2020
DOI: 10.1016/j.scs.2020.102324
|View full text |Cite
|
Sign up to set email alerts
|

Scalable machine learning-based intrusion detection system for IoT-enabled smart cities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
49
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 148 publications
(49 citation statements)
references
References 39 publications
0
49
0
Order By: Relevance
“…One of the well-known intrusion detection methods that has gained attention recently in the literature is using machine learning techniques [ 46 , 47 , 48 , 49 ]. As a result, the standard intrusion detection techniques show improved quality by incorporating the machine learning techniques with them [ 50 , 51 , 52 , 53 ]. Machine learning techniques can be used to improve intrusion detection methods for traditional networks effectively.…”
Section: Related Workmentioning
confidence: 99%
“…One of the well-known intrusion detection methods that has gained attention recently in the literature is using machine learning techniques [ 46 , 47 , 48 , 49 ]. As a result, the standard intrusion detection techniques show improved quality by incorporating the machine learning techniques with them [ 50 , 51 , 52 , 53 ]. Machine learning techniques can be used to improve intrusion detection methods for traditional networks effectively.…”
Section: Related Workmentioning
confidence: 99%
“…Qureshi et al [77] proposed a new and secure framework to detect the presence of smart city security threats in IoT and IIoT networks. Rahman et al [104] designed an intrusion detection system (IDS) for sustainable resource management and the network infrastructure protection of smart cities amid the expansion of IoT. Andrade et al [105] proposed and verified a model for evaluating the IoT cybersecurity maturity of smart cities in an IoT environment.…”
Section: Transportationmentioning
confidence: 99%
“…In this, knowledge-based and anomaly-based IDS were integrated. Different IDS architectures are developed [39] for IoT devices. A semi-distributed technique results in an accuracy of 99.97% and long CPU time of 186.26 s. However, in a distributed approach, the accuracy obtained is only 97.8% but CPU time is relatively low of about 73.52 s. The constraint of the work is updated datasets on IoT are not available.…”
Section: Vulnerability Mitigation Approaches and Security Testbedsmentioning
confidence: 99%