Kumar et al., 2024 - Google Patents
Detection and prevention of DDoS attacks on edge computing of IoT devices through reinforcement learningKumar et al., 2024
View PDF- Document ID
- 3814453611307928945
- Author
- Kumar A
- Singh D
- Publication year
- Publication venue
- International Journal of Information Technology
External Links
Snippet
The limited resource and computation capacity of an IoT device always being a target vector for intruders to use to steal sensitive data from the device. Computational problems were later solved by the engineers by introducing an edge server near the IoT device network …
- 230000002787 reinforcement 0 title abstract description 22
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kumar et al. | Detection and prevention of DDoS attacks on edge computing of IoT devices through reinforcement learning | |
Zaman et al. | Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey | |
Heidari et al. | Internet of Things intrusion detection systems: a comprehensive review and future directions | |
Wang et al. | A survey on digital twins: Architecture, enabling technologies, security and privacy, and future prospects | |
Jayalaxmi et al. | DeBot: A deep learning-based model for bot detection in industrial internet-of-things | |
Strecker et al. | An analysis of IoT cyber security driven by machine learning | |
Chowdhury et al. | A novel insider attack and machine learning based detection for the internet of things | |
Prajisha et al. | An efficient intrusion detection system for MQTT-IoT using enhanced chaotic salp swarm algorithm and LightGBM | |
Aldowah et al. | Trust in iot systems: a vision on the current issues, challenges, and recommended solutions | |
Vignesh Saravanan et al. | Data protection and security enhancement in cyber-physical systems using AI and blockchain | |
Ghonge et al. | Cyber security and digital forensics: challenges and future trends | |
Om Kumar et al. | Effective intrusion detection system for IoT using optimized capsule auto encoder model | |
Kaur et al. | A blockchain-based machine learning intrusion detection system for internet of things | |
Houichi et al. | A systematic approach for IoT cyber-attacks detection in smart cities using machine learning techniques | |
Papanikolaou et al. | An autoML network traffic analyzer for cyber threat detection | |
Ghaffari et al. | Securing internet of things using machine and deep learning methods: a survey | |
Faiz et al. | Threats and Challenges for Security Measures on the Internet of Things. | |
Kranthi et al. | An intelligent intrusion prediction and prevention system for software defined internet of things cloud networks | |
Panda et al. | Blackhole attack prediction in wireless sensor networks using support vector machine | |
Roshan et al. | A systematic review of deep learning approaches for computer network and information security | |
Sivasakthi et al. | HybridRobustNet: enhancing detection of hybrid attacks in IoT networks through advanced learning approach | |
Pandey et al. | Identification of botnet attacks using hybrid machine learning models | |
Singh et al. | Cloud of things: a systematic review on issues and challenges in integration of cloud computing and internet of things | |
Karankar et al. | A comprehensive survey on internet of things security: challenges and solutions | |
Iqbal et al. | A top-down survey on securing IoT with machine learning: goals, recent advances and challenges |