CICIoT2023: A real-time dataset and benchmark for large-scale attacks in IoT environment

ECP Neto, S Dadkhah, R Ferreira, A Zohourian, R Lu… - Sensors, 2023 - mdpi.com
Nowadays, the Internet of Things (IoT) concept plays a pivotal role in society and brings new
capabilities to different industries. The number of IoT solutions in areas such as …

Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review

P Shukla, CR Krishna, NV Patil - The Journal of Supercomputing, 2024 - Springer
Abstract The Internet of Things (IoT) has emerged as an inevitable part of human life, that
includes online learning, smart homes, smart cars, smart grids, smart cities, agriculture, and …

Distributed denial of service attacks and its defenses in IoT: a survey

MM Salim, S Rathore, JH Park - The Journal of Supercomputing, 2020 - Springer
A distributed denial of service (DDoS) attack is an attempt to partially or completely shut
down the targeted server with a flood of internet traffic. The primary aim of this attack is to …

Security analysis of an IoT system used for indoor localization in healthcare facilities

C Bradley, S El-Tawab… - 2018 Systems and …, 2018 - ieeexplore.ieee.org
In today's world, the rapid advancement of technology allows us to find new solutions to old
problems in critical areas, namely patient and staff tracking in healthcare facilities. The …

Long Short-Term Memory Recurrent Neural Network for detecting DDoS flooding attacks within TensorFlow Implementation framework.

PK Bediako - 2017 - diva-portal.org
Long Short-Term Memory Recurrent Neural Network for detecting DDoS flooding attacks within
TensorFlow Implementation framework. diva-portal.org Digitala Vetenskapliga Arkivet Simple …

An Intrusion Detection and Prevention System against DOS Attacks for Internet-Integrated WSN

BJS Kumar, S Sinha - 2022 7th International Conference on …, 2022 - ieeexplore.ieee.org
Internet integrated WSN is presently having a large impact in our daily life. Security and
privacy is also equally important in this respect. Detection and prevention of intrusion is …

[PDF][PDF] A research on the malicious node detection in wireless sensor network

S Nagarjun, S Anand, S Sinha - International Journal of …, 2019 - researchgate.net
Wireless Sensor Network (WSN) has been looked into broadly in the course of recent years.
WSN were first utilized by the military for reconnaissance purposes and have since ventured …

Towards Detection of Network Attacks by Snort Analysis Using Machine Learning Techniques

HV Chaithanya, MS Prerana… - 2023 World Conference …, 2023 - ieeexplore.ieee.org
Network analysis is a crucial process in identifying suspicious entities and the sequence of
actions in an attack scenario. Among the various types of attacks, flooding attacks on web …

Identifying Rank Attacks and Alert Application in WSN

DS Nair, SK BJ - 2021 6th International Conference on …, 2021 - ieeexplore.ieee.org
Routing protocol for low power and lossy networks (RPL) is a fundamental routing protocol
of 6LoWPAN, a centre correspondence standard for the Internet of Things. RPL outplay …

Comprehensive study on mobile ad-hoc routing protocols: Olsr, aodv and dsdv

RC Jisha, J Joseph… - 2022 IEEE 3rd Global …, 2022 - ieeexplore.ieee.org
MANETs (Mobile Ad-hoc Networks) are distributed systems composed of wireless and
mobile nodes that can organize themselves into ad-hoc network designs without the …