References
- A. Whitmore, A. Agarwal, and L. Da Xu, "The Internet of Things-A survey of topics and trends," Information Systems Frontiers, vol. 17, no. 2, pp. 261-274, 2015. https://doi.org/10.1007/s10796-014-9489-2
- Q. Wang, X. Zhu, Y. Ni, L. Gu, and H. Zhu, "Blockchain for the IoT and industrial IoT: A review," Internet of Things, p. 100081, 2019.
- "The 7 Most Common IoT Security Threats in 2019 | IoT For All," 2019. [Online]. Available: https://www.iotforall.com/7-most-common-iotsecuritythreats-2019/. [Accessed: 13-Jul-2019].
- A. R. Baker and J. Esler, Snort IDS, IPS Toolkit. Syngress Publishing, Inc. Elsevier, Inc. 30 Corporate Dr. Burlington, MA 01803, 2007.
- S. A. R. Shah and B. Issac, "Performance comparison of intrusion detection systems and application of machine learning to Snort system," Futur. Gener. Comput. Syst., vol. 80, no. November 2017, pp. 157-170, 2018. https://doi.org/10.1016/j.future.2017.10.016
- R. Vishwakarma and A. K. Jain, "A survey of DDoS attacking techniques and defence mechanisms in the IoT network," Telecommunication Systems, vol. 73, no. 1, pp. 3-25, https://doi.org/10.1007/s11235-019-00599-z
- M. M. Salim, S. Rathore, and J. H. Park, "Distributed denial of service attacks and its defenses in IoT: a survey," The Journal of Supercomputing, pp. 1-44, 2019.
- G. Somani, M. S. Gaur, D. Sanghi, M. Conti, and R. Buyya, "DDoS attacks in cloud computing: Issues, taxonomy, and future directions," Computer Communications, vol. 107, pp. 30-48, 2017. https://doi.org/10.1016/j.comcom.2017.03.010
- Mendez,D.M.,Papapanagiotou,I.,&Yang,B.(2017).Internetof things: Survey on security and privacy. arXiv preprint arXiv:1707. 01879.
- McDermott, C. D., Petrovski, A. V., & Majdani, F. (2018, June). Towards situational awareness of botnet activity in the internet of things. In 2018 International conference on cyber situational awareness, data analytics and assessment (Cyber SA) (pp. 1-8). IEEE.
- Bertino, E., & Islam, N. (2017). Botnets and internet of things security. Computer, 2, 76-79. https://doi.org/10.1109/MC.2017.62
- Jerkins, J. A. (2017, January). Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code. In 2017 IEEE 7th annual computing and communication workshop and conference (CCWC) (pp. 1-5). IEEE.
- O. Osanaiye, K.-K. R. Choo, and M. Dlodlo, "Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework," Journal of Network and Computer Applications, vol. 67, pp. 147-165, 2016. https://doi.org/10.1016/j.jnca.2016.01.001
- A. Rawashdeh, M. Alkasassbeh, and M. Al-Hawawreh, "An anomaly-based approach for DDoS attack detection in cloud environment," International Journal of Computer Applications in Technology, vol. 57, no. 4, pp. 312-324, 2018. https://doi.org/10.1504/ijcat.2018.10014729
- H. Polat, O. Polat, and A. Cetin, "Detecting DDoS Attacks in Software-Defined Networks Through Feature Selection Methods and Machine Learning Models," Sustainability, vol. 12, no. 3, p. 1035, 2020. https://doi.org/10.3390/su12031035
- M. Idhammad, K. Afdel, and M. Belouch, "Detection system of HTTP DDoS attacks in a cloud environment based on information theoretic entropy and random forest," Security and Communication Networks, vol. 2018, 2018.
- A. Saied, R. E. Overill, and T. Radzik, "Detection of known and unknown DDoS attacks using Artificial Neural Networks," Neurocomputing, vol. 172, pp. 385-393, 2016. https://doi.org/10.1016/j.neucom.2015.04.101
- A. Amjad, T. Alyas, U. Farooq, and M. Tariq, "Detection and mitigation of DDoS attack in cloud computing using machine learning algorithm," EAI Endorsed Transactions on Scalable Information Systems, vol. 6, no. 23, 2019.
