Machine learning in network anomaly detection: A survey

S Wang, JF Balarezo, S Kandeepan… - IEEE …, 2021 - ieeexplore.ieee.org
Anomalies could be the threats to the network that have ever/never happened. To protect
networks against malicious access is always challenging even though it has been studied …

Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks

L Liu, Z Ma, W Meng - Future generation computer systems, 2019 - Elsevier
Abstract The Internet of Things (IoT) has experienced a rapid growth in the last few years
allowing different Internet-enabled devices to interact with each other in various …

Towards multiple-mix-attack detection via consensus-based trust management in IoT networks

Z Ma, L Liu, W Meng - Computers & Security, 2020 - Elsevier
With the rapid development of Internet of Things (IoT), various smart devices can work
collaboratively and construct a kind of multihop IoT network. However, due to the distributed …

Digital forensics and investigations of the internet of things: A short survey

S Amiroon, C Fachkha - 2020 3rd International Conference on …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) has become an indispensable technology fragment diurnal that
has consolidated all the discrete systems and data into a coherent and interconnected …

Detecting malicious nodes via gradient descent and support vector machine in Internet of Things

L Liu, J Yang, W Meng - Computers & Electrical Engineering, 2019 - Elsevier
IoT devices have become much popular in our daily lives, while attackers often invade
network nodes to launch various attacks. In this work, we focus on the detection of insider …

Integrating software engineering processes in the development of efficient intrusion detection systems in wireless sensor networks

I Almomani, A Alromi - Sensors, 2020 - mdpi.com
Applying Software Engineering (SE) processes is vital to critical and complex systems
including security and networking systems. Nowadays, Wireless Sensor Networks (WSNs) …

Detection of packet dropping attack based on evidence fusion in IoT networks

W Ding, W Zhai, L Liu, Y Gu… - Security and …, 2022 - Wiley Online Library
Internet of Things (IoT) is widely used in environmental monitoring, smart healthcare, and
other fields. Due to its distributed nature, IoT is vulnerable to various internal attacks. One of …

DCONST: Detection of multiple-mix-attack malicious nodes using consensus-based trust in IoT networks

Z Ma, L Liu, W Meng - Information Security and Privacy: 25th Australasian …, 2020 - Springer
Abstract The Internet of Things (IoT) is growing rapidly, which allows many smart devices to
connect and cooperate with each other. While for the sake of distributed architecture, an IoT …

A Novel Wrapper and Filter-based Feature Dimensionality Reduction Methods for Anomaly Intrusion Detection in Wireless Sensor Networks

YK Saheed, OH Abdulganiyu, TA Tchakoucht… - 2022 - researchsquare.com
Abstract Wireless Sensor Networks (WSNs) are the most important technology currently
available. WSNs are widely utilized in applications such as business, military, healthcare …

[PDF][PDF] IoT Node Security Attacks on Device Layer: Attacks Detection Countermeasures and Solutions

SB Sarvaiya, DN Satange, AA Tayade - Recent Advancements in Science …, 2024 - vbmv.org
Node identity authentication is an essential means to ensure the security of the Internet of
Things. If there is any attacks perform in IoT network then due to the authentication the …