Segregation of IoT Traffic with Machine Learning Techniques
نویسندگان
چکیده
منابع مشابه
IoT Security Techniques Based on Machine Learning
Internet of things (IoT) that integrate a variety of devices into networks to provide advanced and intelligent services have to protect user privacy and address attacks such as spoofing attacks, denial of service attacks, jamming and eavesdropping. In this article, we investigate the attack model for IoT systems, and review the IoT security solutions based on machine learning techniques includi...
متن کاملDetection of Unauthorized IoT Devices Using Machine Learning Techniques
Security experts have demonstrated numerous risks imposed by Internet of Things (IoT) devices on organizations. Due to the widespread adoption of such devices, their diversity, standardization obstacles, and inherent mobility, organizations require an intelligent mechanism capable of automatically detecting suspicious IoT devices connected to their networks. In particular, devices not included ...
متن کاملRecognition and Classification of Traffic Signs using Machine Learning Techniques
The computerized recognition and classification of traffic signs is a challenging problem, with several important request areas, including advanced drivers assistance systems, autonomous vehicles and street surveying. While much research is present on both automated diagnosis and popularity of symbol-based traffic indicators there is much less research concentrated specifically on the reputatio...
متن کاملTechniques for Traffic Sign Classification Using Machine Learning-a Survey
The Road Sign Recognition is a field of applied computer vision research concerned with the automatic detection and classification of traffic signs in traffic scene images. The aim of this research paper is to study the various classification techniques that can be used to construct a system that recognizes road signs in images. The primary objective is to develop an algorithm which will identi...
متن کاملUsing Machine Learning Techniques to Identify Botnet Traffic
To date, techniques to counter cyber-attacks have predominantly been reactive; they focus on monitoring network traffic, detecting anomalies and cyber-attack traffic patterns, and, a posteriori, combating the cyber-attacks and mitigating their effects. Contrary to such approaches, we advocate proactively detecting and identifying botnets prior to their being used as part of a cyber-attack [12]....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Turkish Journal of Computer and Mathematics Education (TURCOMAT)
سال: 2021
ISSN: 1309-4653
DOI: 10.17762/turcomat.v12i2.1806