2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT) 2023
DOI: 10.1109/icccnt56998.2023.10306428
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Analysis of State-of-the-Art Attack Detection Models

Priyanka Kumari,
Veenu Mangat,
Anshul Singh
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…In [ 71 ], comparative research of different ML models highlights the difficulties in identifying vulnerabilities used by cyberattacks as it addresses the problem of detecting intrusions in IoT networks. It makes use of the IoT network intrusion dataset as well as the IoT-23 dataset.…”
Section: Machine Learning—iot Network Anomaly Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…In [ 71 ], comparative research of different ML models highlights the difficulties in identifying vulnerabilities used by cyberattacks as it addresses the problem of detecting intrusions in IoT networks. It makes use of the IoT network intrusion dataset as well as the IoT-23 dataset.…”
Section: Machine Learning—iot Network Anomaly Detectionmentioning
confidence: 99%
“…The ranged uses of RFs over the years makes it an accurate ML model for detecting anomalies and attacks. Most of the studies share a common drawback, which is the need for more varied datasets to validate the proposed models [ 59 , 64 , 71 ]. This is followed by the drawback that the models can be computationally heavy for IoT systems [ 69 ].…”
Section: Research Summarymentioning
confidence: 99%