2021
DOI: 10.3390/electronics10141633
|View full text |Cite
|
Sign up to set email alerts
|

Classifier Performance Evaluation for Lightweight IDS Using Fog Computing in IoT Security

Abstract: In this article, a Host-Based Intrusion Detection System (HIDS) using a Modified Vector Space Representation (MVSR) N-gram and Multilayer Perceptron (MLP) model for securing the Internet of Things (IoT), based on lightweight techniques and using Fog Computing devices, is proposed. The Australian Defence Force Academy Linux Dataset (ADFA-LD), which contains exploits and attacks on various applications, is employed for the analysis. The proposed method is divided into the feature extraction stage, the feature se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(10 citation statements)
references
References 131 publications
(169 reference statements)
0
10
0
Order By: Relevance
“…In equitation (11), we have the S1(V1) transfer function which first applied an arbitrary ind i to V1 function, the outcome is then applied to the S1 function. A similar operation is designed for the S2(V1), S1(V2), and S2(V2) transfer functions, which are defined in Eqs (12)(13)(14).…”
Section: Cost ¼ 1 à Fit ð10þmentioning
confidence: 99%
See 1 more Smart Citation
“…In equitation (11), we have the S1(V1) transfer function which first applied an arbitrary ind i to V1 function, the outcome is then applied to the S1 function. A similar operation is designed for the S2(V1), S1(V2), and S2(V2) transfer functions, which are defined in Eqs (12)(13)(14).…”
Section: Cost ¼ 1 à Fit ð10þmentioning
confidence: 99%
“…These methods aim to reduce the number of features to the bearest minimum without information loss [5]. Feature selection (FS) methods have been successfully applied to many domains, including computational medicine [6,7], clustering [8,9], intrusion and spam detection [10][11][12][13], and genomics [14].…”
Section: Introductionmentioning
confidence: 99%
“…Multilayer Perceptron has an ability to handle large amount of data. Furthermore, it works well in solving the complex non-linear issues (Khater et al, 2021). Therefore, Aurora et al have been based on MLP neural network and other algorithms: Logistic Regression (LR), Voted Perceptron (VPP) and Radial Base Function (RBF) over the NSL-KDD dataset, in order to improve the intrusion detection task (Arora & Chauhan, 2017).…”
Section: Multilayer Perceptron (Mlp)mentioning
confidence: 99%
“…To tackle this issue, many effective methods have been proposed to select effective features by reducing such disadvantageous features [6][7][8][9][10]. Feature selection (FS) is employed in a wide range of real-world applications, including disease diagnosis [11][12][13][14][15], text clustering [16,17], intrusion detection systems [18][19][20][21], e-mail spam detection [22][23][24][25], and genomic analysis [25][26][27][28][29].…”
Section: Introductionmentioning
confidence: 99%