DeepDCA: Novel Network-Based Detection of IoT Attacks Using Artificial Immune System
暂无分享,去创建一个
Abdullah Al-Barakati | Li Cheng | Bander A. Alzahrani | Sahar Aldhaheri | Daniyal M. Alghazzawi | D. Alghazzawi | A. Al-Barakati | B. Alzahrani | Sahar Aldhaheri | Li Cheng
[1] Uwe Aickelin,et al. The Danger Theory and Its Application to Artificial Immune Systems , 2008, ArXiv.
[2] Shan Suthaharan,et al. Big data classification: problems and challenges in network intrusion prediction with machine learning , 2014, PERV.
[3] Sean Carlisto de Alvarenga,et al. A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..
[4] Maciej Brzozowski,et al. Immune Approach to the Protection of IoT Devices , 2016, FDSE.
[5] Maurizio A. Spirito,et al. DEMO: An IDS framework for internet of things empowered by 6LoWPAN , 2013, CCS.
[6] Albert C. Esterline,et al. Behavioral Modeling Intrusion Detection System (BMIDS) Using Internet of Things (IoT) Behavior-Based Anomaly Detection via Immunity-Inspired Algorithms , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).
[7] Zied Elouedi,et al. A survey of the dendritic cell algorithm , 2015, Knowledge and Information Systems.
[8] Muddassar Farooq,et al. A sense of danger: dendritic cells inspired artificial immune system for manet security , 2008, GECCO '08.
[9] Jinquan Zeng,et al. Research on immunity-based intrusion detection technology for the Internet of Things , 2011, 2011 Seventh International Conference on Natural Computation.
[10] Chen Jun,et al. Design of Complex Event-Processing IDS in Internet of Things , 2014, 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation.
[11] Pascal Bouvry,et al. Anomaly detection in TCP/IP networks using immune systems paradigm , 2007, Comput. Commun..
[12] Alex Alves Freitas,et al. An Artificial Immune System for Fuzzy-Rule Induction in Data Mining , 2004, PPSN.
[13] Amarsinh Vidhate,et al. Security attacks in IoT: A survey , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).
[14] Elena Sitnikova,et al. Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset , 2018, Future Gener. Comput. Syst..
[15] AirehrourDavid,et al. Secure routing for internet of things , 2016 .
[16] Yongsheng Ding,et al. Efficient service request detection algorithm based on hormone regulation mechanism in the Internet of things , 2013 .
[17] P. Matzinger. Tolerance, danger, and the extended family. , 1994, Annual review of immunology.
[18] Joarder Kamruzzaman,et al. A novel Ensemble of Hybrid Intrusion Detection System for Detecting Internet of Things Attacks , 2019, Electronics.
[19] Munam Ali Shah,et al. IoT based ransomware growth rate evaluation and detection using command and control blacklisting , 2017, 2017 23rd International Conference on Automation and Computing (ICAC).
[20] Caiming Liu,et al. Artificial Immunity-based Security Response Model for the Internet of Things , 2013, J. Comput..
[21] Peter Ross,et al. Producing robust schedules via an artificial immune system , 1998, 1998 IEEE International Conference on Evolutionary Computation Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98TH8360).
[22] Jonathan Timmis,et al. Theoretical advances in artificial immune systems , 2008, Theor. Comput. Sci..
[23] Alper Döyen,et al. A new approach to solve hybrid flow shop scheduling problems by artificial immune system , 2004, Future Gener. Comput. Syst..
[24] Muddassar Farooq,et al. BeeAIS: Artificial Immune System Security for Nature Inspired, MANET Routing Protocol, BeeAdHoc , 2007, ICARIS.
[25] Jaime Lloret,et al. Network Traffic Classifier With Convolutional and Recurrent Neural Networks for Internet of Things , 2017, IEEE Access.
[26] Michele Nogueira Lima,et al. Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).
[27] Longfei Wu,et al. A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.
[28] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[29] Peter J. Bentley,et al. Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator , 2001, Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No.01TH8546).
[30] Larissa V Furtado,et al. Do Circulating Tumor Cells, Exosomes, and Circulating Tumor Nucleic Acids Have Clinical Utility?: A Report of the Association for Molecular Pathology. , 2015, The Journal of molecular diagnostics : JMD.
[31] Xinzheng Dong,et al. Application of dynamic variable cipher security certificate in Internet of Things , 2012, 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems.
[32] P. Matzinger. The Danger Model: A Renewed Sense of Self , 2002, Science.
[33] Kashif Saleem,et al. An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARP , 2011, CISIS.
[34] Run Chen,et al. A Security Situation Sense Model Based on Artificial Immune System in the Internet of Things , 2011 .
[35] Roksana Boreli,et al. An experimental study of security and privacy risks with emerging household appliances , 2014, 2014 IEEE Conference on Communications and Network Security.
[36] Sayan Kumar Ray,et al. Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..
[37] Anthony Skjellum,et al. Using machine learning to secure IoT systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[38] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[39] Daniyal M. Alghazzawi,et al. Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research , 2020, J. Netw. Comput. Appl..
[40] Gregg H. Gunsch,et al. An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..
[41] Georgios Kambourakis,et al. DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.
[42] Mohsen Guizani,et al. The rise of ransomware and emerging security challenges in the Internet of Things , 2017, Comput. Networks.
[43] Maurizio A. Spirito,et al. Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[44] Nour Moustafa,et al. Identification of malicious activities in industrial internet of things based on deep learning models , 2018, J. Inf. Secur. Appl..
[45] Ainuddin Wahid Abdul Wahab,et al. A Lightweight Perceptron-Based Intrusion Detection System for Fog Computing , 2019, Applied Sciences.
[46] Ying Tan,et al. Recentness biased learning for time series forecasting , 2013, Inf. Sci..
[47] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[48] Yoshiki Uchikawa,et al. Emergent construction of artificial immune networks for autonomous mobile robots , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.
[49] Alex Alves Freitas,et al. Revisiting the Foundations of Artificial Immune Systems for Data Mining , 2007, IEEE Transactions on Evolutionary Computation.
[50] Sudipta Mahapatra,et al. A comparative analysis of machine learning techniques for botnet detection , 2017, SIN.
[51] Ying Tan,et al. An Intelligent Multifeature Statistical Approach for the Discrimination of Driving Conditions of a Hybrid Electric Vehicle , 2011, IEEE Transactions on Intelligent Transportation Systems.
[52] Joonsang Baek,et al. Lightweight Encryption for Smart Home , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).
[53] Ruben E. Perez,et al. Coupled Optimization of Aircraft Families and Fleet Allocation for Multiple Markets , 2016 .
[54] Yaochu Jin,et al. Immune-Endocrine System Inspired Hierarchical Coevolutionary Multiobjective Optimization Algorithm for IoT Service , 2020, IEEE Transactions on Cybernetics.
[55] Yuval Elovici,et al. Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots , 2019, CODASPY.
[56] Robert C. Atkinson,et al. Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).
[57] Amparo Alonso-Betanzos,et al. Conversion methods for symbolic features: A comparison applied to an intrusion detection problem , 2009, Expert Syst. Appl..
[58] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[59] Carlos A. Coello Coello,et al. Solving Multiobjective Optimization Problems Using an Artificial Immune System , 2005, Genetic Programming and Evolvable Machines.
[60] A. C. Zambroni de Souza,et al. Artificial Immune Systems Optimization Approach for Multiobjective Distribution System Reconfiguration , 2015, IEEE Transactions on Power Systems.