2022
DOI: 10.1016/j.micpro.2022.104660
|View full text |Cite
|
Sign up to set email alerts
|

A two-stage stacked ensemble intrusion detection system using five base classifiers and MLP with optimal feature selection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(13 citation statements)
references
References 47 publications
0
0
0
Order By: Relevance
“…The authors in [108] improved intrusion detection by using a two-level classifier in conjunction with a hybrid feature selection technique. To identify the faulty WSN nodes, the traffic data was analyzed using SVM and MLP algorithms.…”
Section: A Intrusion Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors in [108] improved intrusion detection by using a two-level classifier in conjunction with a hybrid feature selection technique. To identify the faulty WSN nodes, the traffic data was analyzed using SVM and MLP algorithms.…”
Section: A Intrusion Detectionmentioning
confidence: 99%
“…Due to the lack of a central location for ML training within this particular network architecture and the sharing of CPU and power resources of all embedded devices, this location becomes indispensable for the deployment of ML. In a significant part of the research studies on ML techniques [108], there is a need for more clarity on the specific implementation of these algorithms in WSNs. The proper educational context for training these methods remains unclear, as extensive previous research has facilitated the identification of attacks and faulty nodes [101].…”
Section: Open Issues a Location Of The ML Training Processmentioning
confidence: 99%
“…The results showed that the proposed IDS system reduced the false positive rate and improved detection accuracy. Mushtaq et al [59] offer a stacked ensemble-based intrusion detection system (SE-IDS) that uses optimum feature selection to increase detection accuracy and decrease false positives. As foundation learners, the system contains a Decision Tree (DT), XGBoost, bagging classifier, additional tree, RF, and an MLP as a meta-learner.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Host-based IDS and Network-based IDS are the primary categories of IDS, where signature-based and anomalybased are the detection methods of IDS [2]. Signature-based IDS depends on predefined patterns or signatures of known attacks and compares network traffic against these known signatures to detect potential threats [3]. Anomaly-based IDS uses statistical or Machine Learning (ML) approaches to establish the baseline behavior of normal and deviations of the threats [2].…”
Section: Introductionmentioning
confidence: 99%
“…Predictions of every subset are combined to produce the outcome. Bagging [3][4][5][6][8][9][10][11][12], Boosting [3][4][5][6]8,[10][11][12][13][14][15][16][17][18][19] are the type of homogeneous ensembles, which uses different methods to determine final prediction. Specifically, majority voting [3][4][5][6][9][10][11]17,18], weighted voting [4,6,7,9,10], average voting are prevalent methods used in existing studies.…”
Section: Introductionmentioning
confidence: 99%