Intelligent & Predictive Security Deployment in IOT Environments |
Abdul ghani, ansari
(QUEST)
Irfana, Memon (QUEST) Fayyaz, Ahmed (QUEST) Majid Hussain, Memon (QUEST) Kelash, Kanwar (QUEST) fareed, Jokhio (QUEST) |
1 | Abeshu, A., & Chilamkurti, N. (2018). Deep learning: The frontier for distributed attack detection in fog-to-things computing. IEEE Communications Magazine, 56(2), 169-175. DOI |
2 | Vigneswaran, R. K., Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2018, July). Evaluating shallow and deep neural networks for network intrusion detection systems in cyber security. In 2018 9th International conference on computing, communication and networking technologies (ICCCNT) (pp. 1-6). IEEE. |
3 | Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE transactions on emerging topics in computational intelligence, 2(1), 41-50. DOI |
4 | Brun, O., Yin, Y., Gelenbe, E., Kadioglu, Y. M., AugustoGonzalez, J., & Ramos, M. (2018, February). Deep learning with dense random neural networks for detecting attacks against iot-connected home environments. In International ISCIS Security Workshop (pp. 79-89). Springer, Cham. |
5 | Ahanger, T. A. (2017, March). An effective approach of detecting DDoS using Artificial Neural Networks. In 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) (pp. 707-711). IEEE. |
6 | Aljumah, A., & Ahamad, T. (2016). A novel approach for detecting DDoS using artificial neural networks. International Journal of Computer Science and Network Security, 16(12), 132-138. |
7 | "Powell, M.J.D., 'Restart procedures for the conjugate gradient method,' Mathematical Programming, Vol. 12, 1977, pp. 241-254." DOI |
8 | "Beale, E.M.L., 'A derivation of conjugate gradients,' in F.A. Lootsma, Ed., Numerical methods for nonlinear optimization, London: Academic Press, 1972." |
9 | "Battiti, R., 'First and second order methods for learning: Between steepest descent and Newton's method,' Neural Computation, Vol. 4, No. 2, 1992, pp. 141-166." DOI |
10 | "Riedmiller, M., and H. Braun, 'A direct adaptive method for faster backpropagation learning: The RPROP algorithm,' Proceedings of the IEEE International Conference on Neural Networks, 1993." |
11 | Bharadwaj, H., & Kumar, V. (2018). Comparative study of neural networks in path planning for catering robots. Procedia computer science, 133, 417-423. DOI |
12 | S. A. R. Shah and B. Issac, "Performance comparison of intrusion detection systems and application of machine learning to Snort system," Futur. Gener. Comput. Syst., vol. 80, no. November 2017, pp. 157-170, 2018. DOI |
13 | Q. Wang, X. Zhu, Y. Ni, L. Gu, and H. Zhu, "Blockchain for the IoT and industrial IoT: A review," Internet of Things, p. 100081, 2019. |
14 | "The 7 Most Common IoT Security Threats in 2019 | IoT For All," 2019. [Online]. Available: https://www.iotforall.com/7-most-common-iotsecuritythreats-2019/. [Accessed: 13-Jul-2019]. |
15 | A. R. Baker and J. Esler, Snort IDS, IPS Toolkit. Syngress Publishing, Inc. Elsevier, Inc. 30 Corporate Dr. Burlington, MA 01803, 2007. |
16 | R. Vishwakarma and A. K. Jain, "A survey of DDoS attacking techniques and defence mechanisms in the IoT network," Telecommunication Systems, vol. 73, no. 1, pp. 3-25, DOI |
17 | M. M. Salim, S. Rathore, and J. H. Park, "Distributed denial of service attacks and its defenses in IoT: a survey," The Journal of Supercomputing, pp. 1-44, 2019. |
18 | G. Somani, M. S. Gaur, D. Sanghi, M. Conti, and R. Buyya, "DDoS attacks in cloud computing: Issues, taxonomy, and future directions," Computer Communications, vol. 107, pp. 30-48, 2017. DOI |
