2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI) 2020
DOI: 10.23919/eecsi50503.2020.9251292
|View full text |Cite
|
Sign up to set email alerts
|

Features Extraction on IoT Intrusion Detection System Using Principal Components Analysis (PCA)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 13 publications
0
4
0
1
Order By: Relevance
“…PCA has been utilized for feature extraction in a variety of IoT applications, such as IoT anomaly detection [51] and data fault detection [52].…”
Section: Pcamentioning
confidence: 99%
“…PCA has been utilized for feature extraction in a variety of IoT applications, such as IoT anomaly detection [51] and data fault detection [52].…”
Section: Pcamentioning
confidence: 99%
“…Dengan banyaknya data yang diproses di IDS, maka perlu dilakukan ekstraksi fitur untuk mengurangi biaya komputasi saat memproses data mentah di sistem sensor IoT [16]. Ekstraksi fitur bertujuan untuk mengekstraksi fitur dari fitur asli yang sudah ada dan memodifikasi fitur pada ukuran yang lebih kecil untuk mempercepat proses pelatihan dan meningkatkan akurasi [17] [18]. Pada penelitian mengusulkan Principal Components Analysis (PCA) untuk mengurangi dimensi dari dataset.…”
Section: Features Extraction Menggunakan Pcaunclassified
“…Due to the success of deep-learning technologies in image processing and natural language processing, they have been intensively studied in network intrusion detection [14,15], network traffic tracking [16], and network traffic abnormal behavior detection [17]. Besides, time-series density analysis [18], wavelet [19], principal components analysis [20], and ensemble learning technologies [21] have been extensively investigated in network anomaly detection.…”
Section: Network Anomaly Traffic Detection Approachesmentioning
confidence: 99%
“…Characterization of network anomaly traffic is one of the key technologies commonly used to model and detect network anomalies and then to raise the cybersecurity awareness capability of network administrators. e existing approaches of network anomaly detection can be mainly classified into six categories [1]: classification-based methods [2][3][4], clustering-based methods [5][6][7][8][9], statistical methods [10,11], stochastic methods [12,13], deep-learning-based methods [14][15][16][17], and others [18][19][20][21].…”
Section: Introductionmentioning
confidence: 99%