2020 16th International Conference on Distributed Computing in Sensor Systems (DCOSS) 2020
DOI: 10.1109/dcoss49796.2020.00074
|View full text |Cite
|
Sign up to set email alerts
|

Utilizing Blockchain for Distributed Machine Learning based Intrusion Detection in Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 22 publications
0
12
0
Order By: Relevance
“…Conclusions/findings 2020 [87] Journal SVM Ethereum IoT T he result is Evaluation Metrics (0.99), Accuracy (0.9998), Recall (1) and F1-Score (0.9998) 2020 [88] Journal Ordered Boosting Ethereum Ponzi Scheme On a real-world dataset, the new model obtains a 98 percent F-score, greatly outperforming existing techniques. 2020 [89] Journal RF Cryptocurrency Cryptojacking On our dataset, the BRENNT DROID tool can detect miners with 95 percent accuracy.…”
Section: Ye Ar Re Fe Rence Type Model Blockchain Applicationmentioning
confidence: 96%
“…Conclusions/findings 2020 [87] Journal SVM Ethereum IoT T he result is Evaluation Metrics (0.99), Accuracy (0.9998), Recall (1) and F1-Score (0.9998) 2020 [88] Journal Ordered Boosting Ethereum Ponzi Scheme On a real-world dataset, the new model obtains a 98 percent F-score, greatly outperforming existing techniques. 2020 [89] Journal RF Cryptocurrency Cryptojacking On our dataset, the BRENNT DROID tool can detect miners with 95 percent accuracy.…”
Section: Ye Ar Re Fe Rence Type Model Blockchain Applicationmentioning
confidence: 96%
“…BC is used to provide a distributed way to share data among multiple providers. In [18], the authors presented a distributed ML for intrusion detection in IoT network. The IoT network is divided into autonomous systems which are monitored for intrusion detection.…”
Section: Literlature Reviewmentioning
confidence: 99%
“…Thus, several works have been using machine learning algorithms to build Intrusion Detection Systems (IDS). Cheema et al [16] presented an intrusion detection system based on distributed machine learning using Blockchain technology, which divides the IoT network into autonomous systems. The classification technique -support vector machine (SVM) was trained using the datasets obtained from each of the nodes of the IoT network.…”
Section: Introductionmentioning
confidence: 99%