A novel method to detect cyber-attacks in IoT/IIoT devices on the modbus protocol using deep learning

[1]  Ananth A. Jillepalli,et al.  IoT Intrusion Detection Using Machine Learning with a Novel High Performing Feature Selection Method , 2022, Applied Sciences.

[2]  S. Meher,et al.  Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection , 2022, The Journal of Supercomputing.

[3]  Q. A. Al-Haija,et al.  ELBA-IoT: An Ensemble Learning Model for Botnet Attack Detection in IoT Networks , 2022, J. Sens. Actuator Networks.

[4]  Ahmad Al Badawi,et al.  Boost‐Defence for resilient IoT networks: A head‐to‐toe approach , 2022, Expert Syst. J. Knowl. Eng..

[5]  Syed Ghazanfar Abbas,et al.  Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System , 2022, Sensors.

[6]  Q. Abu Al-haija,et al.  Attack-Aware IoT Network Traffic Routing Leveraging Ensemble Learning , 2021, Sensors.

[7]  Sajjad Shaukat Jamal,et al.  A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT , 2021, Sensors.

[8]  William J. Buchanan,et al.  An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks , 2021, Sensors.

[9]  Qasem Abu Al-Haija,et al.  An Efficient Deep Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks , 2020, Electronics.

[10]  P. A. Lyakhov,et al.  Application of the residue number system to reduce hardware costs of the convolutional neural network implementation , 2020, Math. Comput. Simul..

[11]  C. C. Sobin,et al.  A Survey on Architecture, Protocols and Challenges in IoT , 2020, Wireless Personal Communications.

[12]  Qusay H. Mahmoud,et al.  A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks , 2020, Canadian Conference on AI.

[13]  P. Orson,et al.  Embedding spheres in knot traces , 2020, Compositio Mathematica.

[14]  Eric Gamess,et al.  An Evaluation of Machine Learning-based Anomaly Detection in a SCADA System Using the Modbus Protocol , 2020, ACM Southeast Regional Conference.

[15]  S Smys,et al.  Anomalies Detection in Fog Computing Architectures Using Deep Learning , 2020 .

[16]  P. Tiwari,et al.  Internet of Things is a revolutionary approach for future technology enhancement: a review , 2019, Journal of Big Data.

[17]  Jiankun Hu,et al.  A holistic review of Network Anomaly Detection Systems: A comprehensive survey , 2019, J. Netw. Comput. Appl..

[18]  Joe Cunningham,et al.  The industrial internet of things (IIoT): An analysis framework , 2018, Comput. Ind..

[19]  Hans D. Schotten,et al.  Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set , 2018, ARES.

[20]  Song Han,et al.  Industrial Internet of Things: Challenges, Opportunities, and Directions , 2018, IEEE Transactions on Industrial Informatics.

[21]  Tanweer Alam,et al.  A Reliable Communication Framework and its Use in Internet of Things (Iot) , 2018 .

[22]  Sean Carlisto de Alvarenga,et al.  A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..

[23]  Wenpeng Yin,et al.  Comparative Study of CNN and RNN for Natural Language Processing , 2017, ArXiv.

[24]  Elisa Bertino,et al.  Internet of Things (IoT) , 2016, ACM Trans. Internet Techn..

[25]  Nour Moustafa,et al.  UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).

[26]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[27]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[28]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[29]  Geoffrey E. Hinton,et al.  Improving neural networks by preventing co-adaptation of feature detectors , 2012, ArXiv.

[30]  Thomas Morris,et al.  A testbed for SCADA control system cybersecurity research and pedagogy , 2011, CSIIRW '11.

[31]  Dony Ariyus,et al.  Intrusion Detection System (IDS) , 2010 .

[32]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[33]  Jürgen Schmidhuber,et al.  Long Short-Term Memory , 1997, Neural Computation.

[34]  D. Hubel,et al.  Receptive fields and functional architecture of monkey striate cortex , 1968, The Journal of physiology.

[35]  Zahir Tari,et al.  TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems , 2020, IEEE Access.

[36]  Qian Chen,et al.  Chapter Three - Toward realizing self-protecting healthcare information systems: Design and security challenges , 2019, Adv. Comput..

[37]  Ali A. Ghorbani,et al.  Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.

[38]  Jean-Marie Flaus,et al.  A Deep Learning Approach for Intrusion Detection System in Industry Network , 2018, BDCSIntell.

[39]  Yoav Goldberg Neural Network Methods for Natural Language Processing , 2017 .

[40]  José M. Fernandez,et al.  Providing SCADA Network Data Sets for Intrusion Detection Research , 2016, CSET @ USENIX Security Symposium.