Page 278 - NGTU_paper_withoutVideo
P. 278
کیتاموئژ نیون یاهدربراک و اه یروآ نف یلم سنارفنک
هدیدرگ هدافتسا هکیش یاه هداد یدنب هقبط یارب یا هلحرم هس هلسلس دنیآرف کی زا شهوژپ نیا رد .تسا هدیدرگ ینیب شیپ تالمح اب هلباقم تهج
یرتسکاخ گرگ متیروگلا زا مود ی هلحرم رد .تسا هدش هتفرگ هرهب اه هداد دوبهب یارب شزادرپ شیپ تایلمع زا تسخن ی هلحرم رد هک .تسا
یدنب هقبط تایلمع ماجنا تهج نابیتشپ ر ادرب نیشام متیروگلا زا ییاهن ی هلحرم رد .تسا هدش هتفرگ هرهب یگژیو باختنا تایلمع ماجنا تهج
.دشاب یم یداهنشیپ شور لوبق لباق ییاراک ی هدنهد ناشن یداهنشیپ شور زا هدمآ تسدب جیاتن .تسا هدیدرگ هدافتسا
عجارم
[1] H. A-Moreton, J. A-Mata , J. O-Garcia, A.L-Castanda, I.Garcia and C. Benavides ,Multiclass Classification Procedure for
Detecting Attacks on MQTT-IoT Protocol,Hindawi Complexity, 2019,6516253
[2] H. Tahaei, F.Afifi, A. Asemi, F. Zaki, N. B. Anuar , The rise of traffic classification in IoT networks: A survey, Elsevier,
2020.
[3] Sen s, Spatscheck o, Wang d. Accurate, scalable in-network identification of p2p traffic using application signatures.
Publication: Proceedings of the 13th international conference on World Wide Web. May 2004. 512-521.
[4] Soule A, Salamatian K, Taft N, Combining filtering and statistical methods for anomaly detection. Publication: IMC '05:
Proceedings of the 5th ACM SIGCOMM conference on Internet measurementOctober 2005 Pages 31.
[5] Parra G, Rad p, choo k. Implementation of deep packet inspection in smart grids and industrial Internet of Things:
Challenges and opportunities. Journal of Network and Computer Applications. Volume 135, 1 June 2019, Pages 32-46.
[6] Khater N, Overill R, Network traffic classification techniques and challenges. IEEE. 2015.
Jun Zhang; Xiao Chen; Yang Xiang; Wanlei Zhou; Jie Wu. Robust Network Traffic Classification. IEEE. 2015. 1257-1270.
[7] Muhammad Shafiq, Zhihong Tian, Ali Kashif Bashir, Xiaojiang Du, Mohsen Guizani, IoT Malicious Traffic Identification
Using Wrapper-Based Feature Selection Mechanisms, Computers & Security (2020).
[8] Muder Almiania, Alia AbuGhazlehb, Amer Al-Rahayfeha, Saleh Atiewia, Abdul Razaquec. Deep recurrent neural network
for IoT intrusion detection system. Elsevier. 2020.
[9] E. Hodo, X. Bellekens, A. Hamilton, P.-L. Dubouilh, E. Iorkyase, C. Tachtatzis, et al., "Threat analysis of IoT networks using
artificial neural network intrusion detection system," in 2016 International Symposium on Networks, Computers and
Communications (ISNCC), 2016, pp. 1-6.
[10] N. Moustafa, B. Turnbull, and K.-K. R. Choo, "An ensemble intrusion detection technique based on proposed statistical
flow features for protecting network traffic of internet of things," IEEE Internet of Things Journal, 2018.
[11] I. Hafeez, A. Y. Ding, M. Antikainen, and S. Tarkoma, "Real-Time IoT Device Activity Detection in Edge Networks," in
International Conference on Network and System Security, 2018, pp. 221-236.
[12] I. Possebon, A. da Silva, L. Granville, A. Schaeffer-Filho, and A. Marnerides, "Improved Network Traffic Classification
Using Ensemble Learning," 2019.
[13] U. Hunkeler, H. L. Truong, and A. Stanford-Clark, "MQTT-S—A publish/subscribe protocol for Wireless Sensor
Networks," in 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops
(COMSWARE'08), 2008, pp. 791-798.
[13] H. Alaiz-Moreton, J. Aveleira-Mata, J. Ondicol-Garcia, A. L. Muñoz-Castañeda, I. García, and C. Benavides, "Multiclass
classification procedure for detecting attacks on MQTT-IoT protocol," Complexity, vol. 2019, 2019.
[14] I. Kotenko, I. Saenko, A. Kushnerevich, and A. Branitskiy, "Attack Detection in IoT Critical Infrastructures: A Machine
Learning and Big Data Processing Approach," in 2019 27th Euromicro International Conference on Parallel, Distributed and
Network-Based Processing (PDP), 2019, pp. 340-347.
[15] B. Krebs, "Hacked cameras, DVRs powered today’s massive internet outage," Krebs on Security, 2016.
[16] A. Kumar and T. J. Lim, "Early Detection of Mirai-Like IoT Bots in Large-Scale Networks through Sub-sampled Packet
Traffic Analysis," in Future of Information and Communication Conference, 2019, pp. 847-867.