2022 International Conference on Communication, Computing and Internet of Things (IC3IoT) 2022
DOI: 10.1109/ic3iot53935.2022.9767903
|View full text |Cite
|
Sign up to set email alerts
|

Network Intrusion Detection System using Supervised Learning based Voting Classifier

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…It ensures the communication protocol to be followed during communication and converts the data into the desired type of protocol in which it needs to be transmitted [20]. The transmitted data is sent to the cloud server where it analyses the data using the deep learning algorithm defined below and sends an alert notification to the forest official regarding the intrusion of the wild animal into the residential area and required action will be taken by the forest officials [21], [22].…”
Section: Figure 2 Data Flow Diagram For Vision Images Using Iot Devicementioning
confidence: 99%
See 1 more Smart Citation
“…It ensures the communication protocol to be followed during communication and converts the data into the desired type of protocol in which it needs to be transmitted [20]. The transmitted data is sent to the cloud server where it analyses the data using the deep learning algorithm defined below and sends an alert notification to the forest official regarding the intrusion of the wild animal into the residential area and required action will be taken by the forest officials [21], [22].…”
Section: Figure 2 Data Flow Diagram For Vision Images Using Iot Devicementioning
confidence: 99%
“…Web application also shows the previous intrusion data of the wild animal in the particular residential zone. Depending on the past data, the forest department can make preventive measures for the repeated zone of intrusion [23], [24].…”
Section: Cloudmentioning
confidence: 99%
“…Along with the development of research related to IDS, machine learning is also developing quite rapidly. Research conducted by [8] developed a machine learning based on a voting classifier, which was implemented to detect anomalies in the network. Basically, a voting classifier represents a machine learning method that aggregates predictions from various individual models to produce a final prediction [9].…”
Section: Introductionmentioning
confidence: 99%
“…While soft voting is generally more effective when working with a wide range of models, Hard Voting is easier to execute [16]. Research done in [8] concluded that the performance of machine learning with a voting classifier was better than that of a single classifier model.…”
Section: Introductionmentioning
confidence: 99%