Basit öğe kaydını göster

dc.contributor.authorDeveci, Ali
dc.contributor.authorYılmaz, Selim
dc.contributor.authorŞen, Sevil
dc.date.accessioned2023-05-30T12:34:54Z
dc.date.available2023-05-30T12:34:54Z
dc.date.issued2023en_US
dc.identifier.citationAli Deveci, Selim Yilmaz, and Sevil Sen. 2023. Evolving Lightweight Intrusion Detection Systems for RPL-Based Internet of Things. In Applications of Evolutionary Computation: 26th European Conference, EvoApplications 2023, Held as Part of EvoStar 2023, Brno, Czech Republic, April 12–14, 2023, Proceedings. Springer-Verlag, Berlin, Heidelberg, 177–193. https://doi.org/10.1007/978-3-031-30229-9_12en_US
dc.identifier.isbn978-303130228-2
dc.identifier.issn03029743
dc.identifier.urihttps://doi.org/10.1007/978-3-031-30229-9_12
dc.identifier.urihttps://hdl.handle.net/20.500.12809/10741
dc.description.abstractWith the integration of efficient computation and communication technologies into sensory devices, the Internet of Things (IoT) applications have increased tremendously in recent decades. While these applications provide numerous benefits to our daily lives, they also pose a great potential risk in terms of security. One of the reasons for this is that devices in IoT-based networks are highly resource constrained and interconnected over lossy links that can be exposed by attackers. The Routing Protocol for Low-Power and Lossy Network (RPL) is the standard routing protocol for such lossy networks. Despite the efficient routing built by RPL, this protocol is susceptible to insider attacks. Therefore, researchers have been working on developing effective intrusion detection systems for RPL-based IoT. However, most of these studies consume excessive resources (e.g., energy, memory, communication, etc.) and do not consider the constrained characteristics of the network. Hence, they might not be suitable for some devices/networks. Therefore, in this study, we aim to develop an intrusion detection system (IDS) that is both effective and efficient in terms of the cost consumed by intrusion detection (ID) nodes. For this multiple-objective problem, we investigate the use of evolutionary computation-based algorithms and show the performance of evolved intrusion detection algorithms against various RPL-specific attacks.en_US
dc.item-language.isoengen_US
dc.publisherSpringer Science and Business Media Deutschland GmbHen_US
dc.relation.isversionof10.1007/978-3-031-30229-9_12en_US
dc.item-rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectGenetic programmingen_US
dc.subjectIntrusion detectionen_US
dc.subjectIoTen_US
dc.titleEvolving Lightweight Intrusion Detection Systems for RPL-Based Internet of Thingsen_US
dc.item-typeconferenceObjecten_US
dc.contributor.departmentMÜ, Mühendislik Fakültesi, Yazılım Mühendisliği Bölümüen_US
dc.contributor.institutionauthorYılmaz, Selim
dc.identifier.volume13989en_US
dc.identifier.startpage177en_US
dc.identifier.endpage193en_US
dc.relation.journalLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)en_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US


Bu öğenin dosyaları:

DosyalarBoyutBiçimGöster

Bu öğe ile ilişkili dosya yok.

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster