2023
DOI: 10.1109/jiot.2022.3172393
|View full text |Cite
|
Sign up to set email alerts
|

Novel Online Network Intrusion Detection System for Industrial IoT Based on OI-SVDD and AS-ELM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
1
1

Relationship

1
9

Authors

Journals

citations
Cited by 37 publications
(14 citation statements)
references
References 36 publications
0
10
0
Order By: Relevance
“…In contrast, Deep Neural Network (DNN) was employed upon supervised learning to generate high-level data representation in unlabelled and noisy data. Gyamfi et al [19] presented a lightweight IDS based on the Online Incremental Support Vector Data Description (OI-SVDD) anomaly detection method on IIoT devices and Adaptive Sequential Extreme Learning Machine (AS-ELM) on Multi-access Edge Computing (MEC) servers. Furthermore, the authors employed MEC servers that offered computational resources to execute the AS-ELM technique at network edges.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In contrast, Deep Neural Network (DNN) was employed upon supervised learning to generate high-level data representation in unlabelled and noisy data. Gyamfi et al [19] presented a lightweight IDS based on the Online Incremental Support Vector Data Description (OI-SVDD) anomaly detection method on IIoT devices and Adaptive Sequential Extreme Learning Machine (AS-ELM) on Multi-access Edge Computing (MEC) servers. Furthermore, the authors employed MEC servers that offered computational resources to execute the AS-ELM technique at network edges.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Moreover, it is known that NIDS designed for IoT systems use case scenarios based on MEC require high quality of service, reduced latency, high throughput, and real-time operation. Researchers desist from the use of cloud computing due to its crucial drawback of low propagation delay (high latency) [ 101 , 102 ]. The most influential features that make IoT system developers select MEC over cloud computing for NIDS design include: Providing security context-awareness (the capability of the MEC server to disseminate real-time security information to the IoT device) [ 103 ]; Energy-saving during and after data transfer; Improvement of privacy/security in IoT (users are deprived of the total ownership of their data in cloud computing, which results in private data leakage and loss) [ 104 ]; Optimal resource allocation by the MEC for the IoT system [ 105 ].…”
Section: Multi-access Edge Computing As a Resource To Provide Securit...mentioning
confidence: 99%
“…In comparison to existing IDS, our approach surpasses them with more over 99.9% in terms of ACC, recall, accuracy, and F1-score metrics with record detection and calculation speed. Gyam et al [41] present a thorough examination of cutting-edge network intrusion detection systems (NIDS) and IoT network security practices in 2022. They looked at systems built on MEC platforms and using ML approaches.…”
Section: Related Workmentioning
confidence: 99%