2021
DOI: 10.1007/s41870-021-00748-1
|View full text |Cite
|
Sign up to set email alerts
|

A model for intrusion detection system using hidden Markov and variational Bayesian model for IoT based wireless sensor network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(7 citation statements)
references
References 11 publications
0
7
0
Order By: Relevance
“…Most unstructured data exists in text, and the information extraction for text data requires the completion of entity extraction [23]. In order to extract entities from text, the locations of entities have to be determined first, and other entities are determined to be placed in predefined categories by using the HMM(Hidden Markov Models) [24] method for the entity extraction. It focuses on transforming entity extraction problems into feature labeling problems for processing.…”
Section: Information Extraction For Unstructured Datamentioning
confidence: 99%
“…Most unstructured data exists in text, and the information extraction for text data requires the completion of entity extraction [23]. In order to extract entities from text, the locations of entities have to be determined first, and other entities are determined to be placed in predefined categories by using the HMM(Hidden Markov Models) [24] method for the entity extraction. It focuses on transforming entity extraction problems into feature labeling problems for processing.…”
Section: Information Extraction For Unstructured Datamentioning
confidence: 99%
“…Then coming onto studies work stated in paper [7], precise type of cyber hazard data is the time collection of cyber attacks discovered via a cyber defense device referred to as honeypots, which passively display the incoming Internet connections, alongwith algorithms Bayesian method, hidden Markov model, seasonal ARIMA Model, FARIMA version , FARIMA+GARCH model, marked factor method, vine copula model with parameters as degree of prediction accuracy, to forecast or are expecting Cyber assaults. As per the examine cited in paper [8] datasets used are "Alert Dataset, 'LLDDoS1.Zero DARPA'dataset", and algorithms is Hidden Markov Model with parameters inclusive of IDS database, National Vulnerabilities Database (NVD), assault garph datasources, HMM parameters. Profiles, metrics,statistical models, and procedures for evaluating logs were all part of the concept [9].…”
Section: Literature Surveymentioning
confidence: 99%
“…For the measurement of a trust value, a weighted score product or more complex characteristics such as the inference of Bayes [7,22] or regression analysis [23] can be involved.…”
Section: International Journal On Recent and Innovation Trends In Com...mentioning
confidence: 99%