19 | Mendez,D.M.,Papapanagiotou,I.,&Yang,B.(2017).Internetof things: Survey on security and privacy. arXiv preprint arXiv:1707. 01879. |
20 | McDermott, C. D., Petrovski, A. V., & Majdani, F. (2018, June). Towards situational awareness of botnet activity in the internet of things. In 2018 International conference on cyber situational awareness, data analytics and assessment (Cyber SA) (pp. 1-8). IEEE. |
21 | Bertino, E., & Islam, N. (2017). Botnets and internet of things security. Computer, 2, 76-79. DOI |
22 | A. Whitmore, A. Agarwal, and L. Da Xu, "The Internet of Things-A survey of topics and trends," Information Systems Frontiers, vol. 17, no. 2, pp. 261-274, 2015. DOI |
23 | Jerkins, J. A. (2017, January). Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code. In 2017 IEEE 7th annual computing and communication workshop and conference (CCWC) (pp. 1-5). IEEE. |
24 | O. Osanaiye, K.-K. R. Choo, and M. Dlodlo, "Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework," Journal of Network and Computer Applications, vol. 67, pp. 147-165, 2016. DOI |
25 | A. Rawashdeh, M. Alkasassbeh, and M. Al-Hawawreh, "An anomaly-based approach for DDoS attack detection in cloud environment," International Journal of Computer Applications in Technology, vol. 57, no. 4, pp. 312-324, 2018. DOI |
26 | H. Polat, O. Polat, and A. Cetin, "Detecting DDoS Attacks in Software-Defined Networks Through Feature Selection Methods and Machine Learning Models," Sustainability, vol. 12, no. 3, p. 1035, 2020. DOI |
27 | M. Idhammad, K. Afdel, and M. Belouch, "Detection system of HTTP DDoS attacks in a cloud environment based on information theoretic entropy and random forest," Security and Communication Networks, vol. 2018, 2018. |
28 | A. Saied, R. E. Overill, and T. Radzik, "Detection of known and unknown DDoS attacks using Artificial Neural Networks," Neurocomputing, vol. 172, pp. 385-393, 2016. DOI |
29 | M. Ghanbari and W. Kinsner, "Detecting DDoS Attacks Using Polyscale Analysis and Deep Learning," International Journal of Cognitive Informatics and Natural Intelligence (IJCINI), vol. 14, no. 1, pp. 17-34, 2020. |
30 | A. Amjad, T. Alyas, U. Farooq, and M. Tariq, "Detection and mitigation of DDoS attack in cloud computing using machine learning algorithm," EAI Endorsed Transactions on Scalable Information Systems, vol. 6, no. 23, 2019. |
31 | Michael Negnevitsky. Artificial Intelligence: A Guide to Intelligent Systems. Pearson, 2011. |
32 | I. Kotenko, I. Saenko, F. Skorik, and S. Bushuev. Neural network approach to forecast the state of the internet of things elements. In Soft Computing and Measurements (SCM), 2015 XVIII International Conference on, pages 133-135, May 2015. |
33 | Dongare, A. D., Kharde, R. R., & Kachare, A. D. (2012). Introduction to artificial neural network. International Journal of Engineering and Innovative Technology (IJEIT), 2(1), 189-194. |
34 | O. I. Abiodun, A. Jantan, A. E. Omolara, K. V. Dada, N. A. E. Mohamed, and H. Arshad, "State-of-the-art in artificial neural network applications: A survey," Heliyon, vol. 4, no. 11. Elsevier Ltd, p. e00938, 2018. DOI |
35 | M. S. Galina Mikhaylova, "The 'Anonymous' Movement: Hacktivism as an Emerging Form of Political Participation," Graduate Council of Texas State University, 2014 |
36 | S. Paliwal and R. Gupta, "Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm," Int. J. Comput. Appl., vol. 60, no. 19, pp. 975-8887, 2012. |
37 | M. Sabhnani and G. Serpen, "KDD feature set complaint heuristic rules for R2L attack detection," Proc. Int. Conf. Secur. Manag., vol. 1, pp. 310-316, 2003. |
38 | Jia, Y., Zhong, F., Alrawais, A., Gong, B., & Cheng, X. (2020). Flowguard: an intelligent edge defense mechanism against IoT DDoS attacks. IEEE Internet of Things Journal, 7(10), 9552-9562. DOI |
39 | F. Mozneb and A. Farzan, "The Use of Intelligent Algorithms to Detect Attacks In," vol. 3, no. 9, pp. 579- 584, 2014. DOI |
40 | Pande, S., Khamparia, A., Gupta, D., & Thanh, D. N. (2021). DDOS Detection Using Machine Learning Technique. In Recent Studies on Computational Intelligence (pp. 59-68). Springer, Singapore. |
41 | Gajewski, M., Mongay Batalla, J., Mastorakis, G., & avromoustakis, C. X. (2020). Anomaly traffic detection and correlation in Smart Home automation IoT systems. Transactions on Emerging Telecommunications Technologies, e4053. |
42 | Dong, X., Dong, C., Chen, Z., Cheng, Y., & Chen, B. (2020). BotDetector: An extreme learning machine-based Internet of Things botnet detection model. Transactions on Emerging Telecommunications Technologies, e3999. |
43 | de Souza, C. A., Westphall, C. B., Machado, R. B., Sobral, J. B. M., & dos Santos Vieira, G. (2020). Hybrid approach to intrusion detection in fog-based IoT environments. Computer Networks, 180, 107417. DOI |
44 | Syed, N. F., Baig, Z., Ibrahim, A., & Valli, C. (2020). Denial of service attack detection through machine learning for the IoT. Journal of Information and Telecommunication, 4(4), 482-503. DOI |
45 | Cvitic, I., Perakovic, D., Perisa, M., & Botica, M. (2019). Novel approach for detection of IoT generated DDoS traffic. Wireless Networks, 1-14. |
46 | Alsamiri, J., & Alsubhi, K. (2019). Internet of Things cyber attacks detection using machine learning. Int. J. Adv. Comput. Sci. Appl, 10(12). |
47 | Aamir, M., & Zaidi, S. M. A. (2019). Clustering based semi-supervised machine learning for DDoS attack classification. Journal of King Saud University-Computer and Information Sciences. |
48 | Roopak, M., Tian, G. Y., & Chambers, J. (2019, January). Deep learning models for cyber security in IoT networks. In 2019 IEEE 9th annual computing and communication workshop and conference (CCWC) (pp. 0452-0457). IEEE. |
49 | Ge, M., Fu, X., Syed, N., Baig, Z., Teo, G., & Robles-Kelly, A. (2019, December). Deep learning-based intrusion detection for iot networks. In 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC) (pp. 256-25609). IEEE. |
50 | NG, B. A., & Selvakumar, S. (2019). Deep radial intelligence with cumulative incarnation approach for detecting denial of service attacks. Neurocomputing, 340, 294-308. DOI |
51 | Mallikarjunan, K. N., Bhuvaneshwaran, A., Sundarakantham, K., & Shalinie, S. M. (2019). DDAM: Detecting DDoS attacks using machine learning approach. In Computational Intelligence: Theories, Applications and Future Directions-Volume I (pp. 261-273). Springer, Singapore. |
52 | Doshi, R., Apthorpe, N., & Feamster, N. (2018, May). Machine learning ddos detection for consumer internet of things devices. In 2018 IEEE Security and Privacy Workshops (SPW) (pp. 29-35). IEEE. |
53 | Doshi, R., Apthorpe, N., & Feamster, N. (2018, May). Machine learning ddos detection for consumer internet of things devices. In 2018 IEEE Security and Privacy Workshops(SPW) (pp. 29-35). IEEE. |
54 | Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., & Elovici, Y. (2018). N-baiot-network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Computing, 17(3), 12-22. DOI |
![]() |