Acceso abierto

Application of IoT technology in cyber security prevention system

, , ,  y   
03 sept 2024

Cite
Descargar portada

Jeeshitha, J., & Ramakoteswararao, G. (2022). Extensive study on ddosbotnet attacks in multiple environments using deep learning and machine learning techniques. ECS transactions(1), 107. Search in Google Scholar

Dao, N. N., Phan, T. V., Ad, U. S., Kim, J., Bauschert, T., & Cho, S. (2017). Securing heterogeneous iot with intelligent ddos attack behavior learning. IEEE Communications Magazine. Search in Google Scholar

Febro, A., Xiao, H., Spring, J., & Christianson, B. (2022). Edge security for sip-enabled iot devices with p4. Computer networks(Feb.11), 203. Search in Google Scholar

Gao, J. (2017). A support vector machine model for computer network security technology. Boletin Tecnico/Technical Bulletin, 55(12), 564-568. Search in Google Scholar

Aoudni, Y., Donald, C., Farouk, A., Sahay, K. B., Babu, D. V., & Tripathi, V., et al. (2022). Cloud security based attack detection using transductive learning integrated with hidden markov model. Pattern recognition letters(May), 157. Search in Google Scholar

Midi, Daniele, Sultana, Salmin, Bertino, & Elisa. (2017). A system for response and prevention of security incidents in wireless sensor networks. ACM transactions on sensor networks, 13(1), 1.1. Search in Google Scholar

Liu, T., Liu, Y., Liu, J., Wang, L., Xu, L., & Qiu, G., et al. (2020). A bayesian learning based scheme for online dynamic security assessment and preventive control. IEEE Transactions on Power Systems, 35(5), 4088-4099. Search in Google Scholar

Bulrajoul, W., James, A., & Shaikh, S. (2019). A new architecture for network intrusion detection and prevention. IEEE Access, 1-1. Search in Google Scholar

Zardari, Z. A., He, J., Pathan, M. S., & Zhu, N. (2021). Detection and prevention of jellyfish attacks using knn algorithm and trusted routing scheme in manet. International Journal of Network Security. Search in Google Scholar

Farhaoui, Y. (2017). Design and implementation of an intrusion prevention system. International Journal of Network Security, 19. Search in Google Scholar

Sedjelmaci, H., & Senouci, S. M. (2018). Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution. The Journal of Supercomputing, 74(5). Search in Google Scholar

Ribeiro, J., Saghezchi, F. B., Mantas, G., Rodriguez, J., & Abd-Alhameed, R. A. (2020). Hidroid: prototyping a behavioral host-based intrusion detection and prevention system for android. IEEE Access, PP(99), 1-1. Search in Google Scholar

Hijazi, S., & Obaidat, M. S. (2019). A new detection and prevention system for arp attacks using static entry. IEEE Systems Journal, PP(3), 1-7. Search in Google Scholar

Chountasis, S., Pappas, D., & Sklavounos, D. (2020). Network intrusion detection method based on matrix factorization of their time and frequency representations. ETRI Journal. Search in Google Scholar

Yoo, S., Jo, J., Kim, B., & Seo, J. (2020). Hyperion: a visual analytics tool for an intrusion detection and prevention system. IEEE Access, PP(99), 1-1. Search in Google Scholar

Haseeb, K., Islam, N., Almogren, A., & Din, I. U. (2019). Intrusion prevention framework for secure routing in wsn-based mobile internet of things. IEEE Access, PP(99), 1-1. Search in Google Scholar

Meng, Y., Qin, T., Liu, Y., & He, C. (2018). An effective high threating alarm mining method for cloud security management. IEEE Access, PP(99), 1-1. Search in Google Scholar

Rongrong, X., Xiaochun, Y., & Zhiyu, H. (2019). Framework for risk assessment in cyber situational awareness. IET Information Security, 13(2), 149-156. Search in Google Scholar

Zhuotao, L., Hao, J., Yih-Chun, H., & Michael, B. (2018). Practical proactive ddos-attack mitigation via endpoint-driven in-network traffic control. IEEE/ACM Transactions on Networking, 26, 1948-1961. Search in Google Scholar

Sou, S. I., & Lin, C. S. (2017). Random packet inspection scheme for network intrusion prevention in lte core networks. IEEE Transactions on Vehicular Technology, PP(9), 1-1. Search in Google Scholar

