2021
DOI: 10.1109/access.2021.3051530
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Distributed IDS Using Incremental Learning for IoT Health Systems

Abstract: Existing techniques for incremental learning are computationally expensive and produce duplicate features leading to higher false positive and true negative rates. We propose a novel privacy-preserving intrusion detection pipeline for distributed incremental learning. Our pre-processing technique eliminates redundancies and selects unique features by following innovative extraction techniques. We use autoencoders with non-negativity constraints, which help us extract less redundant features. More importantly, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
7
0
3

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(10 citation statements)
references
References 26 publications
0
7
0
3
Order By: Relevance
“…Tabassum et al use the datasets KDDcup-99 and NSL-KDD and merge their selfgenerated IoT traffic to cope with the missing IoT traffic in named datasets. However, they do not explain which MCPS they employed for the generation [115].…”
Section: ) Publicly Available Datasetsmentioning
confidence: 95%
See 1 more Smart Citation
“…Tabassum et al use the datasets KDDcup-99 and NSL-KDD and merge their selfgenerated IoT traffic to cope with the missing IoT traffic in named datasets. However, they do not explain which MCPS they employed for the generation [115].…”
Section: ) Publicly Available Datasetsmentioning
confidence: 95%
“…], Radoglou-Grammatikis et al[97] Radoglou-Grammatikis et al[98], Rahmadika et al[99], Ram and Kumar[100], Rao et al[101], Rao et al[102], Ravi et al[103], Rehman et al[104], Saba[105], Saheed and Arowolo[106], Said et al[107], Salem and Mehaoua[108], Schneble and Thamilarasu[109], Sehatbakhsh et al[110], Sharma et al[111], Singh et al[112], Siniosoglou et al[113], Spegni et al[114], Tabassum et al[115], Tahir et al[116], Thamilarasu et al[117], Thamilarasu et al[24], Thapa et al[118], Toor et al[119], Wa Umba et al[120], Wagan et al [121], Wahab et al [122], Wang et al [123], Yan et al [124], Zaabar et al [125], Zachos et al [126], Zubair et al [127] 99 Specification-based Abdulhammed et al [128], Choudhary et al [129], Fang et al [130], Mitchell and Chen [29], Mitchell and Chen [131], Li et al [132], Raiyat Aliabadi et al [133], You et al [134], Zhang et al [135] 9 Signature-based Boujrad et al [136], Meng et al [25], Mpungu et al [137], Zhang et al [138] 4 Hybrid Begli et al [139], Chen et al [140], Dupont et al [141], Meng et al [142], Kolokotronis et al [143], Lakka et al [144], Tariq et al [145] 7 researchers substantiate why their approach works best (e.g., Saheed et al with their swarm-based approach [106]), others focus on optimizing parts of their approach. E.g., Priya et al measure the benefits of different dimensionality reduction approaches [96].…”
mentioning
confidence: 99%
“…To reduce the computation overhead [30], introduced a privacy-preserving pipelinebased intrusion detection for distributed incremental learning that selects unique features using an innovative extraction technique. Current incremental learning techniques are computationally expensive.…”
Section: Related Workmentioning
confidence: 99%
“…To reduce the computation overhead, [30], introduced a privacy-preserving pipeline-based intrusion detection for distributed incremental learning that selects unique features using an innovative extraction technique. Current incremental learning techniques are computationally expensive, and the distributed intrusion detection method is used to distribute the load across IoT and edge devices.…”
Section: Related Workmentioning
confidence: 99%