- M. Ghanbari and W. Kinsner, "Detecting DDoS Attacks Using Polyscale Analysis and Deep Learning," International Journal of Cognitive Informatics and Natural Intelligence (IJCINI), vol. 14, no. 1, pp. 17-34, 2020.
- Michael Negnevitsky. Artificial Intelligence: A Guide to Intelligent Systems. Pearson, 2011.
- I. Kotenko, I. Saenko, F. Skorik, and S. Bushuev. Neural network approach to forecast the state of the internet of things elements. In Soft Computing and Measurements (SCM), 2015 XVIII International Conference on, pages 133-135, May 2015.
- Dongare, A. D., Kharde, R. R., & Kachare, A. D. (2012). Introduction to artificial neural network. International Journal of Engineering and Innovative Technology (IJEIT), 2(1), 189-194.
- O. I. Abiodun, A. Jantan, A. E. Omolara, K. V. Dada, N. A. E. Mohamed, and H. Arshad, "State-of-the-art in artificial neural network applications: A survey," Heliyon, vol. 4, no. 11. Elsevier Ltd, p. e00938, 2018. https://doi.org/10.1016/j.heliyon.2018.e00938
- M. S. Galina Mikhaylova, "The 'Anonymous' Movement: Hacktivism as an Emerging Form of Political Participation," Graduate Council of Texas State University, 2014
- S. Paliwal and R. Gupta, "Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm," Int. J. Comput. Appl., vol. 60, no. 19, pp. 975-8887, 2012.
- M. Sabhnani and G. Serpen, "KDD feature set complaint heuristic rules for R2L attack detection," Proc. Int. Conf. Secur. Manag., vol. 1, pp. 310-316, 2003.
- F. Mozneb and A. Farzan, "The Use of Intelligent Algorithms to Detect Attacks In," vol. 3, no. 9, pp. 579- 584, 2014. https://doi.org/10.7753/IJCATR0309.1009
- Pande, S., Khamparia, A., Gupta, D., & Thanh, D. N. (2021). DDOS Detection Using Machine Learning Technique. In Recent Studies on Computational Intelligence (pp. 59-68). Springer, Singapore.
- Jia, Y., Zhong, F., Alrawais, A., Gong, B., & Cheng, X. (2020). Flowguard: an intelligent edge defense mechanism against IoT DDoS attacks. IEEE Internet of Things Journal, 7(10), 9552-9562. https://doi.org/10.1109/jiot.2020.2993782
- Gajewski, M., Mongay Batalla, J., Mastorakis, G., & avromoustakis, C. X. (2020). Anomaly traffic detection and correlation in Smart Home automation IoT systems. Transactions on Emerging Telecommunications Technologies, e4053.
- Dong, X., Dong, C., Chen, Z., Cheng, Y., & Chen, B. (2020). BotDetector: An extreme learning machine-based Internet of Things botnet detection model. Transactions on Emerging Telecommunications Technologies, e3999.
- de Souza, C. A., Westphall, C. B., Machado, R. B., Sobral, J. B. M., & dos Santos Vieira, G. (2020). Hybrid approach to intrusion detection in fog-based IoT environments. Computer Networks, 180, 107417. https://doi.org/10.1016/j.comnet.2020.107417
- Syed, N. F., Baig, Z., Ibrahim, A., & Valli, C. (2020). Denial of service attack detection through machine learning for the IoT. Journal of Information and Telecommunication, 4(4), 482-503. https://doi.org/10.1080/24751839.2020.1767484
- Cvitic, I., Perakovic, D., Perisa, M., & Botica, M. (2019). Novel approach for detection of IoT generated DDoS traffic. Wireless Networks, 1-14.
- Alsamiri, J., & Alsubhi, K. (2019). Internet of Things cyber attacks detection using machine learning. Int. J. Adv. Comput. Sci. Appl, 10(12).
