2020 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD) 2020
DOI: 10.1109/icabcd49160.2020.9183842
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection on IoT Network Intrusion Using Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 35 publications
(11 citation statements)
references
References 15 publications
0
11
0
Order By: Relevance
“…e authors of [10] presented a scalable k-NN-based online anomaly detection addressing the lazylearning problem in wireless sensor networks [10]. e works in [16] also employed anomaly detection techniques for IDSs using binary classification. is means that they cannot identify the type of attack.…”
Section: Related Workmentioning
confidence: 99%
“…e authors of [10] presented a scalable k-NN-based online anomaly detection addressing the lazylearning problem in wireless sensor networks [10]. e works in [16] also employed anomaly detection techniques for IDSs using binary classification. is means that they cannot identify the type of attack.…”
Section: Related Workmentioning
confidence: 99%
“…Aiming at improving security in IoT applications, several ML-based network traffic classification solutions have been proposed. Liu et al [16] presented a comparative analysis of different ML methodologies in classifying malicious and benign network traffic. Five methodologies were tested, namely Support Vector Machine (SVM), K-Nearest Neighbours (KNN), Logistic Regression (LR), eXtreme Gradient Boosting (XGBoost), and RF.…”
Section: Related Workmentioning
confidence: 99%
“…They can perform under binary as well as multiclass conditions. For large datasets, SVM is not recommended as the training takes a long time [35,41]. Suman et al [31] proposed an IDS for IoT security based on SDN strategies which aimed to detect anomalous activity early and enhance resilience.…”
Section: Machine Learning Techniquesmentioning
confidence: 99%