2021
DOI: 10.1007/s40860-020-00126-x
|View full text |Cite
|
Sign up to set email alerts
|

A smart anomaly-based intrusion detection system for the Internet of Things (IoT) network using GWO–PSO–RF model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 67 publications
(24 citation statements)
references
References 45 publications
0
24
0
Order By: Relevance
“…Here, n s and n g linearly decrease in relation to an increase in the number of iterations, which can be seen in ( 8) and (10), respectively. Meanwhile, n p linearly increases alongside the rising number of iterations, which can be seen in (9).…”
Section: The Proposed Modelmentioning
confidence: 94%
See 1 more Smart Citation
“…Here, n s and n g linearly decrease in relation to an increase in the number of iterations, which can be seen in ( 8) and (10), respectively. Meanwhile, n p linearly increases alongside the rising number of iterations, which can be seen in (9).…”
Section: The Proposed Modelmentioning
confidence: 94%
“…Moreover, employing all features in the design of an IDS can lead to the introduction of redundant and irrelevant features into the model. Therefore, feature optimization must be used to achieve good IDS performance [9]. There are three main approaches to feature optimization.…”
Section: (D)mentioning
confidence: 99%
“…(2021) presented a detection system that is able to autonomously adjust the decision function of its underlying anomaly classification models to a smart home's changing condition. Another intrusion detection system was suggested by Keserwani et al (2021), which combined Grey Wolf Optimization and Particle Swam Optimization to identify various attacks for IoT networks. They used the KDD Cup 99, NSL-KDD and CICIDS-2017 to evaluate their model.…”
Section: Intrusion Detection Systems With a Focus On Iotmentioning
confidence: 99%
“…They used the IoTID20 dataset for the evaluation of these DL models. Keserwani et al [ 23 ] presented a method for extracting significant IoT network features for intrusion detection. The proposed method consists of a combination of grey wolf optimization (GWO) and particle swarm optimization (PSO).…”
Section: Related Workmentioning
confidence: 99%