NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium 2018
DOI: 10.1109/noms.2018.8406118
|View full text |Cite
|
Sign up to set email alerts
|

Graph-based IoT microservice security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 48 publications
(52 citation statements)
references
References 11 publications
0
32
0
Order By: Relevance
“…The proposed work has two phases: (a) obtaining the balanced corpus of IoT profiles from original imbalanced data 9 by using SMOTE and (b) designing multiclass adaptive boosting based model for prediction of anomalies in IoT network. In this work, we have used IoT security dataset from kaggle 53 for the model evaluation.…”
Section: Proposed Methodologymentioning
confidence: 99%
See 3 more Smart Citations
“…The proposed work has two phases: (a) obtaining the balanced corpus of IoT profiles from original imbalanced data 9 by using SMOTE and (b) designing multiclass adaptive boosting based model for prediction of anomalies in IoT network. In this work, we have used IoT security dataset from kaggle 53 for the model evaluation.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…While implementing machine learning algorithm, the structure of the data, particularly the balance between the numbers of observations for each potential target, has significant influence of the performance of the model prediction's performance 54 . Due to imbalance nature of the IoT anomalies data, 9 we have used SMOTE 55 in order to achieve a balance between the underrepresented classes and majority class. 1 and 2 have been used to transform the original imbalanced IoT dataset 9 to balanced corpus of IoT profiles.…”
Section: Proposed Methodologymentioning
confidence: 99%
See 2 more Smart Citations
“…IoT devices use different types of services, technologies and protocols. As a result, huge complexity will arise to maintain the future IoT infrastructures, which consequently leads to undesirable vulnerability to the system [ 3 , 4 ].…”
Section: Introductionmentioning
confidence: 99%