Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








4,089 Hits in 6.6 sec

Applications of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review

Selma Dilek, Hüseyin Cakır, Mustafa Aydın
2015 International Journal of Artificial Intelligence & Applications  
The purpose of this study is to present advances made so far in the field of applying AI techniques for combating cyber crimes, to demonstrate how these techniques can be an effective tool for detection  ...  With the advances in information technology (IT) criminals are using cyberspace to commit numerous cyber crimes. Cyber infrastructures are highly vulnerable to intrusions and other threats.  ...  The analysis of their proposal showed that their model provides a new effective intrusion detection for the Internet of Things [59] .  ... 
doi:10.5121/ijaia.2015.6102 fatcat:r6cycqel5rcxpizuvejrllqxjq

A Survey of Anomaly Detection Approaches in Internet of Things

Morteza Behniafar, Alireza Nowroozi, Hamid Reza Shahriari
2018 Isecure  
In this regard, Anomaly based Intrusion Detection Systems identify anomalous behavior of the network and consequently detect possible intrusion, unknown and stealth attacks.  ...  Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes.  ...  IoT Anomaly detection literature for Internet of Things based on MapReduce approach with the aim of distributed detection is proposed.  ... 
doi:10.22042/isecure.2018.116976.408 dblp:journals/isecure/BehniafarNS18 fatcat:eu5idlzo6vgwlhny2plx6hac2u

Distributed Danger Assessment Model for the Internet of Things Based on Immunology

Run Chen, Jiliu Zhou, Caiming Liu
2013 Research Journal of Applied Sciences Engineering and Technology  
However, the research achievements of the danger assessment technology for IoT are rare.  ...  The Internet of Things (IoT) confronts complicated and changeful security threats. It harms IoT and brings IoT potential danger.  ...  Their ideology is based on the traditional intrusion detection technology of Internet and cannot adapt the special security requirements of the IoT environment entirely.  ... 
doi:10.19026/rjaset.5.4273 fatcat:5jbf5ii3fzgt7g3o3cqhxh2ugi

Cybersecurity and Cyber Forensics: Machine Learning Approach

Ibrahim Goni, Jerome Mishion Gumpy, Timothy Umar Maigari
2020 Semiconductor Science and Information Devices  
In this research work machine learning algorithms applied to cybersecurity and cyber forensics are clearly explored and pave away for further research directions on the application of deep learning, computational  ...  positioning system (GPS) with their associated e-services in which internet provide platform for the connection of this devices worldwide. cyber forensics as a sub-branch of computer security that uses  ...  security, information security, identity access security, cloud computing security, Internet of Things security, intrusion detection system, artificial immune systems, although majority of the security  ... 
doi:10.30564/ssid.v2i2.2495 fatcat:h76daturlfbcbisdaxanpohxxm

Multiple negative selection algorithm: Improving detection error rates in IoT intrusion detection systems

Marin E. Pamukov, Vladimir K. Poulkov
2017 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)  
The creation of intrusion detection systems for IoT scenarios presents various challenges.  ...  One of them being the need for an implementation of unsupervised learning and decision making in the detection syste 1 m.  ...  INTRODUCTION The concept of Internet of things (IoT) is based on the idea of connecting billions upon billions of heterogeneous devices and networks, thus presenting a myriad of technical difficulties  ... 
doi:10.1109/idaacs.2017.8095140 dblp:conf/idaacs/PamukovP17 fatcat:rsr5lpwd2bbdpacu4qo6dhaotu

A SURVEY OF INTRUSION DETECTION SYSTEM IN IOT DEVICES

S Suganth, D Usha
2018 International Journal of Advanced Research  
Through this study the researchers are easy to detect the security loopholes arising out of the information exchange technologies in Internet of Things and also learn the various security attacks and approaches  ...  This paper gives a complete survey about the taxonomy, summarized and organized recent research results of Intrusion detection system in IoT.  ...  The proposed IDS is used to detect security attacks based on traffic signatures and abnormal behaviors. [6] To detect the security threat in the Internet of Things (IoT), The mechanisms of artificial  ... 
doi:10.21474/ijar01/7183 fatcat:kfpqlishzrhp5newitoppf7jeu

6lo Technology for Smart Cities Development: Security Case Study

Anass Rghioui, Anass Khannous, Said Bouchkaren, Mohammed Bouhorma
2014 International Journal of Computer Applications  
cryptography as a first line and the intrusion detection system as the second line.  ...  For this, IETF "IPv6 over Networks of Resource-constrained Nodes" (6lo) workgroup works on equipment of all resource constrained devices by IPv6 protocol to integrate the internet.  ...  In the case of 6lo networks, there may be two types of IDS, as the operation of the device that is equipped with this technology, the NIDS (Network Intrusion Detection System Based), they provide security  ... 
doi:10.5120/16089-5402 fatcat:amp5grgfmbgg3n4vacjem3nmii

A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network

Wenchao Li, Ping Yi, Yue Wu, Li Pan, Jianhua Li
2014 Journal of Electrical and Computer Engineering  
The paper elaborates on the design and implementation of the detection system.  ...  The Internet of Things has broad application in military field, commerce, environmental monitoring, and many other fields.  ...  Acknowledgment This research was supported in part by National Key Basic Research Program of China (2013CB329603), the National Natural Science Foundation of China (no. 61271220 and no. 61170164), and  ... 
doi:10.1155/2014/240217 fatcat:645ertwqlrfrrgzqhcjzj4wu24

