A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Applications of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review
2015
International Journal of Artificial Intelligence & Applications
The purpose of this study is to present advances made so far in the field of applying AI techniques for combating cyber crimes, to demonstrate how these techniques can be an effective tool for detection ...
With the advances in information technology (IT) criminals are using cyberspace to commit numerous cyber crimes. Cyber infrastructures are highly vulnerable to intrusions and other threats. ...
The analysis of their proposal showed that their model provides a new effective intrusion detection for the Internet of Things [59] . ...
doi:10.5121/ijaia.2015.6102
fatcat:r6cycqel5rcxpizuvejrllqxjq
A Survey of Anomaly Detection Approaches in Internet of Things
2018
Isecure
In this regard, Anomaly based Intrusion Detection Systems identify anomalous behavior of the network and consequently detect possible intrusion, unknown and stealth attacks. ...
Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. ...
IoT Anomaly detection literature
for Internet of Things based on MapReduce approach
with the aim of distributed detection is proposed. ...
doi:10.22042/isecure.2018.116976.408
dblp:journals/isecure/BehniafarNS18
fatcat:eu5idlzo6vgwlhny2plx6hac2u
Distributed Danger Assessment Model for the Internet of Things Based on Immunology
2013
Research Journal of Applied Sciences Engineering and Technology
However, the research achievements of the danger assessment technology for IoT are rare. ...
The Internet of Things (IoT) confronts complicated and changeful security threats. It harms IoT and brings IoT potential danger. ...
Their ideology is based on the traditional intrusion detection technology of Internet and cannot adapt the special security requirements of the IoT environment entirely. ...
doi:10.19026/rjaset.5.4273
fatcat:5jbf5ii3fzgt7g3o3cqhxh2ugi
Cybersecurity and Cyber Forensics: Machine Learning Approach
2020
Semiconductor Science and Information Devices
In this research work machine learning algorithms applied to cybersecurity and cyber forensics are clearly explored and pave away for further research directions on the application of deep learning, computational ...
positioning system (GPS) with their associated e-services in which internet provide platform for the connection of this devices worldwide. cyber forensics as a sub-branch of computer security that uses ...
security, information security, identity access security, cloud computing security, Internet of Things security, intrusion detection system, artificial immune systems, although majority of the security ...
doi:10.30564/ssid.v2i2.2495
fatcat:h76daturlfbcbisdaxanpohxxm
Multiple negative selection algorithm: Improving detection error rates in IoT intrusion detection systems
2017
2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
The creation of intrusion detection systems for IoT scenarios presents various challenges. ...
One of them being the need for an implementation of unsupervised learning and decision making in the detection syste 1 m. ...
INTRODUCTION The concept of Internet of things (IoT) is based on the idea of connecting billions upon billions of heterogeneous devices and networks, thus presenting a myriad of technical difficulties ...
doi:10.1109/idaacs.2017.8095140
dblp:conf/idaacs/PamukovP17
fatcat:rsr5lpwd2bbdpacu4qo6dhaotu
A SURVEY OF INTRUSION DETECTION SYSTEM IN IOT DEVICES
2018
International Journal of Advanced Research
Through this study the researchers are easy to detect the security loopholes arising out of the information exchange technologies in Internet of Things and also learn the various security attacks and approaches ...
This paper gives a complete survey about the taxonomy, summarized and organized recent research results of Intrusion detection system in IoT. ...
The proposed IDS is used to detect security attacks based on traffic signatures and abnormal behaviors. [6] To detect the security threat in the Internet of Things (IoT), The mechanisms of artificial ...
doi:10.21474/ijar01/7183
fatcat:kfpqlishzrhp5newitoppf7jeu
6lo Technology for Smart Cities Development: Security Case Study
2014
International Journal of Computer Applications
cryptography as a first line and the intrusion detection system as the second line. ...
For this, IETF "IPv6 over Networks of Resource-constrained Nodes" (6lo) workgroup works on equipment of all resource constrained devices by IPv6 protocol to integrate the internet. ...
In the case of 6lo networks, there may be two types of IDS, as the operation of the device that is equipped with this technology, the NIDS (Network Intrusion Detection System Based), they provide security ...
doi:10.5120/16089-5402
fatcat:amp5grgfmbgg3n4vacjem3nmii
A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network
2014
Journal of Electrical and Computer Engineering
The paper elaborates on the design and implementation of the detection system. ...
The Internet of Things has broad application in military field, commerce, environmental monitoring, and many other fields. ...
