Segregation of IoT Traffic with Machine Learning Techniques

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IoT Security Techniques Based on Machine Learning

Internet of things (IoT) that integrate a variety of devices into networks to provide advanced and intelligent services have to protect user privacy and address attacks such as spoofing attacks, denial of service attacks, jamming and eavesdropping. In this article, we investigate the attack model for IoT systems, and review the IoT security solutions based on machine learning techniques includi...

متن کامل

Detection of Unauthorized IoT Devices Using Machine Learning Techniques

Security experts have demonstrated numerous risks imposed by Internet of Things (IoT) devices on organizations. Due to the widespread adoption of such devices, their diversity, standardization obstacles, and inherent mobility, organizations require an intelligent mechanism capable of automatically detecting suspicious IoT devices connected to their networks. In particular, devices not included ...

متن کامل

Recognition and Classification of Traffic Signs using Machine Learning Techniques

The computerized recognition and classification of traffic signs is a challenging problem, with several important request areas, including advanced drivers assistance systems, autonomous vehicles and street surveying. While much research is present on both automated diagnosis and popularity of symbol-based traffic indicators there is much less research concentrated specifically on the reputatio...

متن کامل

Techniques for Traffic Sign Classification Using Machine Learning-a Survey

The Road Sign Recognition is a field of applied computer vision research concerned with the automatic detection and classification of traffic signs in traffic scene images. The aim of this research paper is to study the various classification techniques that can be used to construct a system that recognizes road signs in images. The primary objective is to develop an algorithm which will identi...

متن کامل

Using Machine Learning Techniques to Identify Botnet Traffic

To date, techniques to counter cyber-attacks have predominantly been reactive; they focus on monitoring network traffic, detecting anomalies and cyber-attack traffic patterns, and, a posteriori, combating the cyber-attacks and mitigating their effects. Contrary to such approaches, we advocate proactively detecting and identifying botnets prior to their being used as part of a cyber-attack [12]....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Turkish Journal of Computer and Mathematics Education (TURCOMAT)

سال: 2021

ISSN: 1309-4653

DOI: 10.17762/turcomat.v12i2.1806