2020
DOI: 10.1016/j.cose.2020.101906
|View full text |Cite
|
Sign up to set email alerts
|

FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(7 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…Experimental analysis of GSLB-BDSR is conducted in CloudSim and Java programming language with IoT-based datasets ToNIoT [21], [22]. The results of GSLB-BDSR are compared with [1] and [2] for in-depth analysis of latency time, throughput, security response time, accuracy.…”
Section: Resultsmentioning
confidence: 99%
“…Experimental analysis of GSLB-BDSR is conducted in CloudSim and Java programming language with IoT-based datasets ToNIoT [21], [22]. The results of GSLB-BDSR are compared with [1] and [2] for in-depth analysis of latency time, throughput, security response time, accuracy.…”
Section: Resultsmentioning
confidence: 99%
“…Based on the GTBSS‐HDNN framework, the effectiveness of the proposed methodology is evaluated in terms of trust and two‐level privacy preservation. The ToN‐IoT dataset 48 and BoT‐IoT 47 datasets are evaluated with both the transformed and original dataset versions to evaluate the performance of the GTBSS‐HDNN model. Different attack and normal instances are identified using the GTBSS‐HDNN framework.…”
Section: Experimental Analysismentioning
confidence: 99%
“…The obtained reduced features are used as an input to the CNN for the classification of normal and attack, and the blockchain is used for the authentication and privacy of the IIoT-based systems. Two prominent datasets namely ToN-IoT [32] and BoT-IoT [33,34] were used to evaluate the security mechanism since both datasets have various IoT-based attacks like DoS, Ransomware, normal vectors, MITM, and Theft as mentioned earlier, and are publicly available [35].…”
Section: Introductionmentioning
confidence: 99%