Veuillez utiliser cette adresse pour citer ce document : http://dspace.univ-tiaret.dz:80/handle/123456789/5392
Affichage complet
Élément Dublin CoreValeurLangue
dc.contributor.authorSMAILI, Abdelkarim-
dc.contributor.authorKACHOUR, Imad Eddine-
dc.date.accessioned2022-11-21T13:21:15Z-
dc.date.available2022-11-21T13:21:15Z-
dc.date.issued2021-
dc.identifier.urihttp://dspace.univ-tiaret.dz:80/handle/123456789/5392-
dc.description.abstractInternet of things applications is growing day by day, as they are being used in many areas and systems, and as their uses and modes of employment increase, there are many gaps with them, the most important problem is security. IOT has a large number of connected devices and therefore mobile data traffic is large and routing protocols are a key element. IOT has many routing protocols, the most widely used is RPL protocol, which takes into account limited power and the device’s capabilities, but it suffers from several weaknesses, the most important one is routing based attacks which targeting this protocol. In this work, we aim to solve the problem of Internet of Things exposure to RPL-based attacks as routing protocol. We built an anomaly intrusion detection system based on deep learning and an IoT attacks dataset (Minerva-IoT) containing the most important attacks built through Cooja simulator and implementation of different scenarios that allowed for the extraction of important features with the addition of new sensitive features such as nodes power and their geographical location, balancing the dataset by fix minority classes (rare attacks) to avoid fake performance using smart algorithms. The results were very satisfactory after the most important challenges in intrusion detection systems were achieved from a false alarm rate (false positive), accuracy and precision.en_US
dc.language.isoenen_US
dc.publisherUniversité Ibn Khaldoun -Tiaret-en_US
dc.subjectInternet of things, DODAG, RPL, Security, Attacks, intrusion detection systemsen_US
dc.titleAnalysis and detection of routing attacks in the internet of Things using Deep learningen_US
dc.typeThesisen_US
Collection(s) :Master

Fichier(s) constituant ce document :
Fichier Description TailleFormat 
TH.M.INF.FR.2021.04.pdf3,28 MBAdobe PDFVoir/Ouvrir


Tous les documents dans DSpace sont protégés par copyright, avec tous droits réservés.