Computer Science ›› 2024, Vol. 51 ›› Issue (8): 379-386.doi: 10.11896/jsjkx.230700197
• Information Security • Previous Articles Next Articles
CHEN Liang, LI Zhihua
CLC Number:
[1]GSM ASSOCIATION.IoT Connections Forecast:The Rise ofEnterprise[OL].https://www.gsma.com/iot/resources/iot-connections-forecast-the-riseof-enterprise. [2]ROHIT M H,FAHIM S M,KHAN A H A.Mitigating and detecting ddos attack on iot environment[C]//2019 IEEE International Conference on Robotics,Automation,Artificial-intelligence and Internet-of-Things(RAAICON).IEEE,2019:5-8. [3]DANGE S,CHATTERJEE M.IoT botnet:The largest threat to the IoT network[M]//Data Communication and Networks:Proceedings of GUCON 2019.Singapore:Springer Singapore,2019:137-157. [4]WAZZAN M,ALGAZZAWI D,ALBESHRI A,et al.CrossDeep Learning Method for Effectively Detecting the Propagation of IoT Botnet[J].Sensors,2022,22(10):3895. [5]HUSSAIN F,ABBAS S G,PIRES I M,et al.A two-fold machine learning approach to prevent and detect IoT botnet attacks[J].IEEE Access,2021,9:163412-163430. [6]BORYS A,KAMRUZZAMAN A,THAKUR H N,et al.AnEvaluation of IoT DDoS Cryptojacking Malware and Mirai Botnet[C]//2022 IEEE World AI IoT Congress(AIIoT).IEEE,2022:725-729. [7]ZHENG J,LI Q,GU G,et al.Realtime DDoS defense usingCOTS SDN switches via adaptive correlation analysis[J].IEEE Transactions on Information Forensics and Security,2018,13(7):1838-1853. [8]ZAINUDIN A,AHAKONYE L A C,AKTER R,et al.An efficient hybrid-dnn for ddos detection and classification in software-defined iiot networks[J].IEEE Internet of Things Journal,2023,10(10):8491-8504. [9]AYDIN H,ORMAN Z,AYDIN M A.A long short-term memory(LSTM)-based distributed denial of service(DDoS)detection and defense system design in public cloud network environment[J].Computers & Security,2022,118:102725. [10]DONG S,SAREM M.DDoS attack detection method based on improved KNN with the degree of DDoS attack in software-defined networks[J].IEEE Access,2019,8:5039-5048. [11]JIAN S J,LU Z G,DU D,et al.Review on network intrusion detection technology [J].Journal of Information Security,2020,5(4):96-122. [12]ALQAHTANI M,MATHKOUR H,BEN ISMAIL M M.IoT botnet attack detection based on optimized extreme gradient boosting and feature selection[J].Sensors,2020,20(21):6336. [13]ALSHAMKHANY M,ALSHAMKHANY W,MANSOUR M,et al.Botnet attack detection using machine learning[C]//2020 14th International Conference on Innovations in Information Technology(IIT).IEEE,2020:203-208. [14]WU Z J,XU Q,WANG J J,et al.Low-rate DDoS attack detection based on factorization machine in software defined network[J].IEEE Access,2020,8:17404-17418. [15]IDRISSI I,BOUKABOUS M,AZIZI M,et al.Toward a deep learning-based intrusion detection system for IoT against botnet attacks[J].IAES International Journal of Artificial Intelligence,2021,10(1):110-120. [16]RA W,UK S.Detection of IoT Botnet using Machine learning and Deep Learning Techniques[J/OL].https://doi.org/10.21203/rs.3.rs-2630988/v1. [17]TORRES P,CATANIA C,GARCIA S,et al.An analysis of recurrent neural networks for botnet detection behavior[C]//2016 IEEE Biennial Congress of Argentina(ARGENCON).IEEE,2016:1-6. [18]ALKAHTANI H,ALDHYANI T H H.Botnet attack detection by using CNN-LSTM model for Internet of Things applications[J].Security and Communication Networks,2021,2021:1-23. [19]CHAMOU D,TOUPAS P,KETZAKI E,et al.Intrusion detection system based on network traffic using deep neural networks[C]//2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks(CAMAD).IEEE,2019:1-6. [20]HE K,ZHANG X,REN S,et al.Identity mappings in deep residual networks[C]//Computer Vision-ECCV 2016:14th European Conference,Amsterdam,The Netherlands,October 11-14,2016,Proceedings,Part IV 14.Springer International Publi-shing,2016:630-645. [21]POERNOMO A,KANG D K.Biased dropout and crossmapdropout:learning towards effective dropout regularization in convolutional neural network[J].Neural Networks,2018,104:60-67. [22]WANG X,YIN S,LI H,et al.A network intrusion detectionmethod based on deep multi-scale convolutional neural network[J].International Journal of Wireless Information Networks,2020,27:503-517. [23]HE K,ZHANG X,REN S,et al.Deep residual learning forimage recognition[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2016:770-778. [24]MA W G,ZHANG Y D,GUO J.Abnormal traffic detectionmethod based on LSTM and Improved residual network optimization [J].Journal of Communications,2021,42(5):23-40. [25]LASHKARI A H,ZANG Y,OWHUO G,et al.CICFlowMeter[EB/OL].https://github.com/ahlashkari/CICFlowMeter/blob/master/ReadMe.txt,2017. [26]FIDA M A F A,AHMAD T,NTAHOBARI M.VarianceThreshold as Early Screening to Boruta Feature Selection for Intrusion Detection System[C]//2021 13th International Confe-rence on Information & Communication Technology and System(ICTS).IEEE,2021:46-50. [27]LUCKY G,JJUNJU F,MARSHALL A.A lightweight decision-tree algorithm for detecting DDoS flooding attacks[C]//2020 IEEE 20th International Conferenceon Software Quality,Reliability and Security Companion(QRS-C).IEEE,2020:382-389. [28]HUSSAIN F,ABBAS S G,HUSNAIN M,et al.IoT DoS andDDoS attack detection using ResNet[C]//2020 IEEE 23rd International Multitopic Conference(INMIC).IEEE,2020:1-6. [29]WANG X T,WANG X,SUN Z X.Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network[J].Computer Science,2022,49(8):314-322. [30]PETERSON J M,LEEVY J L,KHOSHGOFTAAR T M.A review and analysis of the bot-iot dataset[C]//2021 IEEE International Conference on Service-Oriented System Engineering(SOSE).IEEE,2021:20-27. |
[1] | WANG Xuxian, HUANG Jinhua, ZHAI You, LI Chu’nan, WANG Yu, ZHANG Yupeng, ZHANG Yipeng, YANG Liqun, LI Zhoujun. Survey of Detection Techniques for Domain Generation Algorithm [J]. Computer Science, 2024, 51(8): 371-378. |
[2] | CAO Yan, ZHU Zhenfeng. DRSTN:Deep Residual Soft Thresholding Network [J]. Computer Science, 2024, 51(6A): 230400112-7. |
[3] | ZHANG Le, YU Ying, GE Hao. Mural Inpainting Based on Fast Fourier Convolution and Feature Pruning Coordinate Attention [J]. Computer Science, 2024, 51(6A): 230400083-9. |
[4] | ZANG Hongrui, YANG Tingting, LIU Hongbo, MA Kai. Study on Cryptographic Verification of Distributed Federated Learning for Internet of Things [J]. Computer Science, 2024, 51(6A): 230700217-5. |
[5] | HOU Lei, LIU Jinhuan, YU Xu, DU Junwei. Review of Graph Neural Networks [J]. Computer Science, 2024, 51(6): 282-298. |
[6] | LUO Zeyang, TIAN Hua, DOU Yingtong, LI Manwen, ZHANG Zehua. Fake Review Detection Based on Residual Networks Fusion of Multi-relationship Review Features [J]. Computer Science, 2024, 51(4): 314-323. |
[7] | SHANG Yuling, LI Peng, ZHU Feng, WANG Ruchuan. Overview of IoT Traffic Attack Detection Technology Based on Fuzzy Logic [J]. Computer Science, 2024, 51(3): 3-13. |
[8] | WANG Lina, LAI Kunhao, YANG Kang. CARINA:An Efficient Application Layer Protocol Conversion Approach for IoT Interoperability [J]. Computer Science, 2024, 51(2): 278-285. |
[9] | ZHONG Yue, GU Jieming, CAO Honglin. Survey of Lightweight Block Cipher [J]. Computer Science, 2023, 50(9): 3-15. |
[10] | ZHANG Naixin, CHEN Xiaorui, LI An, YANG Leyao, WU Huaming. Edge Offloading Framework for D2D-MEC Networks Based on Deep Reinforcement Learningand Wireless Charging Technology [J]. Computer Science, 2023, 50(8): 233-242. |
[11] | LIU Yingjun, LUO Yang, YANG Yujun, LIU Yuanni. Anonymous Authentication Protocol for Medical Internet of Things [J]. Computer Science, 2023, 50(8): 359-364. |
[12] | SUN Haidong, LIU Wanping, HUANG Dong. DGA Domain Name Detection Method Based on Similarity [J]. Computer Science, 2023, 50(6A): 220400122-6. |
[13] | LI Fan, JIA Dongli, YAO Yumin, TU Jun. Graph Neural Network Few Shot Image Classification Network Based on Residual and Self-attention Mechanism [J]. Computer Science, 2023, 50(6A): 220500104-5. |
[14] | LI Xiaohuan, CHEN Bitao, KANG Jiawen, YE Jin. Coalition Game-assisted Joint Resource Optimization for Digital Twin-assisted Edge Intelligence [J]. Computer Science, 2023, 50(2): 42-49. |
[15] | LI Xiaodong, SONG Yuanfeng, LI Yuqiang. Domain-Flux Botnet Detection Method with Fusion of Character and Word Dual-channel [J]. Computer Science, 2023, 50(12): 337-342. |
|