Page 278 - NGTU_paper_withoutVideo
P. 278

کیتاموئژ نیون یاهدربراک و اه یروآ نف یلم سنارفنک

           هدیدرگ هدافتسا هکیش یاه هداد یدنب هقبط یارب  یا هلحرم هس هلسلس دنیآرف کی زا شهوژپ نیا رد .تسا هدیدرگ ینیب شیپ تالمح اب هلباقم تهج

           یرتسکاخ گرگ متیروگلا زا مود ی هلحرم رد .تسا هدش هتفرگ هرهب اه هداد دوبهب یارب شزادرپ شیپ تایلمع زا تسخن ی هلحرم رد هک .تسا
           یدنب هقبط تایلمع ماجنا تهج نابیتشپ ر ادرب نیشام متیروگلا زا ییاهن ی هلحرم رد .تسا هدش هتفرگ هرهب یگژیو باختنا تایلمع ماجنا تهج
                                .دشاب یم یداهنشیپ شور لوبق لباق ییاراک ی هدنهد ناشن یداهنشیپ شور زا هدمآ تسدب جیاتن .تسا هدیدرگ هدافتسا




                                                                                                       عجارم
              [1] H. A-Moreton, J. A-Mata , J. O-Garcia, A.L-Castanda, I.Garcia and C. Benavides ,Multiclass Classification Procedure for
               Detecting Attacks on MQTT-IoT Protocol,Hindawi Complexity, 2019,6516253
              [2] H. Tahaei, F.Afifi, A. Asemi, F. Zaki, N. B. Anuar , The rise of traffic classification in IoT networks: A survey, Elsevier,
               2020.
              [3]  Sen  s,  Spatscheck  o,  Wang  d.  Accurate,  scalable  in-network  identification  of  p2p  traffic  using  application  signatures.
                Publication:  Proceedings of the 13th international conference on World Wide Web. May 2004. 512-521.
              [4] Soule A, Salamatian K, Taft N, Combining filtering and statistical methods for anomaly detection. Publication: IMC '05:
               Proceedings of the 5th ACM SIGCOMM conference on Internet measurementOctober 2005 Pages 31.
              [5]  Parra  G,  Rad  p,  choo  k.    Implementation  of  deep  packet  inspection  in  smart  grids  and  industrial  Internet  of  Things:
               Challenges and opportunities. Journal of Network and Computer Applications. Volume 135, 1 June 2019, Pages 32-46.
              [6] Khater N, Overill R,  Network traffic classification techniques and challenges. IEEE. 2015.
              Jun Zhang; Xiao Chen; Yang Xiang; Wanlei Zhou; Jie Wu. Robust Network Traffic Classification. IEEE. 2015. 1257-1270.
                [7]  Muhammad Shafiq, Zhihong Tian, Ali Kashif Bashir, Xiaojiang Du, Mohsen Guizani, IoT Malicious Traffic Identification

               Using Wrapper-Based Feature Selection Mechanisms, Computers & Security (2020).
                [8] Muder Almiania, Alia AbuGhazlehb, Amer Al-Rahayfeha, Saleh Atiewia, Abdul Razaquec. Deep recurrent neural network
               for     IoT intrusion detection system. Elsevier. 2020.

              [9] E. Hodo, X. Bellekens, A. Hamilton, P.-L. Dubouilh, E. Iorkyase, C. Tachtatzis, et al., "Threat analysis of IoT networks using
               artificial  neural  network  intrusion  detection  system,"  in  2016  International  Symposium  on  Networks,  Computers  and
               Communications (ISNCC), 2016, pp. 1-6.
              [10] N. Moustafa, B. Turnbull, and K.-K. R. Choo, "An ensemble intrusion detection technique based on proposed statistical
              flow features for protecting network traffic of internet of things," IEEE Internet of Things Journal, 2018.
              [11] I. Hafeez, A. Y. Ding, M. Antikainen, and S. Tarkoma, "Real-Time IoT Device Activity Detection in Edge Networks," in
               International Conference on Network and System Security, 2018, pp. 221-236.
              [12] I. Possebon, A. da Silva, L. Granville, A. Schaeffer-Filho, and A. Marnerides, "Improved Network Traffic Classification
               Using Ensemble Learning," 2019.
              [13]  U.  Hunkeler,  H.  L.  Truong,  and  A.  Stanford-Clark,  "MQTT-S—A  publish/subscribe  protocol  for  Wireless  Sensor
               Networks,"  in  2008  3rd  International  Conference  on  Communication  Systems  Software  and  Middleware  and  Workshops
               (COMSWARE'08), 2008, pp. 791-798.
              [13] H. Alaiz-Moreton, J. Aveleira-Mata, J. Ondicol-Garcia, A. L. Muñoz-Castañeda, I. García, and C. Benavides, "Multiclass
               classification procedure for detecting attacks on MQTT-IoT protocol," Complexity, vol. 2019, 2019.
              [14] I. Kotenko, I. Saenko, A. Kushnerevich, and A. Branitskiy, "Attack Detection in IoT Critical Infrastructures: A Machine
               Learning and Big Data Processing Approach," in 2019 27th Euromicro International Conference on Parallel, Distributed and
               Network-Based Processing (PDP), 2019, pp. 340-347.
              [15] B. Krebs, "Hacked cameras, DVRs powered today’s massive internet outage," Krebs on Security, 2016.
              [16] A. Kumar and T. J. Lim, "Early Detection of Mirai-Like IoT Bots in Large-Scale Networks through Sub-sampled Packet
               Traffic Analysis," in Future of Information and Communication Conference, 2019, pp. 847-867.
   273   274   275   276   277   278   279   280   281   282   283