2020
DOI: 10.1016/j.comnet.2020.107417
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid approach to intrusion detection in fog-based IoT environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
44
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 100 publications
(60 citation statements)
references
References 22 publications
0
44
2
Order By: Relevance
“…SVMs are not recommended for large datasets, as the training takes a long time. Some researchers have proposed hybrid frameworks [29,54,56,64,68]. Some studies have proposed distributed attack detection [46,49,50], which has achieved better attack detection than centralized algorithms.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…SVMs are not recommended for large datasets, as the training takes a long time. Some researchers have proposed hybrid frameworks [29,54,56,64,68]. Some studies have proposed distributed attack detection [46,49,50], which has achieved better attack detection than centralized algorithms.…”
Section: Discussionmentioning
confidence: 99%
“…Deciding the optimal estimation of K can be a complicated and tedious procedure. Cristiano et al [56] proposed a hybrid binary classification method based on DNN and KNN. The proposed system gave better results compared to when only DNN or KNN were used.…”
Section: Machine Learning Techniquesmentioning
confidence: 99%
“…Therefore, NSL-KDD dataset is being widely used by researchers. Recent works on intrusion detection in fog computing environment have been evaluated using this dataset [50], [51], [52] and, [53]. But this dataset also suffers from class imbalance problem.…”
Section: A Experimentsmentioning
confidence: 99%
“…The various attacks included in NSL-KDD dataset include: DoS (Denial of Services) attack, User-to-Root attack, Remote-to-local attack and Probes. In the literature, this dataset has been widely used to assess the performance of anomaly-based attack detection systems for IoT network [6,7,8].…”
Section: Introductionmentioning
confidence: 99%
“…dataset and data pre-processing. NSL-KDD is the latest version of KDD99 dataset and has been widely used by researchers to evaluate the performance of the attack detection system in IoT [6,7,8]. In NSL-KDD dataset, the training data is available in "KDDTrain+" file, consisting of 125973 data entries, out of which 67343 entries represent non-malicious and 58630 entries represent malicious.…”
Section: Introduction To Nsl-kddmentioning
confidence: 99%