2022
DOI: 10.1007/s42979-022-01191-0
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection in Wi-Fi Networks by Modular and Optimized Ensemble of Classifiers: An Extended Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 50 publications
0
1
0
Order By: Relevance
“…As anticipated, many research works focused on single-frame analysis [1,2,10,14,20], mainly highlighting that a subset of attacks can be effectively identified on a per-frame basis. As instead, in this work, we perform a study of the anomaly detection problem in WiFi networks expressed in the graph domain.…”
Section: Buffering and Graphs Building Proceduresmentioning
confidence: 97%
See 2 more Smart Citations
“…As anticipated, many research works focused on single-frame analysis [1,2,10,14,20], mainly highlighting that a subset of attacks can be effectively identified on a per-frame basis. As instead, in this work, we perform a study of the anomaly detection problem in WiFi networks expressed in the graph domain.…”
Section: Buffering and Graphs Building Proceduresmentioning
confidence: 97%
“…Furthermore, for the purpose of this work, numerical features are assumed to be normalized in [0, 1]. To perform processing on patterns (i.e., packets) defined in the starting features space, we adopt the following dissimilarity measure (already proposed in [1,2,20]) ad-hoc tailored to this heterogeneous structure. Let x and y be two generic patterns, then:…”
Section: Dissimilarity Measurementioning
confidence: 99%
See 1 more Smart Citation
“…These devices are used in various applications, such as healthcare, smart homes, and transportation [2]. However, they can be vulnerable to cyberattacks, such as data breaches, unauthorized access, and data manipulations [3]. To identify and prevent such attacks on IoT devices, a reliable and efficient IDS method is required [4].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, in many real-world problems dealing with complex systems, the starting space is not a vectorial space, being also often non-metric ( e.g ., in life sciences ( Münch et al, 2020 ; Martino, Giuliani & Rizzi, 2018 ), engineering applications ( D’urso & Massari, 2019 ; De Santis, Arnò & Rizzi, 2022 ; Kim, Lee & Kim, 2018 ) or cybersecurity ( Granato et al, 2020 , 2022 )). Consequently, only the dissimilarity representation is available through the dissimilarity matrix, as stated above.…”
Section: Introductionmentioning
confidence: 99%