Detection of Deauthentication Threats in Wi-Fi Channels Using Machine Learning Strategies

R Latha, RM Bommi - … Conference on Data Science, Agents & …, 2022 - ieeexplore.ieee.org
Due to many difficulties with Wired Equivalent Privacy (WEP), the original encryption
mechanism made available by the IEEE, Wi-Fi connections were susceptible to attacks …

Deauthentication Attack Detection in the Wi-Fi network by Using ML Techniques

R Latha, RM Bommi - 2022 Third International Conference on …, 2022 - ieeexplore.ieee.org
The initial encryption technique Wired Equivalent Privacy (WEP) provided by IEEE, had
many shortcomings, making Wi-Fi connections vulnerable to attacks. The shortcomings of …

[HTML][HTML] Automatic verification and execution of cyber attack on iot devices

FL Færøy, MM Yamin, A Shukla, B Katt - Sensors, 2023 - mdpi.com
Internet of Things (IoT) devices are becoming a part of our daily life; from health monitors to
critical infrastructure, they are used everywhere. This makes them ideal targets for malicious …

Network Intrusion Detection System for Feature Extraction based on Machine Learning Techniques

N Nalini, A Chaudhary, S Surendran… - 2023 5th …, 2023 - ieeexplore.ieee.org
Network Intrusion Detection (NID) examines data from the network in search of malicious
activity to identify illegal access. This investigation will center on Network Intrusion Detection …

Security quantification of container-technology-driven E-government systems

SK Mondal, T Tan, S Khanam, K Kumar, HMD Kabir… - Electronics, 2023 - mdpi.com
With the rapidly increasing demands of e-government systems in smart cities, a myriad of
challenges and issues are required to be addressed. Among them, security is one of the …

Lightweight real-time WiFi-based intrusion detection system using LightGBM

AA Bhutta, M Nisa, AN Mian - Wireless Networks, 2024 - Springer
Attacks on WiFi networks can cause network failures and denial of service for authentic
users. To identify such attacks, the deployment of a WiFi Intrusion Detection System (IDS) is …

Smart Bulbs can be Hacked to Hack into your Household

D Bonaventura, S Esposito, G Bella - arXiv preprint arXiv:2308.09019, 2023 - arxiv.org
The IoT is getting more and more pervasive. Even the simplest devices, such as a light bulb
or an electrical plug, are made" smart" and controllable by our smartphone. This paper …

A Survey on Security Attacks with Remote Ground Robots

B Özdol, E Köseler, E Alçiçek, SE Cesur, PJ Aydemir… - El-Cezeri, 2021 - dergipark.org.tr
Contemporary healthcare systems contain diverse computing devices that construct very
complex systems to manage patients' data more efficiently. Connected computing devices …

Malware spreading model for routers in Wi-Fi networks

DT Le, TT Tran, KQ Dang, R Alkanhel… - IEEE Access, 2022 - ieeexplore.ieee.org
Malware attacks have become very common in recent years. The variety and continuous
improvement of malware capabilities threaten any network. Wi-Fi is also not an exception in …

Detection of DoS attacks on Wi-Fi networks using IoT sensors

I Joseph, PB Honnavalli, BR Charanraj - … Advanced Computing: Select …, 2022 - Springer
IoT has become a primary target for data theft. There is a legal risk if disconnection of a user
from a network occurs frequently. Moreover, service providers would be accountable to the …