2020
DOI: 10.1109/jiot.2019.2962788
|View full text |Cite
|
Sign up to set email alerts
|

Online Distributed IoT Security Monitoring With Multidimensional Streaming Big Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 48 publications
(32 citation statements)
references
References 33 publications
0
32
0
Order By: Relevance
“…To enhance the security, reliability, and accuracy of rapidly growing CPs architectures need research more sophisticated, optimization techniques with unsupervised learning and reinforcement learning BLCSs. [5] ISP gives better performance than Vanilla and Bernoulli and also gives better modeling accuracy than others.…”
Section: Resultsmentioning
confidence: 95%
See 1 more Smart Citation
“…To enhance the security, reliability, and accuracy of rapidly growing CPs architectures need research more sophisticated, optimization techniques with unsupervised learning and reinforcement learning BLCSs. [5] ISP gives better performance than Vanilla and Bernoulli and also gives better modeling accuracy than others.…”
Section: Resultsmentioning
confidence: 95%
“…As future work, authors said that to enhance the security, reliability, and accuracy of rapidly growing CPs architectures need research more sophisticated, optimization techniques with unsupervised learning and reinforcement learning BLCSs. In 2020, Fangyu Li, Rui Xie, Zengyan Wang, Lulu Guo, Jin Ye, Ping Ma, and Wenzhan Song [5] authors proposed an online distributed Internet of things (IoT) security monitoring algorithm to deal with the "big data" issues in IoT security. Their proposed algorithm expertly handles the complex streaming multinational time series.…”
Section: An Overviewmentioning
confidence: 99%
“…As data-driven methods do not require explicit physical models, they can cope with complex, complicated, and heterogeneous phenomena. There are many data-driven methods for the security issues, such as the geometrically designed residual filter [46], signal analytics based [152], generalized likelihood ratio [153], the cumulative sum (CUSUM) [154], leverage score [155], influential point selection [156], support vector machine (SVM) [121], Gaussian mixture model (GMM) [122], neural networks [123], machine learning [121], deep learning [157], and so on.…”
Section: Data-driven Cyber-attack Detection and Mitigationmentioning
confidence: 99%
“…Such methods have been extensively employed for attack detection, for example: In [3] such an algorithm is used to detect a Link flooding attack on an IoT Network, in [4] Hypothesis Testing is used against spectrum sensing data falsification in cognitive IoT Networks while in [5] Li et. al use it to empower an distributed attack detection System.…”
Section: A Statistical Hypothesis Testing In the Context Of Iot Networkmentioning
confidence: 99%
“…Experiments with the following data set size were performed N =[200, 500, 1000, 2500, 3000, 4000, 5000, 10000] while in each case the clusters were equally sized. For each data-set, the Monte Carlo process for clustering Significance was run for i iterations where i = [5,25,100,300,500,1000].…”
Section: Experiments 1: Synthetic Data-set From Three Isotropic Distributionsmentioning
confidence: 99%