2022
DOI: 10.1016/j.future.2021.09.025
|View full text |Cite
|
Sign up to set email alerts
|

Autoencoder-based feature construction for IoT attacks clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…Several studies have utilized autoencoders for cyberattack detection by training them on network tra c data to learn normal tra c patterns and detect anomalies. Haseeb et al (2022)[18] proposed an autoencoder-based approach for detecting cyberattacks in an IoT environment. They used network tra c features, including source IP address, destination IP address, port number, and packet size, as input to the autoencoder.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Several studies have utilized autoencoders for cyberattack detection by training them on network tra c data to learn normal tra c patterns and detect anomalies. Haseeb et al (2022)[18] proposed an autoencoder-based approach for detecting cyberattacks in an IoT environment. They used network tra c features, including source IP address, destination IP address, port number, and packet size, as input to the autoencoder.…”
Section: Literature Reviewmentioning
confidence: 99%
“…(1) all of the available features, (2) a manually selected feature subset which is comprised of the 'immediate suspects,' namely octet delta count, avg packet size, flow duration milliseconds, same dest ip count pool, and same dest port count pool (see Appendix A for feature descriptions), (3) a PCA transformation of the original features, and (4) the hidden layer of the AE underlying F ilter m 1 , as in [82] and [83]. 5) In F ilter m 2 , the distance of a flow f from the cluster to which it is assigned is used as a measure of abnormality.…”
Section: E Hyperparameter Tuningmentioning
confidence: 99%
“…The effective analysis and mining around these huge amounts of data have gradually become an important requirement to enhance the value of IoT data [1]. As a typical data mining technology, clustering analysis plays an important role in many IoT data analysis scenarios, such as network energy saving [2,3], privacy protection [4], attack detection [5,6], service computing [7], and pattern discovery [8,9]. The goal of clustering analysis is to divide the unknown data into a set of clusters based on a certain similarity measurement between data samples, so that samples in the same cluster are close to each other, and those in different clusters are different from each other.…”
Section: Introductionmentioning
confidence: 99%