4.6 Article

A novel method to detect cyber-attacks in IoT/IIoT devices on the modbus protocol using deep learning

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

An IoT-Centric Data Protection Method for Preserving Security and Privacy in Cloud

Rishabh Gupta et al.

Summary: The article proposes a secure data protection method for preserving privacy in the cloud environment by partitioning, decrypting, and analyzing data, improving the model's efficiency and system security.

IEEE SYSTEMS JOURNAL (2023)

Article Computer Science, Artificial Intelligence

Boost-Defence for resilient IoT networks: A head-to-toe approach

Qasem Abu Al-Haija et al.

Summary: The Internet of Things (IoT) is seen as a crucial technology for the development of smart cities, industries, security services, and economies. Protecting IoT networks from cyber-attacks is of utmost importance, and this study introduces a framework called Boost-Defence that uses machine learning and data engineering techniques to construct a powerful classifier for safeguarding IoT networks at different layers.

EXPERT SYSTEMS (2022)

Article Chemistry, Analytical

Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System

Muhammad Husnain et al.

Summary: In this paper, a MQTT parsing engine is designed and developed to serve as an initial layer in network-based IDS for extensive checking of IoT protocol vulnerabilities and improper usage. By rigorously validating packet fields, the proposed solution effectively detects and prevents the exploitation of vulnerabilities on IoT protocols.

SENSORS (2022)

Article Chemistry, Analytical

Attack-Aware IoT Network Traffic Routing Leveraging Ensemble Learning

Qasem Abu Al-Haija et al.

Summary: In this paper, a machine-learning-based NIDS is designed and evaluated in IoT networks. The study finds that ensemble methods provide better accuracy and lower error rates, while neural network methods offer the highest inference speed. Additionally, the comparison with state-of-the-art solutions demonstrates a 1~20% improvement in the best results achieved in this study.

SENSORS (2022)

Article Computer Science, Hardware & Architecture

Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection

Janmenjoy Nayak et al.

Summary: The Internet of Medical Things (IoMT) is revolutionizing the healthcare industry by integrating medical devices and sensors to improve personalized healthcare services. However, the widespread use of these devices raises concerns about security and data privacy.

JOURNAL OF SUPERCOMPUTING (2022)

Article Chemistry, Multidisciplinary

IoT Intrusion Detection Using Machine Learning with a Novel High Performing Feature Selection Method

Khalid Albulayhi et al.

Summary: This paper proposes a novel feature selection and extraction approach for IoT intrusion detection systems. The approach utilizes entropy-based methods and mathematical set theory to extract the best features, and achieves a very high classification accuracy in testing.

APPLIED SCIENCES-BASEL (2022)

Article Telecommunications

ELBA-IoT: An Ensemble Learning Model for Botnet Attack Detection in IoT Networks

Qasem Abu Al-Haija et al.

Summary: In this paper, we propose an ensemble learning model called ELBA-IoT for botnet attack detection in IoT networks. The experimental results demonstrate that ELBA-IoT can detect botnet attacks with high accuracy and low overhead, outperforming other state-of-the-art techniques.

JOURNAL OF SENSOR AND ACTUATOR NETWORKS (2022)

Article Chemistry, Analytical

An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks

Andrew Churcher et al.

Summary: In recent years, there has been a significant increase in IoT devices and generated data, leading to potential security vulnerabilities. Traditional IDS struggle to efficiently handle the growing number of network attacks. This study focuses on the application of machine learning methods in IDS.

SENSORS (2021)

Review Chemistry, Analytical

A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT

Muhammad Almas Khan et al.

Summary: This paper proposed a Deep Neural Network (DNN) for intrusion detection in MQTT-based protocol and compared its performance with traditional machine learning algorithms. Results showed that the DNN model achieved high accuracy in both binary and multi-label classification on different datasets.

SENSORS (2021)

Article Telecommunications

A Survey on Architecture, Protocols and Challenges in IoT

C. C. Sobin

WIRELESS PERSONAL COMMUNICATIONS (2020)

Article Automation & Control Systems

Increasing the Trustworthiness in the Industrial IoT Networks Through a Reliable Cyberattack Detection Model

Mohammad Mehedi Hassan et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic

Mahdis Saharkhizan et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

An Efficient Deep-Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks

Qasem Abu Al-Haija et al.

ELECTRONICS (2020)

Proceedings Paper Computer Science, Theory & Methods

An Evaluation of Machine Learning-based Anomaly Detection in a SCADA System Using the Modbus Protocol

Brandon Phillips et al.

ACMSE 2020: PROCEEDINGS OF THE 2020 ACM SOUTHEAST CONFERENCE (2020)

Article Computer Science, Information Systems

TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems

Abdullah Alsaedi et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems

Hanan Hindy et al.

IEEE ACCESS (2020)

Review Computer Science, Hardware & Architecture

A holistic review of Network Anomaly Detection Systems: A comprehensive survey

Nour Moustafa et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Proceedings Paper Computer Science, Hardware & Architecture

A Configurable Distributed Data Analytics Infrastructure for the Industrial Internet of Things

Nikos Kefalakis et al.

2019 15TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS) (2019)

Proceedings Paper Computer Science, Theory & Methods

Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set

Simon Duque Anton et al.

13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018) (2019)

Review Computer Science, Theory & Methods

Internet of Things is a revolutionary approach for future technology enhancement: a review

Sachin Kumar et al.

JOURNAL OF BIG DATA (2019)

Proceedings Paper Computer Science, Theory & Methods

Performance evaluation of full-cloud and edge-cloud architectures for Industrial IoT anomaly detection based on deep learning

P. Ferrari et al.

2019 IEEE INTERNATIONAL WORKSHOP ON METROLOGY FOR INDUSTRY 4.0 AND INTERNET OF THINGS (METROIND4.0&IOT) (2019)

Article Computer Science, Interdisciplinary Applications

The industrial internet of things (IIoT): An analysis framework

Hugh Boyes et al.

COMPUTERS IN INDUSTRY (2018)

Article Automation & Control Systems

Industrial Internet of Things: Challenges, Opportunities, and Directions

Emiliano Sisinni et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Proceedings Paper Computer Science, Theory & Methods

IoT Architectural Framework: Connection and Integration Framework for IoT Systems

Onoriode Uviase et al.

ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE (2018)

Review Computer Science, Hardware & Architecture

A survey of intrusion detection in Internet of Things

Bruno Bogaz Zarpelao et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Automation & Control Systems

Internet of Things in Industries: A Survey

Li Da Xu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)

Article Computer Science, Information Systems

SVELTE: Real-time intrusion detection in the Internet of Things

Shahid Raza et al.

AD HOC NETWORKS (2013)