2021 4th International Conference on Computing and Communications Technologies (ICCCT) 2021
DOI: 10.1109/iccct53315.2021.9711795
|View full text |Cite
|
Sign up to set email alerts
|

Artificial Intelligence Assisted IoT Data Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(6 citation statements)
references
References 10 publications
1
4
0
Order By: Relevance
“…Those findings are in line with the current literature that seems to be consistent in the sense that there is no clear go-to model. Shukla et al, [42] also mention that attack detection and mitigation are fundamental parts of model resilience, but their effectiveness is greatly dependent on the assumed context and attack models, which is in line with the findings in this article.…”
Section: Rq1: What Is the Best Ai/ml Model For Anomaly-based Supervis...supporting
confidence: 87%
See 2 more Smart Citations
“…Those findings are in line with the current literature that seems to be consistent in the sense that there is no clear go-to model. Shukla et al, [42] also mention that attack detection and mitigation are fundamental parts of model resilience, but their effectiveness is greatly dependent on the assumed context and attack models, which is in line with the findings in this article.…”
Section: Rq1: What Is the Best Ai/ml Model For Anomaly-based Supervis...supporting
confidence: 87%
“…Decision trees, random forests, and K-Nearest Neighbors performed well, while deep learning, MLP, Naïve Bayes, and Logistic Regression showed lower performance. However, a single-layer neural network was found effective in a resource-constrained environment [42]. Fusion methods, such as stacking have shown to outperform base classifiers [43,44].…”
Section: Ai-enabled Intrusion Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Typically, a security mechanism must handle large amounts of data generated by IoT devices in a distributed way and apply the proper statistical methods in a viable architecture. Shukla et al [28] applied an artificial intelligence (AI)-based intrusion detection methodology for IoT security. The work examined the usage of several machine learning methods inside IoT.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Regression trees [22] are then fitted using training data. Additionally, replacement is performed on every sample to ensure uniformity and the highest level of accuracy [27]. Fig.…”
Section: Figure 6 Sequential Minimal Optimization Flow Diagram B Clas...mentioning
confidence: 99%