Leevy et al., 2022 - Google Patents
Iot attack prediction using big bot-iot dataLeevy et al., 2022
- Document ID
- 9444667543687325490
- Author
- Leevy J
- Khoshgoftaar T
- Hancock J
- Publication year
- Publication venue
- International Journal of Internet of Things and Cyber-Assurance
External Links
Snippet
Bot-IoT is a recent and publicly available dataset that depicts attack traffic launched by BotNets against internet of things (IoT) networks. Normal (non-attack) traffic is represented by over 9,000 of the approximately 73,000,000 instances of big data that constitute this …
- 238000003066 decision tree 0 abstract description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Salo et al. | Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection | |
Mustapha et al. | Detecting DDoS attacks using adversarial neural network | |
Alrawashdeh et al. | Toward an online anomaly intrusion detection system based on deep learning | |
Belouch et al. | A two-stage classifier approach using reptree algorithm for network intrusion detection | |
Lison et al. | Automatic detection of malware-generated domains with recurrent neural models | |
Tesfahun et al. | Intrusion detection using random forests classifier with SMOTE and feature reduction | |
Wanjau et al. | SSH-brute force attack detection model based on deep learning | |
Sarraf | Analysis and detection of ddos attacks using machine learning techniques | |
Al Nuaimi et al. | A comparative evaluation of intrusion detection systems on the edge-IIoT-2022 dataset | |
Leevy et al. | Detecting information theft attacks in the bot-iot dataset | |
Ghosh et al. | Proposed GA-BFSS and logistic regression based intrusion detection system | |
Baich et al. | Machine Learning for IoT based networks intrusion detection: a comparative study | |
Iqbal et al. | A classification framework to detect DoS attacks | |
Leevy et al. | Iot attack prediction using big bot-iot data | |
Rastogi et al. | An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset | |
Salau et al. | Evaluation of Bernoulli Naive Bayes model for detection of distributed denial of service attacks | |
Zhang et al. | Novel DDoS Feature Representation Model Combining Deep Belief Network and Canonical Correlation Analysis. | |
Alani et al. | Explainable ensemble-based detection of cyber attacks on internet of medical things | |
Kumbhar et al. | Advance model for ransomware attacking data classification and prediction using ai | |
Padhiar et al. | Performance evaluation of botnet detection using machine learning techniques | |
Leevy et al. | Feature evaluation for IoT botnet traffic classification | |
Lin et al. | Covert timing channel detection based on isolated binary trees | |
Leevy et al. | Using random undersampling and ensemble feature selection for iot attack prediction | |
Dash et al. | Anomaly detection in IoT network by using multi-class adaptive boosting classifier | |
Jyothsna et al. | A Novel Machine Learning Approach to Detect Application Layer DDoS Attacks |