2015 XVIII AISEM Annual Conference 2015
DOI: 10.1109/aisem.2015.7066840
|View full text |Cite
|
Sign up to set email alerts
|

An adaptive immune based anomaly detection algorithm for smart WSN deployments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…A user may change their network environment in a legitimate way, such as changing their internet service provider or moving to another country; however, this may trigger a false alarm, the same as other round-trip based detection approaches. An automated update of the detection threshold to reflect the user's trends [48] and prompting the user to check whether it was legitimate authentication, via multi-factor authentication, would be effective ways of completing an adaptive detection system and minimizing false alarms.…”
Section: Discussionmentioning
confidence: 99%
“…A user may change their network environment in a legitimate way, such as changing their internet service provider or moving to another country; however, this may trigger a false alarm, the same as other round-trip based detection approaches. An automated update of the detection threshold to reflect the user's trends [48] and prompting the user to check whether it was legitimate authentication, via multi-factor authentication, would be effective ways of completing an adaptive detection system and minimizing false alarms.…”
Section: Discussionmentioning
confidence: 99%
“…As a result, for estimating the pH (or EC) values, the Kalman filter requires a total of six variables to be kept between calls: two for the state vector and four for the covariance matrix. In contrast to the algorithms proposed in [26,27,28], neither the run time nor the memory usage of our algorithm scale with the number of previously considered samples, making it more suitable for IoT resource-constraint devices.…”
Section: Algorithm 1 Real-time Anomaly Detection Algorithmmentioning
confidence: 93%
“…DBSCAN is also used in [25]. In our opinion, the immune base algorithm of Salvato et al not only detect abnormal measurements, but may also have the capability of identifying the type of chemical substances in a measurement, which unfortunately was not evaluated by Salvato et al in [26]. In our work, we provide an anomaly detection algorithm of lower running and memory complexity without the possibilities of substance identification.…”
Section: B Anomaly Detection Algorithms Based On Water Quality Parametersmentioning
confidence: 99%
See 1 more Smart Citation
“…The ability of the immune system to cope with a dynamic environment is leveraged in [ 169 ]. In this work, the authors developed an anomaly detection approach inspired by the clonal selection found in the HIS.…”
Section: Literature Review On Immune-inspired Approachesmentioning
confidence: 99%