol is susceptible to Selective Forwarding Attack (SFA), wherein
malicious nodes selectively forward certain packets while discarding others and isolating a …

[PDF][PDF] Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks.

S Al-Sarawi, M Anbar, BA Alabsi… - … Materials & Continua, 2023 - cdn.techscience.cn
ABSTRACT The Internet of Things (IoT) consists of interconnected smart devices
communicating and collecting data. The Routing Protocol for Low-Power and Lossy …

Modelling and evaluation of network intrusion detection systems using machine learning techniques

RN Clottey, W Yaokumah, JK Appati - International Journal of …, 2021 - igi-global.com
This study aims at modelling and evaluating the performance of machine learning
techniques on a recent network intrusion dataset. Five machine learning algorithms, which …

A robust traffic information management system against data poisoning in vehicular networks

C Pedroso, TS Gomides, DL Guidoni… - IEEE Latin America …, 2022 - ieeexplore.ieee.org
Due to the real-time demand and the amount of processed data, network security attacks are
frequent concerns to the systems inspired by vehicular networks. Attacks that act to decrease …

Comparative analysis of grid and tree topologies in agriculture wsn with rpl routing

FA Pangestu, M Abdurohman, AG Putrada - Proceedings of Sixth …, 2022 - Springer
Abstract Agricultural Internet of Things is very dependent on its Wireless Sensor Network
(WSN) performance. The Routing Protocol for Low Power and Lossy Network (RPL) is an …

5G Network Security for IoT Implementation: A Systematic Literature Review

M Montaño-Blacio, J Briceño-Sarmiento… - … on Innovation and …, 2020 - Springer
Fifth generation (5G) wireless technologies satisfies the growing demand for the Internet of
Things (IoT), however, IoT devices are vulnerable to security threats due to the simplicity of …

Managing consensus-based cooperative task allocation for IIoT networks

C Pedroso, YU de Moraes, M Nogueira… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Current IoT services include industry-oriented services, which often require objects to run
more than one task. However, the exponential growth of objects in IoT poses the challenge …

Forwarding Neighbor Based Sink Reputed Trust Based Intrusion Detection System to Mitigate Selective Forwarding Attack in RPL for IoT Networks

B Patel, J Vasa, P Shah - SN Computer Science, 2023 - Springer
The physical world and information world communicate giving birth to the Internet of Things
firstly coined by Kevin Ashton in 1999. But actual growth momentum of IoT has picked up the …