2024
DOI: 10.1016/j.dcan.2022.08.012
|View full text |Cite
|
Sign up to set email alerts
|

Feature extraction for machine learning-based intrusion detection in IoT networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0
1

Year Published

2024
2024
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 67 publications
(27 citation statements)
references
References 14 publications
0
26
0
1
Order By: Relevance
“…The PCA_FE of KNN and SVM models increases until dimension 15 with almost 95% for ACC and AUC and 91% in DR for KNN, while SVM gets 93% in ACC, 79%in DR, and 91% in AUC. DT, RF, and LR models require only ten dimensions for PCA_FE [25]. The GIWRF_FE model performs better with fewer dimensions, reducing the PCA_FE of the KNN, DT, and RF models.…”
Section: Experimental Results and Findingsmentioning
confidence: 99%
“…The PCA_FE of KNN and SVM models increases until dimension 15 with almost 95% for ACC and AUC and 91% in DR for KNN, while SVM gets 93% in ACC, 79%in DR, and 91% in AUC. DT, RF, and LR models require only ten dimensions for PCA_FE [25]. The GIWRF_FE model performs better with fewer dimensions, reducing the PCA_FE of the KNN, DT, and RF models.…”
Section: Experimental Results and Findingsmentioning
confidence: 99%
“…The IoT nodes (for instance, green gas IoT and industrial IoT actuators) communicate using MQTT, and they publish and subscribe to different topics, namely temperature and humidity. Sarhan et al [31] intended to standardise the techniques to apply them to any dataset. Six ML models, deep feed forward (DFF), CNN, recurrent neural network (RNN), DT, LR, and NB, and three feature extraction algorithms, principal component analysis (PCA), linear discriminant analysis (LDA), and automatic encoder, were applied on three reference datasets, and among them was the ToN-IoT [30].…”
Section: Related Workmentioning
confidence: 99%
“…Several normal and cyber attack events from IoT networks DFF, CNN, RNN, DT, LR, NB [30]. Autoencoder [31] MedBIoT [32] IoT network (i.e., fans, locks, light bulbs and switches). Mirai, BashLite, Torii KNN, SVM, DT, RF [32].…”
Section: Doshi Et Al [14]mentioning
confidence: 99%
“…Data processing plays a vital role in an IDS and essential first step in enhancing the training process for the machine learning models [29]. It can be used to derive data preprocessing, which has a direct impact on how well a model performs in terms of classification.…”
Section: Data Preprocessingmentioning
confidence: 99%
“…-Most metrics are affected by the imbalance of classes in the datasets. Therefore, a single metric cannot be used to differentiate between models [29]. Thus, The ROC curves plotting both the DR and FAR for distinguishing between attack and benign on the x-and y-axes respectively.…”
Section: Evalution Modelmentioning
confidence: 99%