2021
DOI: 10.1007/s00500-021-05809-y
|View full text |Cite
|
Sign up to set email alerts
|

A two-stage intrusion detection approach for software-defined IoT networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
3
0
2

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 41 publications
0
3
0
2
Order By: Relevance
“…Jafarian et al [16], Kaur [17], Jain and Kaur [21], Rashid et al [29], Wang et al [30] demonstrate that stacking generates a promising intrusion detection capability; however, most of the proposed stacking procedures do not consider LR as a second-level algorithm, as suggested by [32]. Alternatively, combiner strategies, such as majority voting [22] and weighted majority voting [25,28] may be utilized as anomaly detectors. The most prevalent mode of voting is majority rule.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Jafarian et al [16], Kaur [17], Jain and Kaur [21], Rashid et al [29], Wang et al [30] demonstrate that stacking generates a promising intrusion detection capability; however, most of the proposed stacking procedures do not consider LR as a second-level algorithm, as suggested by [32]. Alternatively, combiner strategies, such as majority voting [22] and weighted majority voting [25,28] may be utilized as anomaly detectors. The most prevalent mode of voting is majority rule.…”
Section: Related Workmentioning
confidence: 99%
“…In the intrusion detection field, feature selection techniques have also been exploited [34,35]. Specifically, bio-inspired algorithms have gained popularity and evolved into an alternate method for finding the optimal feature subset from the feature space [19,25,36]. Other filterbased approaches such as IG, gain ratio, chi-squared, and Pearson correlation have been intensively utilized to remove unnecessary features [16,20,22,28,29].…”
Section: Related Workmentioning
confidence: 99%
“…Em Tian et al (2021) [Tian et al 2021] é proposto uma abordagem de detecc ¸ão e classificac ¸ão de ataques em dois estágios para o contexto de Redes Definidas por Software (SDN -Software Defined Networks). Os autores utilizam um estágio para selecionar as características de rede usando um método bio-inspirado para se obter um conjunto otimizado das características mais relevantes.…”
Section: Trabalhos Relacionadosunclassified
“…O sistema proposto é avaliado nas bases de dados KDD99 e UNSW-NB15, obtendo acurácia de detecc ¸ão da presenc ¸a de ataques próxima de 100% para o KDD99 e próxima de 90% para o UNSW-NB15. Em termos de classificac ¸ão dos ataques, para a base KDD99 os resultados em todos os ataques foram próximos de 100%, porém, assim como em Tian et al (2021), para o UNSW-NB15 o sistema proposto teve apenas bons resultados para os ataques de classes majoritárias. Os autores também apresentam os resultados do tempo necessário em cada estágio da sua abordagem, e também o tempo por instância analisada.…”
Section: Trabalhos Relacionadosunclassified
“…In Tian et al ( 2021) [12] a two-stage attack detection and classification approach is proposed for the context of Software Defined Networks (SDN). The authors use the first stage to select the network features using a bio-inspired method to obtain an optimized set of the most relevant features.…”
Section: Introductionmentioning
confidence: 99%