4.6 Article

Asynchronous Peer-to-Peer Federated Capability-Based Targeted Ransomware Detection Model for Industrial IoT

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of Things

Muna Al-Hawawreh et al.

Summary: The Industrial Internet of Things (IIoT) is a high-value target for cyber attacks, and developing security solutions that fit its requirements is challenging due to the lack of accurate data. To address this, we propose X-IIoTID, an intrusion data set for IIoT that includes multi-view features of connectivity protocols, device activities, attack types, and protocols.

IEEE INTERNET OF THINGS JOURNAL (2022)

Review Computer Science, Artificial Intelligence

Internet of things and ransomware: Evolution, mitigation and prevention

Mamoona Humayun et al.

Summary: Internet of things architecture integrates real-world objects and places with the internet, bringing convenience to our lifestyle and making previously impossible things possible. However, IoT faces challenges, especially ransomware attacks, as technology advances.

EGYPTIAN INFORMATICS JOURNAL (2021)

Article Automation & Control Systems

Fed-IIoT: A Robust Federated Malware Detection Architecture in Industrial IoT

Rahim Taheri et al.

Summary: Fed-IIoT is a robust architecture for detecting Android malware applications in IIoT, utilizing federated learning on both participant and server sides to enhance security and privacy protection.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Information Systems

FedMCCS: Multicriteria Client Selection Model for Optimal IoT Federated Learning

Sawsan AbdulRahman et al.

Summary: This article introduces FedMCCS, a multi-criteria client selection method for addressing the issue of limited client resources leading to decreased model accuracy in federated learning. FedMCCS outperforms other approaches in reducing communication rounds, maximizing the number of clients, handling the least number of discarded rounds, and optimizing network traffic.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Artificial Intelligence

Analysis of concept drift in fake reviews detection

Rami Mohawesh et al.

Summary: Online reviews have a significant impact on decision making in society, especially in the buying and selling of goods. The truthfulness of internet reviews is crucial, as fake reviews can mislead customers and affect sales. Detection models for fake reviews are needed, but concept drift in text data streams has been shown to reduce their effectiveness. Addressing the real correlation between concept drift score and classification of performance over time in real-world data streams remains a challenge.

EXPERT SYSTEMS WITH APPLICATIONS (2021)

Article Computer Science, Artificial Intelligence

A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment

Rafal Kozik et al.

Summary: The Internet of Things (IoT) devices may expose sensitive data, highlighting the need for protection and early warning systems. This paper proposes a time window embedding solution using a core anomaly detection unit and compares it with classical machine-learning algorithms through experiments on the Aposemat IoT-23 dataset. The proposed method's effectiveness in IoT contexts is demonstrated through the evaluation of various machine-learning schemes.

PATTERN ANALYSIS AND APPLICATIONS (2021)

Article Computer Science, Information Systems

Deep Anomaly Detection for Time-Series Data in Industrial IoT: A Communication-Efficient On-Device Federated Learning Approach

Yi Liu et al.

Summary: This article proposes a communication-efficient on-device federated learning (FL)-based deep anomaly detection framework for sensing time-series data in IIoT. The framework includes an FL framework, AMCNN-LSTM model, and gradient compression mechanism, which can improve generalization ability, accurately detect anomalies, and enhance communication efficiency.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Developing a Security Testbed for Industrial Internet of Things

Muna AL-Hawawreh et al.

Summary: Achieving security for brownfield IIoT systems is a significant challenge due to their legacy devices and integration with new IoT technologies. A new generic end-to-end IIoT security testbed is proposed, which is easily reproducible and configurable for testing various security scenarios. Experiments demonstrate the effectiveness of the testbed for operation and security testing compared to existing testbeds.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Automation & Control Systems

DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems

Beibei Li et al.

Summary: The study introduces a novel federated deep learning scheme named DeepFed for detecting cyber threats against industrial CPSs. By designing a new intrusion detection model and federated learning framework, the research successfully achieves secure detection of various cyber threats.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Information Systems

MaldomDetector: A system for detecting algorithmically generated domain names with machine learning

Ahmad O. Almashhadani et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Theory & Methods

Defending network intrusion detection systems against adversarial evasion attacks

Marek Pawlicki et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Information Systems

A trusted feature aggregator federated learning for distributed malicious attack detection

Xinhong Hei et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Theory & Methods

Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications

Bryse Flowers et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Information Systems

Edge Computing in Industrial Internet of Things: Architecture, Advances and Challenges

Tie Qiu et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Information Systems

Federated Learning-Based Cognitive Detection of Jamming Attack in Flying Ad-Hoc Network

Nishat Mowla et al.

IEEE ACCESS (2020)

Article Computer Science, Hardware & Architecture

Ransomware detection and mitigation using software-defined networking: The case of WannaCry

Maxat Akbanov et al.

COMPUTERS & ELECTRICAL ENGINEERING (2019)

Article Computer Science, Information Systems

Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things

Muna Al-Hawawreh et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Proceedings Paper Computer Science, Information Systems

Black Box Attacks on Deep Anomaly Detectors

Aditya Kuppa et al.

14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019) (2019)

Proceedings Paper Engineering, Electrical & Electronic

Leveraging Deep Learning Models for Ransomware Detection in the Industrial Internet of Things Environment

Muna Al-Hawawreh et al.

2019 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS) (2019)

Article Computer Science, Information Systems

A Multi-Classifier Network-Based Crypto Ransomware Detection System: A Case Study of Locky Ransomware

Ahmad O. Almashhadani et al.

IEEE ACCESS (2019)

Article Computer Science, Hardware & Architecture

Ransomware early detection by the analysis of file sharing traffic

Daniel Morato et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Interdisciplinary Applications

An anomaly-based approach for DDoS attack detection in cloud environment

Adnan Rawashdeh et al.

INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY (2018)

Article Biophysics

A stacked contractive denoising auto-encoder for ECG signal denoising

Peng Xiong et al.

PHYSIOLOGICAL MEASUREMENT (2016)