2022
DOI: 10.1007/s11277-022-10009-4
|View full text |Cite
|
Sign up to set email alerts
|

Network Based Detection of IoT Attack Using AIS-IDS Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 23 publications
0
0
0
Order By: Relevance
“…In a similar effort, most of the IDS strategies employed efficient feature selection and optimization techniques to bolster the accuracy of the IDS models. Such feature engineering approaches include HHO and SCA [72], ECSO [83], Deep GB-RBM [26], SMO [31], RSL [30], IG [27,96], FS and BE [27], HOA [31], RF and XGBoost [54], F-PSO [92] and SEA and AE [34]. Equally, to enhance the security and preserve-privacy of IoT data, different techniques have been utilized, such as cryptocurrency and blockchain [30,44,49,52,69,78,84,94,99], cryptography-MGO and DHPEA [78], PUFs(ECDSA) [94], homomorphic encryption [51], routing/two-fish symmetry key [85], authentication [68], access control [36], DP [51,52,82].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In a similar effort, most of the IDS strategies employed efficient feature selection and optimization techniques to bolster the accuracy of the IDS models. Such feature engineering approaches include HHO and SCA [72], ECSO [83], Deep GB-RBM [26], SMO [31], RSL [30], IG [27,96], FS and BE [27], HOA [31], RF and XGBoost [54], F-PSO [92] and SEA and AE [34]. Equally, to enhance the security and preserve-privacy of IoT data, different techniques have been utilized, such as cryptocurrency and blockchain [30,44,49,52,69,78,84,94,99], cryptography-MGO and DHPEA [78], PUFs(ECDSA) [94], homomorphic encryption [51], routing/two-fish symmetry key [85], authentication [68], access control [36], DP [51,52,82].…”
Section: Discussionmentioning
confidence: 99%
“…BoT-IoT dataset: This dataset was created by simulating a real IoT network in UNSW Canberra's Cyber Range Lab used for testing IoT-focused IDS. It has both normal and botnet traffic with 46 features covering different IoT devices, communication protocols, and attack types such as DDoS, DoS, OS and Service Scan, Keylogging and Data exfiltration [27,28,40,59,67,72,75,92].…”
Section: Benchmark Datasetsmentioning
confidence: 99%
See 1 more Smart Citation