2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf 2021
DOI: 10.1109/dasc-picom-cbdcom-cyberscitech52372.2021.00101
|View full text |Cite
|
Sign up to set email alerts
|

A feature exploration approach for IoT attack type classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…We develop an optimized, lightweight, ensemble transfer learning model based on CNN for a CoT environment capable of repelling network attacks. In the first phase, data acquisition is carried out by selecting from existing datasets the database that contains IoT-based network attacks as discussed in [36]. The CIC-IDS2017 and CSE-CIC-IDS2018 with the highest numbers of real-time data points were selected for the research.…”
Section: Proposed Framework a Problem Statement And System Overviewmentioning
confidence: 99%
“…We develop an optimized, lightweight, ensemble transfer learning model based on CNN for a CoT environment capable of repelling network attacks. In the first phase, data acquisition is carried out by selecting from existing datasets the database that contains IoT-based network attacks as discussed in [36]. The CIC-IDS2017 and CSE-CIC-IDS2018 with the highest numbers of real-time data points were selected for the research.…”
Section: Proposed Framework a Problem Statement And System Overviewmentioning
confidence: 99%
“…We use a set of features that have demonstrated promising results in prior research efforts to conduct a comparison with our end-to-end approach in terms of both accuracy and the time it takes to extract these features [8], [29]. This comparative evaluation will enable us to gauge the performance and efficiency of our system when compared to established feature-based methods.…”
Section: Defining a Standard Set Of Hand-crafted Features For Compara...mentioning
confidence: 99%
“…Due to the availability of many potential variables in determining malicious activity on an IoT device, Machine Learning (ML) arises as a natural choice as it is poised to take a major role in the near future of IoT cybersecurity [8]. Numerous studies have proposed robust intrusion detection systems (IDS) tailored for the IoT environment, leveraging various ML approaches and features to enhance traditional IDS performance [9][10][11][12]. For this purpose, several datasets containing samples of malicious network packets and system logs were published [13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%