2017 International Conference on Inventive Communication and Computational Technologies (ICICCT) 2017
DOI: 10.1109/icicct.2017.7975246
|View full text |Cite
|
Sign up to set email alerts
|

An advanced method for detection of botnet traffic using intrusion detection system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…According to the behavior of some effective detection methods using a machine-learning algorithm in this article. The main concern of this article is to build a model using the Bayes category ML algorithm to predict and prevent various types of intrusion attacks that create a breakdown of wireless sensor network applications [4][5][6][7][8]. This is deployed by monitoring various parameters of the wireless sensor Network and the output based on their weights Volume 14, Number 2, 2023 and concentrations and energy consumed at various nodes.…”
Section: Introductionmentioning
confidence: 99%
“…According to the behavior of some effective detection methods using a machine-learning algorithm in this article. The main concern of this article is to build a model using the Bayes category ML algorithm to predict and prevent various types of intrusion attacks that create a breakdown of wireless sensor network applications [4][5][6][7][8]. This is deployed by monitoring various parameters of the wireless sensor Network and the output based on their weights Volume 14, Number 2, 2023 and concentrations and energy consumed at various nodes.…”
Section: Introductionmentioning
confidence: 99%
“…An IoT botnet is a group of hacked computers, smart appliances, and Internetconnected devices that have been co-opted for illicit purposes. The most effective countermeasure against such types of botnet is provided by the Intrusion detection system (IDS) [3].…”
Section: Introductionmentioning
confidence: 99%