Acknowledgment This research was supported in part by National Key Basic Research Program of China (2013CB329603), the National Natural Science Foundation of China (no. 61271220 and no. 61170164), and ...
doi:10.1155/2014/240217
fatcat:645ertwqlrfrrgzqhcjzj4wu24
Artificial Intrusion Detection Techniques: A Survey
2014
International Journal of Computer Network and Information Security
During recent years, number of attacks on networks have been increased which drew the attention of many researchers on this field. There have been many researches on intrusion detection lately. ...
In order to detect new intrusions in the network, researchers have devised artificial intelligence technique for Intrusion detection prevention system. ...
With the recent advancement in network based technology and dependability of our everyday life on this technology, assuring reliable operations of network based system is very important. ...
doi:10.5815/ijcnis.2014.09.07
fatcat:hj2we7kl7nha7mig42bgj4dklm
Intrusion Detection System
2020
International Journal of Scientific Research in Science Engineering and Technology
The main objective of this paper is to provide a complete study about the intrusion detection, sorts of intrusion detection methods, types of attacks, diverse tools and practices, research needs, challenges ...
and finally change the IDS Tool for Research Purpose That tool are capable of perceiving and prevent the attack from the intruder. ...
is used to detect the intrusions on the system. ...
doi:10.32628/ijsrset207293
fatcat:elczhmhwqbhjziqeadp4qjor6e
Proposed Back Propagation Deep Neural Network for Intrusion Detection in Internet of Things Fog Computing
2021
International Journal of Emerging Trends in Engineering Research
Internet of things (IoT) is an emerging concept which aims to connect billions of devices with each other anytime regardless of their location. ...
We then proceed to propose an Intrusion Detection System (IDS) model using Standard Deep Neural Network's Back Propagation algorithm (BPDNN) to mitigate intrusions that attack Fog-IoT platform. ...
PROPOSED MODEL The research objective of this proposed work is to find an improved BP-DNN algorithm that will provide a better accuracy and detection rates for anomaly-based intrusion detection system. ...
doi:10.30534/ijeter/2021/23942021
fatcat:ii4evv3jfrdmjic6dtnwweusyu
Integrating Blockchain with Artificial Intelligence to Secure IoT Networks: Future Trends
2022
Sustainability
This paper aims to increase the knowledge base for enhancing IoT security, recommend future research, and suggest directions for future research. ...
Recently, the Internet of Things (IoT) has gained tremendous popularity in several realms such as smart cities, healthcare, industrial automation, etc. ...
One of the exciting research areas is revising the current distributed IDS models and mitigating their limitations. ...
doi:10.3390/su142316002
fatcat:ge2ij3k6fzafnln2r2bnouicnu
Intrusion Detection Protocols in Wireless Sensor Networks integrated to Internet of Things Deployment: Survey and Future Challenges
2019
IEEE Access
INDEX TERMS Wireless sensor network (WSN), Internet of Things (IoT), intrusion detection, cloud computing, fog computing, edge computing, security. ...
We also provide a critical literature survey of recent intrusion detection protocols for IoT and WSN environments along with their comparative analysis. ...
ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers and the associate editor for their valuable feedback on the paper which helped us to improve its quality and presentation. ...
doi:10.1109/access.2019.2962829
fatcat:mgodkcpnkrh7vliwaseufob7iq
Study of Security Issues in Pervasive Environment of Next Generation Internet of Things
[chapter]
2013
Lecture Notes in Computer Science
Internet of Things is a novel concept that semantically implies a world-wide network of uniquely addressable interconnected smart objects. It is aimed at establishing any paradigm in computing. ...
Therefore need arises for a review of security threats for a new area having huge demand. Here a study of security issues in this domain is briefly presented. ...
Researchers have been working for quite some time for designing intrusion detection in wireless sensor network and in IP based network. ...
doi:10.1007/978-3-642-40925-7_20
fatcat:ff2ekqchvvf5xi5ctwk5z24fxe
An Efficient Fuzzy Based Multi Level Clustering Model Using Artificial Bee Colony For Intrusion Detection
2023
International Journal on Recent and Innovation Trends in Computing and Communication
For network security, researchers employ a range of technologies, including anomaly-based intrusion detection systems (AIDS). ...
In order to detect intrusions based on anomalies, this research employs an Efficient Fuzzy based Multi Level Clustering Model using Artificial Bee Colony (EFMLC-ABC). ...
Both real-time internet traffic and the gold-standard intrusion detection dataset KDD99 and UNSW-NB15 have been the subject of experimental research. ...
doi:10.17762/ijritcc.v11i11.9390
fatcat:6qy2mndehvcslnon5i37imr7wu
« Previous
Showing results 1 — 15 out of 4,089 results