scholarly journals Malicious Activity Detection using Smart Contracts in IoT

Author(s):  
Mwangi Eric ◽  
Hany Atlam ◽  
Nawfal Fadhel
2018 ◽  
Vol 9 (1) ◽  
pp. 32-61 ◽  
Author(s):  
Nivedita Nahar ◽  
Prerna Dewan ◽  
Rakesh Kumar

With the steady advancements in the technology, the network security is really important these days to protect information from attackers. In this research, the main focus is on designing strong firewall filtering rules so that detection of malicious code is achieved to an optimal level. A proposed framework is introduced to improve the performance parameters such as Server response time, Web content analysis, Bandwidth, and the performance of the Network traffic load. This research work defines a new set of IPtable rules achieved by modifying the kernel source code. This is done using OpenBSD kernel source code, which results in the formation of a mini-firewall. Therefore, a new hybrid approach is proposed by adding packet filtering rules and SNORT technology in mini-firewall for malicious activity detection. It is an efficient and practical technique which will be helpful to mitigate the malware attacks and secure LAMP server. Experimental analysis has been done to conclude that around 70-75% malicious activity can be reduced by using the proposed technique.


2021 ◽  
Vol 102 ◽  
pp. 102153
Author(s):  
Amit Shlomo ◽  
Meir Kalech ◽  
Robert Moskovitch

Author(s):  
Bernardo David ◽  
João Costa ◽  
Anderson Nascimento ◽  
Marcelo Holtz ◽  
Dino Amaral ◽  
...  

Author(s):  
João Costa ◽  
Edison Freitas ◽  
Bernardo David ◽  
Rubio Serrano ◽  
Dino Amaral ◽  
...  

Electronics ◽  
2020 ◽  
Vol 9 (3) ◽  
pp. 530 ◽  
Author(s):  
Imtiaz Ullah ◽  
Qusay H. Mahmoud

The significant increase of the Internet of Things (IoT) devices in smart homes and other smart infrastructure, and the recent attacks on these IoT devices, are motivating factors to secure and protect IoT networks. The primary security challenge to develop a methodology to identify a malicious activity correctly and mitigate the impact of such activity promptly. In this paper, we propose a two-level anomalous activity detection model for intrusion detection system in IoT networks. The level-1 model categorizes the network flow as normal flow or abnormal flow, while the level-2 model classifies the category or subcategory of detected malicious activity. When the network flow classified as an anomaly by the level-1 model, then the level-1 model forwards the stream to the level-2 model for further investigation to find the category or subcategory of the detected anomaly. Our proposed model constructed on flow-based features of the IoT network. Flow-based detection methodologies only inspect packet headers to classify the network traffic. Flow-based features extracted from the IoT Botnet dataset and various machine learning algorithms were investigated and tested via different cross-fold validation tests to select the best algorithm. The decision tree classifier yielded the highest predictive results for level-1, and the random forest classifier produced the highest predictive results for level-2. Our proposed model Accuracy, Precision, Recall, and F score for level-1 were measured as 99.99% and 99.90% for level-2. A two-level anomalous activity detection system for IoT networks we proposed will provide a robust framework for the development of malicious activity detection system for IoT networks. It would be of interest to researchers in academia and industry.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 61549-61564
Author(s):  
Marwan A. Albahar ◽  
Ruaa A. Al-Falluji ◽  
Muhammad Binsawad

Sign in / Sign up

Export Citation Format

Share Document