2022
DOI: 10.32604/cmc.2022.020173
|View full text |Cite
|
Sign up to set email alerts
|

Data Fusion-Based Machine Learning Architecture for Intrusion Detection

Abstract: In recent years, the infrastructure of Wireless Internet of Sensor Networks (WIoSNs) has been more complicated owing to developments in the internet and devices' connectivity. To effectively prepare, control, hold and optimize wireless sensor networks, a better assessment needs to be conducted. The field of artificial intelligence has made a great deal of progress with deep learning systems and these techniques have been used for data analysis. This study investigates the methodology of Real Time Sequential De… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 69 publications
(6 citation statements)
references
References 47 publications
0
6
0
Order By: Relevance
“…DRIFE configuration maintains the reliability of the data after processing, and CFS configuration determines the storage and usefulness of the processed Big Data. In the Saltus framework, the two important factors that decide its design are the users and the feature extraction algorithm [16] [17]. Let us consider the case: The District Law and Enforcement department faces a significant challenge in efficiently utilizing deep learning-based face recognition models for criminal suspect identification through CCTV footage across the province.…”
Section: Framework Of Saltus For Handling Big Datamentioning
confidence: 99%
“…DRIFE configuration maintains the reliability of the data after processing, and CFS configuration determines the storage and usefulness of the processed Big Data. In the Saltus framework, the two important factors that decide its design are the users and the feature extraction algorithm [16] [17]. Let us consider the case: The District Law and Enforcement department faces a significant challenge in efficiently utilizing deep learning-based face recognition models for criminal suspect identification through CCTV footage across the province.…”
Section: Framework Of Saltus For Handling Big Datamentioning
confidence: 99%
“…It contains wireless network traffic data, including regular activities and various attacks like DoS and probing attacks. [55] Typically, these datasets are labeled to indicate if each instance represents normal traffic or a specific attack type. Researchers capitalize on these datasets to train and evaluate their AI-based IDS models.…”
Section: Datasetmentioning
confidence: 99%
“…In Reference 27, Real‐Time Sequential Deep Extreme Learning Machine (RTSDELM) methodology was proposed for wireless sensor networks for intrusion activity detection using data fusion. Then, the proposed methodology was tested on KDDCUP99 and NSLKDD datasets.…”
Section: Introductionmentioning
confidence: 99%