2023
DOI: 10.1007/s12652-023-04666-x
|View full text |Cite
|
Sign up to set email alerts
|

IoT networks attacks detection using multi-novel features and extra tree random - voting ensemble classifier (ER-VEC)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 55 publications
0
3
0
Order By: Relevance
“…IoT-Based Network Intrusion Detection Systems ((References: [54,58,62,63,64,65,66,67,68,69,99,100,101]) Disparate Membership Inference Attacks (Reference: [35]) Analysis of Open Source Datasets for IDS (Reference: [23,27]) Hybrid Deep Learning Model for IDS (Reference: [32]) Smart Home Anomaly-Based IDS ( Reference: [36]) The research articles meticulously examined in this study have been judiciously classified according to their quartile rankings, providing invaluable insights into the academic influence and eminence of these esteemed publications. The quartile categorization, elegantly portrayed in Fig.…”
Section: ) Cluster 4: Other Topicsmentioning
confidence: 99%
See 1 more Smart Citation
“…IoT-Based Network Intrusion Detection Systems ((References: [54,58,62,63,64,65,66,67,68,69,99,100,101]) Disparate Membership Inference Attacks (Reference: [35]) Analysis of Open Source Datasets for IDS (Reference: [23,27]) Hybrid Deep Learning Model for IDS (Reference: [32]) Smart Home Anomaly-Based IDS ( Reference: [36]) The research articles meticulously examined in this study have been judiciously classified according to their quartile rankings, providing invaluable insights into the academic influence and eminence of these esteemed publications. The quartile categorization, elegantly portrayed in Fig.…”
Section: ) Cluster 4: Other Topicsmentioning
confidence: 99%
“…Comprises several files of IoT network traffic data. Each file contains both benign, or normal, network traffic data, as well as malicious traffic data associated with the prevalent IoT botnet assaults often referred to as the Mirai botnet [67]. Three distinct forms of IoT botnet attacks, namely SYN-Flooding, ACK-Flooding, and HTTP-Flooding, were the subject of research emphasis.…”
Section: G Mirai Dataset (Cicids-mirai)mentioning
confidence: 99%
“…The quality of a single model can also decrease over time due to the ongoing evolution of botnets 11,12 . The utilization of multiple classifiers in some developed models for botnet detection has shown limitations, as they tend to yield comparatively lower detection rates and higher False Positive Rates (FPR) [13][14][15] . Imbalanced datasets pose a significant challenge to achieving accurate botnet detection.…”
mentioning
confidence: 99%