2020
DOI: 10.1007/978-981-15-3075-3_6
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing IoT Botnets Attack Detection Using Machine Learning-IDS and Ensemble Data Preprocessing Technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
2

Relationship

1
9

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…The results comparing the proposed model on the Flickr8K and Flickr30K datasets are presented in Table III IV, the proposed model yields a strong CD score of 123.9 and exhibits relative enhancements of around 0.9%, 0.5%, and 0.7% in B-4, MR, and CD scores, respectively. We can use the proposed model in IoT systems in [33], [34] to ensure controllability, safety and effectiveness as a future work. Unlike other methods, this improvement stems from the proposed model's image feature maps incorporating spectral information alongside spatial and semantic details.…”
Section: F Discussionmentioning
confidence: 99%
“…The results comparing the proposed model on the Flickr8K and Flickr30K datasets are presented in Table III IV, the proposed model yields a strong CD score of 123.9 and exhibits relative enhancements of around 0.9%, 0.5%, and 0.7% in B-4, MR, and CD scores, respectively. We can use the proposed model in IoT systems in [33], [34] to ensure controllability, safety and effectiveness as a future work. Unlike other methods, this improvement stems from the proposed model's image feature maps incorporating spectral information alongside spatial and semantic details.…”
Section: F Discussionmentioning
confidence: 99%
“…In future work, we suggest to use other dataset (preferring IoT data) and evaluate accuracy. Also, we suggest to evaluate our model against different attacks such as DoS, phishing and forgery attacks such as these attacks demonstrated in these references [29,30].…”
Section: Discussionmentioning
confidence: 99%
“…Figure 2 shows the main subphases of this stage. Algorithm 1 shows the preprocessing steps [ 35 , 36 ]. Input dataset includes two datasets of CXR images with 1024 × 1024 and 512 × 512 pixel resolution from different sources [ 37 , 38 ].…”
Section: Proposed Framework and Methodsmentioning
confidence: 99%