2022
DOI: 10.1007/s12652-022-03887-w
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly-based intrusion detection system in IoT using kernel extreme learning machine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…Results showed a high accuracy in Binary classification. The prediction output was classified as either normal or attack BoT-IoT LSTM Binary classification: 98% C RNN Binary classification: 97% 26 2019 Authors provide a survey for security of IoT Networks Neural Network 99% C–D 27 2022 Authors used kernel extreme learning machine (KELM) for classification to detect anomalies in IoT KELM 99.40% C–D 28 2022 Authors aims at detecting intrusion in IIoT using classification and detection methods. They used XGBoost (eXtremely Gradient Boosting) model TON_IoT XGBoost 96.5% C–D 29 2021 Ullah et al proposed a DL model IDS based on a CNN for multicast and binary classifications CNN 99.7% C–D 30 2022 Saba et al proposed a DL IDS model for anomaly-based IDS based on a CNN technique.…”
Section: State Of the Artmentioning
confidence: 99%
“…Results showed a high accuracy in Binary classification. The prediction output was classified as either normal or attack BoT-IoT LSTM Binary classification: 98% C RNN Binary classification: 97% 26 2019 Authors provide a survey for security of IoT Networks Neural Network 99% C–D 27 2022 Authors used kernel extreme learning machine (KELM) for classification to detect anomalies in IoT KELM 99.40% C–D 28 2022 Authors aims at detecting intrusion in IIoT using classification and detection methods. They used XGBoost (eXtremely Gradient Boosting) model TON_IoT XGBoost 96.5% C–D 29 2021 Ullah et al proposed a DL model IDS based on a CNN for multicast and binary classifications CNN 99.7% C–D 30 2022 Saba et al proposed a DL IDS model for anomaly-based IDS based on a CNN technique.…”
Section: State Of the Artmentioning
confidence: 99%
“…The Internet of Things (IoT) has revolutionized several critical domains such as transportation, healthcare, energy, and agriculture, by providing smart, cost-effective solutions [1,2]. The IoT is a promising technology that uses wireless communication technologies to connect various objects to transmit and receive data without the need for human involvement.…”
Section: Introductionmentioning
confidence: 99%
“…Anomaly detection based on machine learning (ML) and deep learning (DL) techniques has been necessary and effective in detecting cyber-attacks in real time [7]. ML and DL methods can be used to determine whether the traffic flow is benign or malicious through binary classification, and also to classify the malicious attacks into groups of different attack types as a multi-classification task [8]. ML classifiers such as decision tree (DT), random forest (RF), and naïve Bayes (NB) can provide acceptable performance when the training and testing data share similar data distribution; however, when tested on new data with a different distribution, they fail to provide good results [9].…”
Section: Introductionmentioning
confidence: 99%