- Communities& Collections
- Browse Items by:
- Issue Date
- Author
- Title
- Subject
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Alzahrani, Nouf Fahad | - |
dc.date.accessioned | 2022-06-08T08:25:55Z | - |
dc.date.available | 2022-06-08T08:25:55Z | - |
dc.date.issued | 2022 | en_US |
dc.identifier.uri | http://dorar.uqu.edu.sa//uquui/handle/20.500.12248/132587 | - |
dc.description | 100 ورقة | en_US |
dc.description.abstract | As the number of Internet of Things (IoT) users, services, and applications rises, so does the demand for more security attention. IoT networks have limited power efficiency, necessitating the need of a solution with a limited amount of computing operations. Building a smart lightweight Intrusion Prevention system (IPS) with low False Positive Rate (FPR), accurate detection and without human involvement is necessary for critical and real-time applications -as standard IPSs cannot provide these criteria-. Further more, IoT environments are made up of a diverse set of IoT components from various suppliers and based on various IoT platforms. As a result, interoperability issues prevent the wide use of IoT technology. In this thesis, we present an overview that is focused on IoT security, Machine Learning algorithms mostly used to develop Intrusion detection systems, and software defined networks (SDN) technology. We deeply reviewed some of the most recently created IDS models for IoT, which employed Machine Learning (ML) or Deep Learning (DL) approaches. We gave a comprehensive review of IoT manage ment, including an overview of conventional management platforms and protocols. We used the Extreme Leaning Machines algorithm to develop an autonomous and efficient intrusion detection architecture. We trained and validate our model using SDN and IoTID20 Datasets after an extensive data preprocessing. The results shows that our model can perform well in terms of time and accuracy. We evaluated the performance of three online Ensemble-based Learning models. As the SDN technology is an excellent solution for managing heterogeneity as well as providing monitoring and real-time intru sion prevention, it has been used in this work. We simulated our model using Mininet and Ryu. The experimental findings indicated that the suggested architecture for an intrusion detection system based on Extreme learning machine algorithm can identify DDOS Attacks and improve the security of the IoT environment. | en_US |
dc.language.iso | انجليزي | en_US |
dc.publisher | جامعة أم القرى | en_US |
dc.relation.isformatof | مكتبة الملك عبدالله بن عبدالعزيز الجامعية | en_US |
dc.subject | هندسة الحاسب | en_US |
dc.title | ذكي الوزن الخفيف تطفل منع نظام ل إنترنت من الأشياء | en_US |
dc.title.alternative | A SMART LIGHTWEIGHT INTRUSION PREVENTION SYSTEM FOR THE INTERNET OF THINGS | en_US |
dc.identifier.callnum | 25312 | - |
dc.type.format | ماجستير | en_US |
dc.publisher.country | المملكة العربية السعودية | en_US |
dc.relation.collage | الحاسب الآلي ونظم المعلومات | en_US |
dc.type.status | مجاز | en_US |
dc.rights.hold | Yes | en_US |
dc.rights.digital | Yes | en_US |
dc.publisher.city | مكة المكرمة | en_US |
dc.date.issuedhijri | 1443 | en_US |
dc.relation.dep | هندسة الحاسب الآلي | en_US |
dc.rights.digitized | Yes | en_US |
Appears in Collections : | الرسائل العلمية المحدثة |
Files in This Item :
File | Description | Size | Format | |
---|---|---|---|---|
25312.pdf " Restricted Access" | الرسالة الكاملة | 3.98 MB | Adobe PDF | View/OpenRequest a copy |
absa25312.pdf " Restricted Access" | ملخص الرسالة بالعربي | 121.35 kB | Adobe PDF | View/OpenRequest a copy |
abse25312.pdf " Restricted Access" | ملخص الرسالة بالإنجليزي | 48.42 kB | Adobe PDF | View/OpenRequest a copy |
cont25312.pdf " Restricted Access" | فهرس الموضوعات | 95.23 kB | Adobe PDF | View/OpenRequest a copy |
indu25312.pdf " Restricted Access" | المقدمة | 111.26 kB | Adobe PDF | View/OpenRequest a copy |
title25312.pdf " Restricted Access" | غلاف | 31.53 kB | Adobe PDF | View/OpenRequest a copy |
Items in D-Library are protected by copyright, with all rights reserved, unless otherwise indicated.
Comments (0)