Dai et al., 2025 - Google Patents
A Survey of Explainable Intrusion Detection Systems in IoT NetworksDai et al., 2025
- Document ID
- 9868300771981460890
- Author
- Dai J
- Huang J
- Jiang Y
- Gyawali S
- Zhong F
- Publication year
- Publication venue
- International Symposium on Intelligent Computing and Networking
External Links
Snippet
Abstract The Internet of Things (IoT), a network of interconnected devices enabling seamless data sharing, has seen widespread adoption driven by the increasing reliance on smart technologies. However, this rapid growth introduces significant security vulnerabilities …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
- G06F15/163—Interprocessor communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Oseni et al. | An explainable deep learning framework for resilient intrusion detection in IoT-enabled transportation networks | |
| Singh | Enhancing Cloud Security Posture with AI-Driven Threat Detection and Response Mechanisms | |
| Eid et al. | Comparative study of ML models for IIoT intrusion detection: impact of data preprocessing and balancing | |
| Abu Al‐Haija et al. | Boost‐defence for resilient IoT networks: A head‐to‐toe approach | |
| Harahsheh et al. | A survey of using machine learning in IoT security and the challenges faced by researchers | |
| Masud et al. | Explainable artificial intelligence for resilient security applications in the Internet of Things | |
| Yi et al. | A deep and systematic review of the intrusion detection systems in the fog environment | |
| Castro et al. | Comprehensive survey on AI-based technologies for enhancing IoT privacy and security: Trends, challenges, and solutions | |
| Patil et al. | KS-DDoS: Kafka streams-based classification approach for DDoS attacks | |
| Alemerien et al. | Towards optimized machine-learning-driven intrusion detection for Internet of Things applications | |
| Dandapat et al. | Design of intrusion detection system using GA and CNN for MQTT-based IoT networks | |
| Saied et al. | Explainable artificial intelligence for botnet detection in internet of things | |
| Shukla et al. | Distributed ensemble method using deep learning to detect DDoS attacks in IoT networks | |
| Bhavsar et al. | Intrusion-based attack detection using machine learning techniques for connected autonomous vehicle | |
| Čisar et al. | Machine Learning Aspects of Internet Firewall Data | |
| Rahim et al. | Integrating contextual intelligence with mixture of experts for signature and anomaly-based intrusion detection in CPS security | |
| Kant et al. | Cyber Threat Intelligence (CTI): an analysis on the use of artificial intelligence and machine learning to identify cyber hazards | |
| Dai et al. | A Survey of Explainable Intrusion Detection Systems in IoT Networks | |
| Wahab et al. | The significance of artificial intelligence in cybersecurity | |
| Jemili et al. | Active intrusion detection and prediction based on temporal big data analytics | |
| AboulEla et al. | Leveraging large language models, graph neural networks, and explainable AI for revolutionizing the next-generation network intrusion detection systems | |
| Dhrir et al. | Machine learning-and deep learning-based anomaly detection in firewalls: a survey | |
| Akinsola et al. | Application of Artificial Intelligence for DDoS Attack Detection and Prevention on Cyber Physical Systems Using Deep Learning | |
| Kumar et al. | Integration of Big Data and IoT in the Modern Era | |
| Abie et al. | Adaptive security and trust management for autonomous messaging systems |