2020
DOI: 10.1016/j.eswa.2020.113251
|View full text |Cite
|
Sign up to set email alerts
|

Integrating complex event processing and machine learning: An intelligent architecture for detecting IoT security attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
40
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 87 publications
(48 citation statements)
references
References 15 publications
0
40
0
1
Order By: Relevance
“…When a network attack occurs in an SDN, ML can be introduced as a detection technology to dynamically control and route the communication flow. Recently, studies using ML to detect and automatically respond to DDoS attacks, abnormal patterns, and data leaks against IoT networks and devices have increased [60,[189][190][191][192][193][194][195][196][197][198][199].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…When a network attack occurs in an SDN, ML can be introduced as a detection technology to dynamically control and route the communication flow. Recently, studies using ML to detect and automatically respond to DDoS attacks, abnormal patterns, and data leaks against IoT networks and devices have increased [60,[189][190][191][192][193][194][195][196][197][198][199].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…Roldán [11] developed an intelligent architecture in the IoT environment for detecting security attacks using Integrated complex event processing and machine learning algorithms. The existing models faced the challenge during detection of attacks such as malware, privacy breaches and denial of service attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…FNR: The rate of the malevolent node to total normal nodes incorrectly signed as a normal node. [21][22][23][24][25] The calculation is proved by Equation 12. PDR: This criterion represents the rate of packets that were successfully delivered to the destination.…”
Section: Dr = Tpr Tpr + Fnrmentioning
confidence: 99%
“… italicDR=()italicTPRTPR+FNR*1000.24emwhere0.24emAll=italicTPR+italicTNR+italicFPR+italicFNR FPR: The FPR is determined by the total number of nodes mistakenly found as the malevolent nodes divided by the total number of usual nodes 18–20 . Hence, Equation illustrates the italicFPR=()italicFPRFPR+TNR*100,where0.25emitalicTNR=()italicTNRTNR+FPR*100 FNR: The rate of the malevolent node to total normal nodes incorrectly signed as a normal node 21–25 . The calculation is proved by Equation .…”
Section: Performance Evaluationmentioning
confidence: 99%