Artificial Intrusion Detection Techniques: A Survey

Ashutosh Gupta, Bhoopesh Singh Bhati, Vishal Jain
2014 International Journal of Computer Network and Information Security  
During recent years, number of attacks on networks have been increased which drew the attention of many researchers on this field. There have been many researches on intrusion detection lately.  ...  In order to detect new intrusions in the network, researchers have devised artificial intelligence technique for Intrusion detection prevention system.  ...  With the recent advancement in network based technology and dependability of our everyday life on this technology, assuring reliable operations of network based system is very important.  ... 
doi:10.5815/ijcnis.2014.09.07 fatcat:hj2we7kl7nha7mig42bgj4dklm

Intrusion Detection System

Shivani Agrawal, Priyanka Walke, Shivam Pandit, Sangram Nevse, Sunil Deokule
2020 International Journal of Scientific Research in Science Engineering and Technology  
The main objective of this paper is to provide a complete study about the intrusion detection, sorts of intrusion detection methods, types of attacks, diverse tools and practices, research needs, challenges  ...  and finally change the IDS Tool for Research Purpose That tool are capable of perceiving and prevent the attack from the intruder.  ...  is used to detect the intrusions on the system.  ... 
doi:10.32628/ijsrset207293 fatcat:elczhmhwqbhjziqeadp4qjor6e

Proposed Back Propagation Deep Neural Network for Intrusion Detection in Internet of Things Fog Computing

2021 International Journal of Emerging Trends in Engineering Research  
Internet of things (IoT) is an emerging concept which aims to connect billions of devices with each other anytime regardless of their location.  ...  We then proceed to propose an Intrusion Detection System (IDS) model using Standard Deep Neural Network's Back Propagation algorithm (BPDNN) to mitigate intrusions that attack Fog-IoT platform.  ...  PROPOSED MODEL The research objective of this proposed work is to find an improved BP-DNN algorithm that will provide a better accuracy and detection rates for anomaly-based intrusion detection system.  ... 
doi:10.30534/ijeter/2021/23942021 fatcat:ii4evv3jfrdmjic6dtnwweusyu

Integrating Blockchain with Artificial Intelligence to Secure IoT Networks: Future Trends

Shatha Alharbi, Afraa Attiah, Daniyal Alghazzawi
2022 Sustainability  
This paper aims to increase the knowledge base for enhancing IoT security, recommend future research, and suggest directions for future research.  ...  Recently, the Internet of Things (IoT) has gained tremendous popularity in several realms such as smart cities, healthcare, industrial automation, etc.  ...  One of the exciting research areas is revising the current distributed IDS models and mitigating their limitations.  ... 
doi:10.3390/su142316002 fatcat:ge2ij3k6fzafnln2r2bnouicnu

Intrusion Detection Protocols in Wireless Sensor Networks integrated to Internet of Things Deployment: Survey and Future Challenges

Sumit Pundir, Mohammad Wazid, D. P. Singh, Ashok Kumar Das, Joel J. P. C. Rodrigues, Youngho Park
2019 IEEE Access  
INDEX TERMS Wireless sensor network (WSN), Internet of Things (IoT), intrusion detection, cloud computing, fog computing, edge computing, security.  ...  We also provide a critical literature survey of recent intrusion detection protocols for IoT and WSN environments along with their comparative analysis.  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers and the associate editor for their valuable feedback on the paper which helped us to improve its quality and presentation.  ... 
doi:10.1109/access.2019.2962829 fatcat:mgodkcpnkrh7vliwaseufob7iq

Study of Security Issues in Pervasive Environment of Next Generation Internet of Things [chapter]

Tapalina Bhattasali, Rituparna Chaki, Nabendu Chaki
2013 Lecture Notes in Computer Science  
Internet of Things is a novel concept that semantically implies a world-wide network of uniquely addressable interconnected smart objects. It is aimed at establishing any paradigm in computing.  ...  Therefore need arises for a review of security threats for a new area having huge demand. Here a study of security issues in this domain is briefly presented.  ...  Researchers have been working for quite some time for designing intrusion detection in wireless sensor network and in IP based network.  ... 
doi:10.1007/978-3-642-40925-7_20 fatcat:ff2ekqchvvf5xi5ctwk5z24fxe

An Efficient Fuzzy Based Multi Level Clustering Model Using Artificial Bee Colony For Intrusion Detection

Et al. Battini Sujatha
2023 International Journal on Recent and Innovation Trends in Computing and Communication  
For network security, researchers employ a range of technologies, including anomaly-based intrusion detection systems (AIDS).  ...  In order to detect intrusions based on anomalies, this research employs an Efficient Fuzzy based Multi Level Clustering Model using Artificial Bee Colony (EFMLC-ABC).  ...  Both real-time internet traffic and the gold-standard intrusion detection dataset KDD99 and UNSW-NB15 have been the subject of experimental research.  ... 
doi:10.17762/ijritcc.v11i11.9390 fatcat:6qy2mndehvcslnon5i37imr7wu
« Previous Showing results 1 — 15 out of 4,089 results