- Roopak, M., Tian, G. Y., & Chambers, J. (2019, January). Deep learning models for cyber security in IoT networks. In 2019 IEEE 9th annual computing and communication workshop and conference (CCWC) (pp. 0452-0457). IEEE.
- Ge, M., Fu, X., Syed, N., Baig, Z., Teo, G., & Robles-Kelly, A. (2019, December). Deep learning-based intrusion detection for iot networks. In 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC) (pp. 256-25609). IEEE.
- NG, B. A., & Selvakumar, S. (2019). Deep radial intelligence with cumulative incarnation approach for detecting denial of service attacks. Neurocomputing, 340, 294-308. https://doi.org/10.1016/j.neucom.2019.02.047
- Aamir, M., & Zaidi, S. M. A. (2019). Clustering based semi-supervised machine learning for DDoS attack classification. Journal of King Saud University-Computer and Information Sciences.
- Mallikarjunan, K. N., Bhuvaneshwaran, A., Sundarakantham, K., & Shalinie, S. M. (2019). DDAM: Detecting DDoS attacks using machine learning approach. In Computational Intelligence: Theories, Applications and Future Directions-Volume I (pp. 261-273). Springer, Singapore.
- Doshi, R., Apthorpe, N., & Feamster, N. (2018, May). Machine learning ddos detection for consumer internet of things devices. In 2018 IEEE Security and Privacy Workshops (SPW) (pp. 29-35). IEEE.
- Doshi, R., Apthorpe, N., & Feamster, N. (2018, May). Machine learning ddos detection for consumer internet of things devices. In 2018 IEEE Security and Privacy Workshops(SPW) (pp. 29-35). IEEE.
- Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., & Elovici, Y. (2018). N-baiot-network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Computing, 17(3), 12-22. https://doi.org/10.1109/mprv.2018.03367731
- Abeshu, A., & Chilamkurti, N. (2018). Deep learning: The frontier for distributed attack detection in fog-to-things computing. IEEE Communications Magazine, 56(2), 169-175. https://doi.org/10.1109/mcom.2018.1700332
- Vigneswaran, R. K., Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2018, July). Evaluating shallow and deep neural networks for network intrusion detection systems in cyber security. In 2018 9th International conference on computing, communication and networking technologies (ICCCNT) (pp. 1-6). IEEE.
- Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE transactions on emerging topics in computational intelligence, 2(1), 41-50. https://doi.org/10.1109/tetci.2017.2772792
- Brun, O., Yin, Y., Gelenbe, E., Kadioglu, Y. M., AugustoGonzalez, J., & Ramos, M. (2018, February). Deep learning with dense random neural networks for detecting attacks against iot-connected home environments. In International ISCIS Security Workshop (pp. 79-89). Springer, Cham.
- Ahanger, T. A. (2017, March). An effective approach of detecting DDoS using Artificial Neural Networks. In 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) (pp. 707-711). IEEE.
- Aljumah, A., & Ahamad, T. (2016). A novel approach for detecting DDoS using artificial neural networks. International Journal of Computer Science and Network Security, 16(12), 132-138.
- "Powell, M.J.D., 'Restart procedures for the conjugate gradient method,' Mathematical Programming, Vol. 12, 1977, pp. 241-254." https://doi.org/10.1007/BF01593790
- "Beale, E.M.L., 'A derivation of conjugate gradients,' in F.A. Lootsma, Ed., Numerical methods for nonlinear optimization, London: Academic Press, 1972."
- "Battiti, R., 'First and second order methods for learning: Between steepest descent and Newton's method,' Neural Computation, Vol. 4, No. 2, 1992, pp. 141-166." https://doi.org/10.1162/neco.1992.4.2.141
- "Riedmiller, M., and H. Braun, 'A direct adaptive method for faster backpropagation learning: The RPROP algorithm,' Proceedings of the IEEE International Conference on Neural Networks, 1993."
- Bharadwaj, H., & Kumar, V. (2018). Comparative study of neural networks in path planning for catering robots. Procedia computer science, 133, 417-423. https://doi.org/10.1016/j.procs.2018.07.051