dc.contributor.author | Deveci, Ali | |
dc.contributor.author | Yılmaz, Selim | |
dc.contributor.author | Şen, Sevil | |
dc.date.accessioned | 2023-05-30T12:34:54Z | |
dc.date.available | 2023-05-30T12:34:54Z | |
dc.date.issued | 2023 | en_US |
dc.identifier.citation | Ali Deveci, Selim Yilmaz, and Sevil Sen. 2023. Evolving Lightweight Intrusion Detection Systems for RPL-Based Internet of Things. In Applications of Evolutionary Computation: 26th European Conference, EvoApplications 2023, Held as Part of EvoStar 2023, Brno, Czech Republic, April 12–14, 2023, Proceedings. Springer-Verlag, Berlin, Heidelberg, 177–193. https://doi.org/10.1007/978-3-031-30229-9_12 | en_US |
dc.identifier.isbn | 978-303130228-2 | |
dc.identifier.issn | 03029743 | |
dc.identifier.uri | https://doi.org/10.1007/978-3-031-30229-9_12 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12809/10741 | |
dc.description.abstract | With the integration of efficient computation and communication technologies into sensory devices, the Internet of Things (IoT) applications have increased tremendously in recent decades. While these applications provide numerous benefits to our daily lives, they also pose a great potential risk in terms of security. One of the reasons for this is that devices in IoT-based networks are highly resource constrained and interconnected over lossy links that can be exposed by attackers. The Routing Protocol for Low-Power and Lossy Network (RPL) is the standard routing protocol for such lossy networks. Despite the efficient routing built by RPL, this protocol is susceptible to insider attacks. Therefore, researchers have been working on developing effective intrusion detection systems for RPL-based IoT. However, most of these studies consume excessive resources (e.g., energy, memory, communication, etc.) and do not consider the constrained characteristics of the network. Hence, they might not be suitable for some devices/networks. Therefore, in this study, we aim to develop an intrusion detection system (IDS) that is both effective and efficient in terms of the cost consumed by intrusion detection (ID) nodes. For this multiple-objective problem, we investigate the use of evolutionary computation-based algorithms and show the performance of evolved intrusion detection algorithms against various RPL-specific attacks. | en_US |
dc.item-language.iso | eng | en_US |
dc.publisher | Springer Science and Business Media Deutschland GmbH | en_US |
dc.relation.isversionof | 10.1007/978-3-031-30229-9_12 | en_US |
dc.item-rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Genetic programming | en_US |
dc.subject | Intrusion detection | en_US |
dc.subject | IoT | en_US |
dc.title | Evolving Lightweight Intrusion Detection Systems for RPL-Based Internet of Things | en_US |
dc.item-type | conferenceObject | en_US |
dc.contributor.department | MÜ, Mühendislik Fakültesi, Yazılım Mühendisliği Bölümü | en_US |
dc.contributor.institutionauthor | Yılmaz, Selim | |
dc.identifier.volume | 13989 | en_US |
dc.identifier.startpage | 177 | en_US |
dc.identifier.endpage | 193 | en_US |
dc.relation.journal | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |