Intrusion detection and prevention in fog based IoT environments: A systematic literature review

CA de Souza, CB Westphall, RB Machado, L Loffi… - Computer Networks, 2022 - Elsevier
Abstract Currently, the Internet of Things is spreading in all areas that apply computing
resources. An important ally of the IoT is fog computing. It extends cloud computing and …

SDMTA: Attack detection and mitigation mechanism for DDoS vulnerabilities in hybrid cloud environment

S Kautish, A Reyana, A Vidyarthi - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In a distributed cloud context, distributed denial of service (DDoS) attacks are widespread.
The services are rendered unavailable to legitimate users as a result of the overwhelming …

[HTML][HTML] AIMM: Artificial intelligence merged methods for flood DDoS attacks detection

A Jaszcz, D Połap - Journal of King Saud University-Computer and …, 2022 - Elsevier
DDoS is one of the most common attacks on the web today. Hence, a quick detection system
can enable automatic blocking or notification of an attack. In this paper, we propose a …

Deep learning methods for malware and intrusion detection: A systematic literature review

R Ali, A Ali, F Iqbal, M Hussain… - Security and …, 2022 - Wiley Online Library
Android and Windows are the predominant operating systems used in mobile environment
and personal computers and it is expected that their use will rise during the next decade …

[HTML][HTML] A machine learning based attack detection and mitigation using a secure SaaS framework

SST Reddy, GK Shyam - Journal of King Saud University-Computer and …, 2022 - Elsevier
Abstract Software-as-a-service (SaaS) is a license for access to a specific cloud application
through the Internet. However, these services are delayed and sometimes totally disrupted …

[HTML][HTML] Survey of distributed and decentralized IoT securities: approaches using deep learning and blockchain technology

A Falayi, Q Wang, W Liao, W Yu - Future Internet, 2023 - mdpi.com
The Internet of Things (IoT) continues to attract attention in the context of computational
resource growth. Various disciplines and fields have begun to employ IoT integration …

Distributed denial of service attack detection for the Internet of Things using hybrid deep learning model

A Ahmim, F Maazouzi, M Ahmim, S Namane… - IEEE …, 2023 - ieeexplore.ieee.org
As a result of the widespread adoption of the Internet of Things, there are now hundreds of
millions of connected devices, increasing the likelihood that they may be vulnerable to …

A deep learning-based intrusion detection and preventation system for detecting and preventing denial-of-service attacks

JFC Garcia, GET Blandon - IEEE Access, 2022 - ieeexplore.ieee.org
This document classifies, selects and trains a deep learning algorithm to create an IDS/IPS
(Intrusion Prevention/Detection System) called Dique, which can detect and prevent denial …

A comprehensive survey on DDoS attacks on various intelligent systems and it's defense techniques

A Gaurav, BB Gupta, W Alhalabi… - … Journal of Intelligent …, 2022 - Wiley Online Library
The purpose of this study is to provide an overview of distributed denial of service (DDoS)
attack detection in intelligent systems. In recent times, due to the endemic COVID‐19, the …

DI‐ADS: A Deep Intelligent Distributed Denial of Service Attack Detection Scheme for Fog‐Based IoT Applications

SPK Gudla, SK Bhoi, SR Nayak… - … Problems in Engineering, 2022 - Wiley Online Library
Nowadays, fog computing plays a very vital role in providing many services to end‐based
IoT (Internet of Things) systems. The end IoT devices communicate with the middle layer fog …