2022
DOI: 10.1016/j.hcc.2021.100047
|View full text |Cite
|
Sign up to set email alerts
|

Features selection and prediction for IoT attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 4 publications
0
12
0
Order By: Relevance
“…The simulation experiments are made to run for 30 times, and the averages of the results are used for plotting the graph to quantify the performance of the proposed BFPSMTM and the benchmarked schemes. The dataset utilized for evaluating the performance of the proposed BFPSMTM and the benchmarked schemes is the open‐source dataset termed IoTID20 derived from IEEE DataPort 21 . This dataset consists of maximized number of flow and network‐based features that are indispensable for evaluating and investigating the flow‐based malicious IoT nodes detection system.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
“…The simulation experiments are made to run for 30 times, and the averages of the results are used for plotting the graph to quantify the performance of the proposed BFPSMTM and the benchmarked schemes. The dataset utilized for evaluating the performance of the proposed BFPSMTM and the benchmarked schemes is the open‐source dataset termed IoTID20 derived from IEEE DataPort 21 . This dataset consists of maximized number of flow and network‐based features that are indispensable for evaluating and investigating the flow‐based malicious IoT nodes detection system.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
“…Most importantly, the proposed model is lightweight and can be deployed on IoT nodes with limited power and storage capabilities. Jingyi et al [77] used DT, RF, and GBM ML algorithms with a dataset generated from the IoTID20 dataset known as IoT2020 dataset. According to the results, the DT algorithm performed more accurately than the other algorithms, but RF had better AUC score.…”
Section: Analysis and Comparison Of Supervised ML Algorithms For Iot ...mentioning
confidence: 99%
“…The drawback of the Gradient boosted models is delay in processing the input patterns with respect to the trained patterns. For all kinds of datasets, gradient boosted algorithms may not get adopted [19]. IoT network enabled mobile edge tracking system is developed here.…”
Section: Literature Surveymentioning
confidence: 99%