2021
DOI: 10.1007/s00521-021-06011-9
|View full text |Cite
|
Sign up to set email alerts
|

APAE: an IoT intrusion detection system using asymmetric parallel auto-encoder

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(5 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…• Secure coding practices for IoT devices and applications: Following secure coding guidelines and best practices is essential to minimize the introduction of vulnerabilities during the development process. It includes practices such as input validation [79], output encoding [80], and proper handling of user input to prevent common attack vectors such as injection attacks or cross-site scripting [81]. [83] to identify weaknesses and potential entry points for attackers.…”
Section: B Secure Software Developmentmentioning
confidence: 99%
See 1 more Smart Citation
“…• Secure coding practices for IoT devices and applications: Following secure coding guidelines and best practices is essential to minimize the introduction of vulnerabilities during the development process. It includes practices such as input validation [79], output encoding [80], and proper handling of user input to prevent common attack vectors such as injection attacks or cross-site scripting [81]. [83] to identify weaknesses and potential entry points for attackers.…”
Section: B Secure Software Developmentmentioning
confidence: 99%
“…• Enhanced protection against various attack vectors • Comprehensive approach to IoT security • Strong foundation for device security [26], [79], [80], [83]…”
Section: Ref Security Framework and Approachesmentioning
confidence: 99%
“…Based on the findings of the paper, it appears that it would be possible to detect both short-term attacks and more intense ones. Basati and Faghih's approach [96] proposes a real-time network intrusion detection system that employs two AEs in parallel to monitor the network and a feature reduction deep AE to identify the most distinct features.…”
Section: Other Security Applicationsmentioning
confidence: 99%
“…Also considered were data from GPRS, NSL-KDD, and UNSW-NB15. is classifier is put up against others like Multilayer Perceptrons [28], NBTrees [29], a Random Tree ensemble [30], and Nave Bayes [31]. Study indicated that random forest-based IDSs beat other classifiers in terms of performance.…”
Section: Literature Surveymentioning
confidence: 99%