2016
DOI: 10.1007/s10207-016-0335-z
|View full text |Cite
|
Sign up to set email alerts
|

TermID: a distributed swarm intelligence-based approach for wireless intrusion detection

Abstract: With the mushrooming of wireless access infrastructures, the amount of data generated, transferred and consumed by the users of such networks has taken enormous proportions. This fact further complicates the task of network intrusion detection, especially when advanced machine learning (ML) operations are involved in the process. In wireless environments, the monitored data are naturally distributed among the numerous sensor nodes of the system. Therefore, the analysis of data must either happen in a central l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
34
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(35 citation statements)
references
References 12 publications
1
34
0
Order By: Relevance
“…Bostani et al [17] proposed an anomaly-based IDS by modifying an optimum path forest combined with k-means clustering. A distributed anomaly-based IDS, called T ermID, proposed by Kolias et al [18] incorporating ant colony optimization and rule induction in a reduced data operation to achieve data parallelism and reduce privacy risks.…”
Section: Related Workmentioning
confidence: 99%
“…Bostani et al [17] proposed an anomaly-based IDS by modifying an optimum path forest combined with k-means clustering. A distributed anomaly-based IDS, called T ermID, proposed by Kolias et al [18] incorporating ant colony optimization and rule induction in a reduced data operation to achieve data parallelism and reduce privacy risks.…”
Section: Related Workmentioning
confidence: 99%
“…For a given training dataset X = {x 1 , x 2 , ..., x m } with m samples or instances, where x n is an n-dimensional feature vector, the encoder maps the input vector x n to a hidden representation vector h n through a deterministic mapping f 胃 as given in (2)…”
Section: B Proposed Modelmentioning
confidence: 99%
“…Any hacks in banking systems, healthcare systems and many Internet of Things (IoT) devices could cause huge monetary losses every year and loss of services at crucial times. This drove to an increase in research for more secured online systems specifically in the intrusion detection systems [2]- [4]. With the majority of internet traffic occurring over wireless networks, and the domain is constantly updating with 5G and IoT technologies, there are likely many gaps in the security of these networks that can be exploited through intrusion attempts.…”
Section: Introductionmentioning
confidence: 99%
“…They analysed a set of well-know algorithms to detect threats on an IoT network. [42] proposed TermID which is a distributed network for intrusion detection system based on classification rule and swarm intelligence principles to detect an attack on execution on the network. [43] also compared a serious of machine learning and algorithms to detect threats on 802.11 protocol.…”
Section: Internet Of Things Network May Adopt Different Communicatiomentioning
confidence: 99%