2021
DOI: 10.1016/j.compeleceng.2021.107094
|View full text |Cite
|
Sign up to set email alerts
|

Deep learning-based feature extraction and optimizing pattern matching for intrusion detection using finite state machine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…Thus, applying machine learning for IoT system security is considered an optimal opportunity to protect them from intrusion attacks, especially by detecting any outlier activity that emerges in the system. It is worth noting that machine learning also shows excellent performance in other areas such as [ 16 , 17 , 18 , 19 , 20 ].…”
Section: Introductionmentioning
confidence: 99%
“…Thus, applying machine learning for IoT system security is considered an optimal opportunity to protect them from intrusion attacks, especially by detecting any outlier activity that emerges in the system. It is worth noting that machine learning also shows excellent performance in other areas such as [ 16 , 17 , 18 , 19 , 20 ].…”
Section: Introductionmentioning
confidence: 99%
“…The implemented library is based on Bioinfokit. 1 Both computational time and accuracy are calculated and evaluated in the experiments. The runtime is measured in seconds, and the accuracy is determined by prediction rate (PR) and intrusion detection rate (IR) measures, which are respectively defined as: The baseline algorithms used in these experiments are RNN-LF [4], and Tripres [40] for flow prediction, and kNN-TF [11], and LOF-TF [14] for intrusion detection, which are all the state-of-the-art models for comparisons.…”
Section: Experimental Environmentmentioning
confidence: 99%
“…Various types of sensors deployed in IoT settings yields the generation of massive data that needs to be analyzed. Deep learning based solutions [1,18,32] performed well for solving IoT problems such as intrusion detection, and prediction. However, they suffer from two main challenges:…”
Section: Introductionmentioning
confidence: 99%
“…The rules have to be cleverly crafted so they can be applied to multiple attacks. Rules can detect one type or several types of intrusion activity [6]- [8].…”
Section: Introductionmentioning
confidence: 99%