[go: up one dir, main page]

Dai et al., 2025 - Google Patents

A Survey of Explainable Intrusion Detection Systems in IoT Networks

Dai et al., 2025

Document ID
9868300771981460890
Author
Dai J
Huang J
Jiang Y
Gyawali S
Zhong F
Publication year
Publication venue
International Symposium on Intelligent Computing and Networking

External Links

Snippet

Abstract The Internet of Things (IoT), a network of interconnected devices enabling seamless data sharing, has seen widespread adoption driven by the increasing reliance on smart technologies. However, this rapid growth introduces significant security vulnerabilities …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
    • G06F15/163Interprocessor communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls

Similar Documents

Publication Publication Date Title
Oseni et al. An explainable deep learning framework for resilient intrusion detection in IoT-enabled transportation networks
Singh Enhancing Cloud Security Posture with AI-Driven Threat Detection and Response Mechanisms
Eid et al. Comparative study of ML models for IIoT intrusion detection: impact of data preprocessing and balancing
Abu Al‐Haija et al. Boost‐defence for resilient IoT networks: A head‐to‐toe approach
Harahsheh et al. A survey of using machine learning in IoT security and the challenges faced by researchers
Masud et al. Explainable artificial intelligence for resilient security applications in the Internet of Things
Yi et al. A deep and systematic review of the intrusion detection systems in the fog environment
Castro et al. Comprehensive survey on AI-based technologies for enhancing IoT privacy and security: Trends, challenges, and solutions
Patil et al. KS-DDoS: Kafka streams-based classification approach for DDoS attacks
Alemerien et al. Towards optimized machine-learning-driven intrusion detection for Internet of Things applications
Dandapat et al. Design of intrusion detection system using GA and CNN for MQTT-based IoT networks
Saied et al. Explainable artificial intelligence for botnet detection in internet of things
Shukla et al. Distributed ensemble method using deep learning to detect DDoS attacks in IoT networks
Bhavsar et al. Intrusion-based attack detection using machine learning techniques for connected autonomous vehicle
Čisar et al. Machine Learning Aspects of Internet Firewall Data
Rahim et al. Integrating contextual intelligence with mixture of experts for signature and anomaly-based intrusion detection in CPS security
Kant et al. Cyber Threat Intelligence (CTI): an analysis on the use of artificial intelligence and machine learning to identify cyber hazards
Dai et al. A Survey of Explainable Intrusion Detection Systems in IoT Networks
Wahab et al. The significance of artificial intelligence in cybersecurity
Jemili et al. Active intrusion detection and prediction based on temporal big data analytics
AboulEla et al. Leveraging large language models, graph neural networks, and explainable AI for revolutionizing the next-generation network intrusion detection systems
Dhrir et al. Machine learning-and deep learning-based anomaly detection in firewalls: a survey
Akinsola et al. Application of Artificial Intelligence for DDoS Attack Detection and Prevention on Cyber Physical Systems Using Deep Learning
Kumar et al. Integration of Big Data and IoT in the Modern Era
Abie et al. Adaptive security and trust management for autonomous messaging systems