2021
DOI: 10.1016/j.mlwa.2021.100156
|View full text |Cite
|
Sign up to set email alerts
|

Genetic Algorithm based feature selection and Naïve Bayes for anomaly detection in fog computing environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(23 citation statements)
references
References 3 publications
0
22
0
1
Order By: Relevance
“…Furthermore, to solve real-world issues, evolutionary computation employs an optimization search technique like genetic algorithms. For instance, a genetic algorithm is used in cybersecurity to detect irregularities in a fog computing environment 145 . A genetic algorithm is also utilized for optimal feature selection to identify Android malware using machine learning techniques 146 .…”
Section: Hybrid Approach Searching and Optimizationmentioning
confidence: 99%
“…Furthermore, to solve real-world issues, evolutionary computation employs an optimization search technique like genetic algorithms. For instance, a genetic algorithm is used in cybersecurity to detect irregularities in a fog computing environment 145 . A genetic algorithm is also utilized for optimal feature selection to identify Android malware using machine learning techniques 146 .…”
Section: Hybrid Approach Searching and Optimizationmentioning
confidence: 99%
“…The results revealed that the proposed optimal learning model attained medium-level detection accuracy, but with the limitation of many false alarms that may lead to misleading classification. In [39], the authors presented a Genetic Algorithm Wrapper-Based feature selection and Nave Bayes for Anomaly Detection Model (GANBADM) in a Fog Environment that removes immaterial features. GANBADM used the NSL-KDD dataset for result evaluation.…”
Section: B Anomaly Detection In Fog and Fog-to-things Environmentmentioning
confidence: 99%
“…Ferrag et al 9 used different classifier methods based on DT and rule-based concept to detect Internet of things attacks. Onah et al 10 adopted NB for anomaly detection in fog computing. Alrashdi et al 2 proposed an intelligent anomaly detection system for smart city based on RM.…”
Section: Related Workmentioning
confidence: 99%
“…Specifically, we review six representative supervised anomaly detection methods in recent studies, such as logistic regression (LR), 7 support vector machine (SVM), 8 decision tree (DT), 9 naive Bayes (NB), 10 random forest (RM), 2 and multi-layer perceptron (MLP). 11 We also perform a fine-grained evaluation of these algorithms under low-quality data.…”
Section: Introductionmentioning
confidence: 99%