Wanjau, S. K., Wambugu, G. M., Oirere, A. M., & Muketha, G. M. (2024). Discriminative spatial-temporal feature learning for modeling network intrusion detection systems. Journal of computer security(1), 32. Search in Google Scholar

Chen, G., Zhou, K., Peng, Y., Zhou, L., & Zhang, Y. (2021). A novel network intrusion prevention system based on android platform. International Journal of Internet Protocol Technology, 14(2), 67. Search in Google Scholar

Ali, A., & Yousaf, M. M. (2020). Novel three-tier intrusion detection and prevention system in software defined network. IEEE Access, PP(99), 1-1. Search in Google Scholar

Sajan, R. I., & Jasper, J. (2020). Trust‐based secure routing and the prevention of vampire attack in wireless ad hoc sensor network. International Journal of Communication Systems, 33(8). Search in Google Scholar

Bakhsh, S. T., Alghamdi, S., Alsemmeari, R. A., & Hassan, S. R. (2019). An adaptive intrusion detection and prevention system for internet of things. International Journal of Distributed Sensor Networks, 15(11), 155014771988810. Search in Google Scholar

Parsamehr, R., Esfahani, A., Mantas, G., Radwan, A., & Martinez-Ortega, J. F. (2019). A novel intrusion detection and prevention scheme for network coding-enabled mobile small cells. IEEE Transactions on Computational Social Systems, PP(99), 1-11. Search in Google Scholar

Lawaniya, H. (2020). What is network security, types of network security and prevention of devices in a network. Network Security. Search in Google Scholar

Liu, A. X., & Norige, E. (2019). A de-compositional approach to regular expression matching for network security. IEEE/ACM Transactions on Networking, PP(99), 1-13. Search in Google Scholar

Sarela, M., Kyostila, T., Kiravuo, T., & Manner, J. (2017). Evaluating intrusion prevention systems with evasions. International Journal of Communication Systems, 30(16), e3339.1-e3339.15. Search in Google Scholar

Islabudeen, M., & Devi, M. K. K. (2020). A smart approach for intrusion detection and prevention system in mobile ad hoc networks against security attacks. Wireless Personal Communications, 112(1), 193-224. Search in Google Scholar

Qaddoori, S. L., & Ali, Q. I. (2022). An embedded intrusion detection and prevention system for home area networks in advanced metering infrastructure. IET Information Security. Search in Google Scholar

Dangi, R., Jadhav, A., Choudhary, G., Dragoni, N., Mishra, M. K., & Lalwani, P. (2022). Ml-based 5g network slicing security: a comprehensive survey. Future Internet, 14. Search in Google Scholar

Al-Ayed, F., Hu, C., & Liu, H. (2018). An efficient practice of privacy implementation: kerberos and markov chain to secure file transfer sessions. International Journal of Network Security, 20(4), 655-663. Search in Google Scholar

Kalaichelvi V.,Vimala Devi P.,Meenakshi P.,Swaminathan S. & Suganya S.(2022).Design of digital image encryption based on elliptic curve cryptography (ECC) algorithm and Radix-64 conversion.Journal of Intelligent Fuzzy Systems(5),6697-6708. Search in Google Scholar

Ghadi Yazeed Yasin,Akhter Israr,Aljuaid Hanan,Gochoo Munkhjargal,Alsuhibany Suliman A.,Jalal Ahmad & Park Jeongmin.(2022).Extrinsic Behavior Prediction of Pedestrians via Maximum Entropy Markov Model and Graph-Based Features Mining.Applied Sciences(12),5985-5985. Search in Google Scholar

Bin Li.(2023).Optimisation of UCB algorithm based on cultural content orientation of film and television in the digital era.International Journal of Networking and Virtual Organisations(2-4),265-280. Search in Google Scholar

Sandesh Achar, Nuruzzaman Faruqui, Md Whaiduzzaman, Albara Awajan & Moutaz Alazab.(2023). Cyber-Physical System Security Based on Human Activity Recognition through IoT Cloud Computing. Electronics(8), Search in Google Scholar

YALÇINKAYA Fikret, AYDİLEK Hüseyin, ERTEN Mustafa Yasin & İNANÇ Nihat.(2020).IoT based Smart Home Testbed using MQTT Communication Protocol.Uluslararası Muhendislik Arastirma ve Gelistirme Dergisi317-317. Search in Google Scholar