2021
DOI: 10.1109/jiot.2020.2996590
|View full text |Cite
|
Sign up to set email alerts
|

A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
112
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 238 publications
(112 citation statements)
references
References 32 publications
0
112
0
Order By: Relevance
“…Comparing the results with work proposed in [9], our Bi-LSTM, SimpleRNN and top performing feature selected models outperform in detecting all attack categories. Figure 4 compares the recall rate of various attack sub-categories with results presented in Alkadi et.…”
Section: F Comparison and Discussionmentioning
confidence: 66%
See 3 more Smart Citations
“…Comparing the results with work proposed in [9], our Bi-LSTM, SimpleRNN and top performing feature selected models outperform in detecting all attack categories. Figure 4 compares the recall rate of various attack sub-categories with results presented in Alkadi et.…”
Section: F Comparison and Discussionmentioning
confidence: 66%
“…Figure 4 compares the recall rate of various attack sub-categories with results presented in Alkadi et. al [9]. Our proposed approach showed higher recall rates especially in service scan, OS fingerprint, data ex-filtration and keylogging.…”
Section: F Comparison and Discussionmentioning
confidence: 73%
See 2 more Smart Citations
“…Besides federated learning and cryptographic algorithms, the advent of recent machine learning and deep learning technologies can also potentially address the privacy concern. For example, Alkadi et al [179] presented a blockchainbased framework with deep learning approaches to identify the intrusion attacks while preserving data privacy. Moreover, the work [180] introduced a privacy-aware deep learning method, which allows the collaboration of multiple nodes to train deep neural networks while preserving data privacy.…”
Section: B Secure Iiot Critical Infrastructuresmentioning
confidence: 99%