当前位置: X-MOL 学术J. Ambient Intell. Human. Comput. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Deep nonlinear regression least squares polynomial fit to detect malicious attack on IoT devices
Journal of Ambient Intelligence and Humanized Computing ( IF 3.662 ) Pub Date : 2020-05-14 , DOI: 10.1007/s12652-020-02075-y
E. Arul

The explosion of IoT gadgets which be able to more effortlessly conceded than PCs has prompted an expansion in the existence of IoT-dependent botnet attacks. So as to alleviate this newfangled danger there remains a necessity to grow innovative techniques designed for identifying attacks propelled from conceded IoT gadgets in addition to distinguish among hour as well as millisecond elongated IoT-dependent attacks. Now we suggest and experimentally estimate a Deep Nonlinear Regression Least Squares Polynomial Fit to recognize peculiar system traffic originating as of conceded IoT gadgets. On the way to estimate our strategy, we contaminated 9 business IoT gadgets in our lab through 2 of the most generally acknowledged IoT-dependent botnets, Mirai and BASHLITE. Our estimated outcomes showed our suggested strategy's capacity to precisely and rapidly recognize the attacks as they were being propelled from the conceded IoT gadgets which remained a piece of a botnet. The tests show a truly accuracy 98.75%.



中文翻译:

深度非线性回归最小二乘多项式拟合可检测IoT设备上的恶意攻击

物联网小工具的爆炸比PC更加容易让步,促使与物联网相关的僵尸网络攻击的存在范围扩大。为了减轻这种新奇的危险,除了区分小时以及毫秒级的依赖于物联网的长时间攻击之外,仍然有必要发展创新的技术,这些技术旨在识别受限的物联网小工具所发起的攻击。现在,我们建议并通过实验估算出深度非线性回归最小二乘多项式拟合,以识别源自受限IoT小工具的特殊系统流量。在评估策略的方式上,我们通过两个最受公认的依赖物联网的僵尸网络Mirai和BASHLITE污染了实验室中的9个商业IoT小工具。我们的估计结果表明了我们建议的策略' 可以从被遗弃的IoT小工具推动的攻击中准确,迅速地识别攻击,而这些IoT小工具仍然是僵尸网络的一部分。测试显示准确率达到98.75%。

更新日期:2020-05-14
down
wechat
bug