Intrusion detection systems for IoT-based smart environments: a survey

MF Elrawy, AI Awad, HFA Hamed - Journal of Cloud Computing, 2018 - Springer
One of the goals of smart environments is to improve the quality of human life in terms of
comfort and efficiency. The Internet of Things (IoT) paradigm has recently evolved into a …

IoT intrusion detection taxonomy, reference architecture, and analyses

K Albulayhi, AA Smadi, FT Sheldon, RK Abercrombie - Sensors, 2021 - mdpi.com
This paper surveys the deep learning (DL) approaches for intrusion-detection systems
(IDSs) in Internet of Things (IoT) and the associated datasets toward identifying gaps …

A survey and future directions on clustering: From WSNs to IoT and modern networking paradigms

A Shahraki, A Taherkordi, Ø Haugen… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Many Internet of Things (IoT) networks are created as an overlay over traditional ad-hoc
networks such as Zigbee. Moreover, IoT networks can resemble ad-hoc networks over …

Forensics and deep learning mechanisms for botnets in internet of things: A survey of challenges and solutions

N Koroniotis, N Moustafa, E Sitnikova - IEEE Access, 2019 - ieeexplore.ieee.org
The constant miniaturization of hardware and an increase in power efficiency, have made
possible the integration of intelligence into ordinary devices. This trend of augmenting so …

[PDF][PDF] A systematic review of security and privacy issues in the internet of medical things; the role of machine learning approaches

SS Hameed, WH Hassan, LA Latiff… - PeerJ Computer …, 2021 - peerj.com
Background The Internet of Medical Things (IoMTs) is gradually replacing the traditional
healthcare system. However, little attention has been paid to their security requirements in …

Traffic based sequential learning during botnet attacks to identify compromised iot devices

E Gelenbe, M Nakıp - IEEE Access, 2022 - ieeexplore.ieee.org
A novel online Compromised Device Identification System (CDIS) is presented to identify IoT
devices and/or IP addresses that are compromised by a Botnet attack, within a set of sources …

Unlocking the power of mist computing through clustering techniques in IoT networks

E Fazel, HE Najafabadi, M Rezaei, H Leung - Internet of Things, 2023 - Elsevier
Fog computing allows the implementation of information processes on the native net, mainly
because of its ability to process in real-time. On the other hand, the principles of Mist …

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

S Hajj, R El Sibai, J Bou Abdo… - Transactions on …, 2021 - Wiley Online Library
With the Internet's unprecedented growth and nations' reliance on computer networks, new
cyber‐attacks are created every day as means for achieving financial gain, imposing …

Detection of IoT-botnet attacks using fuzzy rule interpolation

M Al-Kasassbeh, M Almseidin… - Journal of Intelligent …, 2020 - content.iospress.com
Abstract Recently, the Internet of Things (IoT) has been used in technology for different
aspects to increase the efficiency and comfort of human life. Protecting the IoT infrastructure …

Iot network cybersecurity assessment with the associated random neural network

E Gelenbe, M Nakip - IEEE Access, 2023 - ieeexplore.ieee.org
This paper proposes a method to assess the security of an device, or IP address, IoT
network by simultaneously identifying all the compromised IoT devices and IP addresses. It …