2023
DOI: 10.1016/j.matpr.2021.07.378
|View full text |Cite
|
Sign up to set email alerts
|

ML Based Intrusion Detection Scheme for various types of attacks in a WSN using C4.5 and CART classifiers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(13 citation statements)
references
References 35 publications
0
13
0
Order By: Relevance
“…Meanwhile, Xiangfei et al proved that the C4.5 algorithm could better handle datasets with continuous attributes in this study is an online electrical voltage stability assessment dataset [9]. Gite et al, in their research on machine learning-based intrusion detection for various types of attacks on the Wireless Sensor Network, proved that the C4.5 algorithm produces higher accuracy than CART [10]. A different research topic conducted by Sundaramurthy et al tested the C4.5 algorithm in dealing with the Rheumatoid Arthritis disease dataset with a predicted percentage value of 86.36% [11].…”
Section: Introductionmentioning
confidence: 77%
“…Meanwhile, Xiangfei et al proved that the C4.5 algorithm could better handle datasets with continuous attributes in this study is an online electrical voltage stability assessment dataset [9]. Gite et al, in their research on machine learning-based intrusion detection for various types of attacks on the Wireless Sensor Network, proved that the C4.5 algorithm produces higher accuracy than CART [10]. A different research topic conducted by Sundaramurthy et al tested the C4.5 algorithm in dealing with the Rheumatoid Arthritis disease dataset with a predicted percentage value of 86.36% [11].…”
Section: Introductionmentioning
confidence: 77%
“…On the other hand, IDPS can be deployed within the WBAN to monitor network traffic, detect suspicious activities, and prevent or mitigate potential attacks [129]- [133]. Intrusion detection techniques, including anomaly detection or signature-based detection, can be used to identify potential security breaches and trigger appropriate responses [134], [135].…”
Section: Figure 4 Wban Security Mechanismsmentioning
confidence: 99%
“…The research of Ref. [36] presented a supervised-based machine learning algorithm for intrusion detection. It uses decision tree algorithms named C4.5 and CART to identify network patterns.…”
Section: Artificial Immune Systems and Machine Learning-based Systemsmentioning
confidence: 99%
“…Artificial intelligence-and ML-based schemes can be used to solve all the identified state-of-the-art problems [26][27][28][29][30][31][32][33][34][35][36]. The first challenge, as mentioned in Table 7, is neighbourbased discovery schemes.…”
Section: Ai-and Ml-based Schemes As Optimal Solutions To State-of-the...mentioning
confidence: 99%