Exploring placement of intrusion detection systems in rpl-based internet of things
暂无分享,去创建一个
[1] Ali Seyfollahi,et al. A Review of Intrusion Detection Systems in RPL Routing Protocol Based on Machine Learning for Internet of Things Applications , 2021, Wirel. Commun. Mob. Comput..
[2] Naghmeh Moradpoor,et al. Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset , 2020, Secur. Commun. Networks.
[3] Abhishek Verma,et al. Mitigation of DIS flooding attacks in RPL‐based 6LoWPAN networks , 2019, Trans. Emerg. Telecommun. Technol..
[4] Virender Ranga,et al. ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things , 2019, 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU).
[5] L Arockiam,et al. E2V: Techniques for Detecting and Mitigating Rank Inconsistency Attack (RInA) in RPL based Internet of Things , 2018, Journal of Physics: Conference Series.
[6] Abdur Rehman,et al. Detection of rank attack in routing protocol for Low Power and Lossy Networks , 2018, Ann. des Télécommunications.
[7] Ashwini Nikam,et al. Opinion Metric Based Intrusion Detection Mechanism for RPL Protocol in IoT , 2018, 2018 3rd International Conference for Convergence in Technology (I2CT).
[8] Ismail Ahmedy,et al. Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol , 2018, IEEE Access.
[9] David E. Culler,et al. Challenging the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL): A Survey , 2017, IEEE Communications Surveys & Tutorials.
[10] Prachi Shukla,et al. ML-IDS: A machine learning approach to detect wormhole attacks in Internet of Things , 2017, 2017 Intelligent Systems Conference (IntelliSys).
[11] Mansour Sheikhan,et al. A Security Mechanism for Detecting Intrusions in Internet of Things Using Selected Features Based on MI-BGSA , 2017 .
[12] Isabelle Chrisment,et al. A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-Based Networks , 2017, IEEE Transactions on Network and Service Management.
[13] Imed Romdhani,et al. A Trust-Based Intrusion Detection System for Mobile RPL Based Networks , 2017, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[14] Sean Carlisto de Alvarenga,et al. A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..
[15] Peter Herrmann,et al. A Trust Based Distributed Intrusion Detection Mechanism for Internet of Things , 2017, 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA).
[16] Mansour Sheikhan,et al. Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach , 2017, Comput. Commun..
[17] Abbas Javed,et al. Intelligent Intrusion Detection in Low-Power IoTs , 2016, ACM Trans. Internet Techn..
[18] Sayan Kumar Ray,et al. Securing RPL routing protocol from blackhole attacks using a trust-based mechanism , 2016, 2016 26th International Telecommunication Networks and Applications Conference (ITNAC).
[19] Jonathan Loo,et al. A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology , 2016, Inf..
[20] Remi Badonnel,et al. A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..
[21] Sema F. Oktug,et al. RPL version number attacks: In-depth study , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
[22] Remi Badonnel,et al. Addressing DODAG inconsistency attacks in RPL networks , 2014, 2014 Global Information Infrastructure and Networking Symposium (GIIS).
[23] Remi Badonnel,et al. A Study of RPL DODAG Version Attacks , 2014, AIMS.
[24] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[25] Maurizio A. Spirito,et al. Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[26] Jonathan Loo,et al. The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks , 2013, IEEE Sensors Journal.
[27] Philip Levis,et al. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.
[28] Jonathan Loo,et al. Specification-based IDS for securing RPL from topology attacks , 2011, 2011 IFIP Wireless Days (WD).
[29] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[30] Adam Dunkels,et al. Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[31] L. Breiman. Random Forests , 2001, Encyclopedia of Machine Learning and Data Mining.
[32] Selim Yılmaz,et al. Analysis of RPL Objective Functions with Security Perspective , 2022, SENSORNETS.
[33] Emre Aydogan,et al. A Transfer Learning Approach for Securing Resource-Constrained IoT Devices , 2021, IEEE Transactions on Information Forensics and Security.
[34] Sevil Sen,et al. A Cross-Layer Intrusion Detection System for RPL-Based Internet of Things , 2020, ADHOC-NOW.