2022
DOI: 10.2139/ssrn.4261807
|View full text |Cite
|
Sign up to set email alerts
|

Göwfeda Novel Federated Network Intrusion Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 33 publications
0
8
0
Order By: Relevance
“…Te authors reported an accuracy of 99.48%. Belenguer et al [41] proposed the GowFed to detect threats in industrial-level networks. Tis is a combination of federated learning and Gower dissimilarity matrices.…”
Section: Federated Learning For Security Monitoring In 5gmentioning
confidence: 99%
“…Te authors reported an accuracy of 99.48%. Belenguer et al [41] proposed the GowFed to detect threats in industrial-level networks. Tis is a combination of federated learning and Gower dissimilarity matrices.…”
Section: Federated Learning For Security Monitoring In 5gmentioning
confidence: 99%
“…The Unisa Malware Dataset (UMD) was utilized by [110], while the CICIDS2017 dataset found attention from [81,111]. Multiple authors were involved in studying the TON_IoT dataset [55,83,84,90,93,94,112], while on N-BaIoT dataset [112], MNIST dataset [91], Edge-IIoTset dataset [77,92], CIC_IoT dataset [80], CSE-CIC-IDS dataset [113]. The SCADA dataset [88,89], NF-BoT-IoT-v2 dataset [114], while BoT-IoT dataset [79,86,95], MQTT dataset [115], and the Power Demand dataset [85].…”
Section: Table VI Analysis Of Most Popular Dataset For Aids Modelingmentioning
confidence: 99%
“…It deftly translates data into a tapestry of probabilities, assigning each class a likelihood based on the elegant equation: log(P(Y=k|X))/(1-P(Y=k|X)) = β₀ + β₁X₁ + ... + βₚXₚ, where P(Y=k|X) embodies the probability of reaching outcome k given data X and βs represent the nuanced weights assigned to each feature's influence. Toy classifiers [90], serving as training controls in this classification models, offer rudimentary decision rules, laying the groundwork for comprehending more algorithms that are intricate. Finally, in one-class SVMs stand as unsupervised approach [111], vigilantly guarding the borders of normalcy within the data.…”
Section: Classification Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…Zhao et al [9] proposed an intrusion detection method based on semi-supervised cross-device FL, which utilizes unlabeled open data to improve classifier performance. GöwFed [10] is an industrial-level network threat detection system that incorporates gower dissimilarity matrices and federated averaging. XGBoost [11] is a cross-silo FL approach combining anonymity-based data aggregation and local differential privacy in anomaly detection.…”
Section: Challenging Issues and Related Workmentioning
confidence: 99%