2021
DOI: 10.3390/s22010241
|View full text |Cite
|
Sign up to set email alerts
|

Attack-Aware IoT Network Traffic Routing Leveraging Ensemble Learning

Abstract: Network Intrusion Detection Systems (NIDSs) are indispensable defensive tools against various cyberattacks. Lightweight, multipurpose, and anomaly-based detection NIDSs employ several methods to build profiles for normal and malicious behaviors. In this paper, we design, implement, and evaluate the performance of machine-learning-based NIDS in IoT networks. Specifically, we study six supervised learning methods that belong to three different classes: (1) ensemble methods, (2) neural network methods, and (3) ke… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
2
1

Relationship

4
4

Authors

Journals

citations
Cited by 35 publications
(8 citation statements)
references
References 40 publications
(54 reference statements)
0
8
0
Order By: Relevance
“…The A.C.C. system composes speed control and distance control to adjust the dynamic of the ego car to be symmetrically commensurate with the lead car [29].…”
Section: Autonomous Vehicles Simulation Modelmentioning
confidence: 99%
“…The A.C.C. system composes speed control and distance control to adjust the dynamic of the ego car to be symmetrically commensurate with the lead car [29].…”
Section: Autonomous Vehicles Simulation Modelmentioning
confidence: 99%
“…Botnet detection techniques for the IoT are either network-based or host-based [16][17][18][19][20]. However, the host-based approach is less realistic.…”
Section: Related Workmentioning
confidence: 99%
“…However, the host-based approach is less realistic. For instance, in [16,17], the authors developed a comprehensive architecture for IoT instruction detection and classification at the network layer of the IoT paradigm. Six different supervised ML methods were employed to develop the IoT-IDS: three ensemble learning methods, two neural network methods, and one kernel method.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Unlike the studies mentioned above, where models are developed through the learning-based scheme (training and testing) using predefined systematic Attack-Aware datasets [28] that contain features of common cyber-attacks (intrusions), this research contributes to the cybersecurity of A.V.s by detecting the False Data Injection (FDI) cyber-attacks developed at this research. First, we inject False Data Injection (FDI) attacks into an A.V.…”
Section: Literature Reviewmentioning
confidence: 99%