2020 IEEE Latin-American Conference on Communications (LATINCOM) 2020
DOI: 10.1109/latincom50620.2020.9282320
|View full text |Cite
|
Sign up to set email alerts
|

A Fuzzy Intrusion Detection System for Identifying Cyber-Attacks on IoT Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…The researchers of [41] used a step-wise individually regular classify on a multi-source collection of real-world information concerning cybersecurity to identify infections and their sources. Cristiani et al proposed the Fuzzy Intrusion Detection System for IoT Networks (FROST), which was intended at avoiding and discovering various types of cyberattacks, but it had a high mistake probability and needed modification [12]. Rathore et al, on the other hand, provided an innovative identification approach built upon the ELF-Based Fuzz C-Means (ESFCM) method that utilized the cloud computer concept.…”
Section: Identification Of Cyberattacks In Iot Networkmentioning
confidence: 99%
“…The researchers of [41] used a step-wise individually regular classify on a multi-source collection of real-world information concerning cybersecurity to identify infections and their sources. Cristiani et al proposed the Fuzzy Intrusion Detection System for IoT Networks (FROST), which was intended at avoiding and discovering various types of cyberattacks, but it had a high mistake probability and needed modification [12]. Rathore et al, on the other hand, provided an innovative identification approach built upon the ELF-Based Fuzz C-Means (ESFCM) method that utilized the cloud computer concept.…”
Section: Identification Of Cyberattacks In Iot Networkmentioning
confidence: 99%
“…on the UN-SWNB -15 data set to investigate the very effective attack detection mechanisms contained within it. The forecasts that L. Cristiani and his colleagues [4] made on potential attacks turned out to be accurate in a number of different ways. This method is malleable and can be modified to address a wide variety of possible dangers.…”
Section: Related Workmentioning
confidence: 99%
“…If the characteristics of each assault have not been thoroughly explored, categorised, and investigated for discrepancies, it is impossible to accept the conclusions that have been drawn from the investigation. Since this is an example of supervised learning [4] and the output class has already been decided, the methods of machine learning are utilized.…”
Section: Introductionmentioning
confidence: 99%
“…[24] describes how researchers used an iterative simple linear classifier to identify intrusions and their sources. Although this was the case, there was a significant amount of incorrect categorization and it has to be reduced [25]. In contrast, [26] created an ESFCM approach using fog cloud technology to identify threats.…”
Section: Literature Reviewmentioning
confidence: 99%